CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Study for Best Data Obfuscation Techniques using Multi-Criteria Decision-Making Technique

by Gayatri C. Deshmukh, S. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 43
Year of Publication: 2018
Authors: Gayatri C. Deshmukh, S. M. Patil
10.5120/ijca2018917137

Gayatri C. Deshmukh, S. M. Patil . Study for Best Data Obfuscation Techniques using Multi-Criteria Decision-Making Technique. International Journal of Computer Applications. 180, 43 ( May 2018), 50-57. DOI=10.5120/ijca2018917137

@article{ 10.5120/ijca2018917137,
author = { Gayatri C. Deshmukh, S. M. Patil },
title = { Study for Best Data Obfuscation Techniques using Multi-Criteria Decision-Making Technique },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 180 },
number = { 43 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 50-57 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number43/29423-2018917137/ },
doi = { 10.5120/ijca2018917137 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:04:32.695723+05:30
%A Gayatri C. Deshmukh
%A S. M. Patil
%T Study for Best Data Obfuscation Techniques using Multi-Criteria Decision-Making Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 43
%P 50-57
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we describe the formatting guidelines for IJCA Journal Submission Data obfuscation (or also known as masking of data) is the process of hiding real data with random characters or data i.e. the process of protecting sensitive data from thefts and hackers. Obfuscation is applied in order to secure data that is classified as personal identifiable data, personally or commercially sensitive data. Keeping the data valid for the use of test cycles. It must also appear consistent. The objective is to protect the privacy of individuals which is getting vital for operative functioning over the internet. Privacy enforcement is being handled primarily through governments for development or testing purposes and study of various data obfuscation techniques for different applications and their comparison study using statistical parameters. In this paper, we study the comparison of various data obfuscation techniques. The results strongly suggest that replacement methods can be used across the domains starting such as finance, banking, military, health care sector, and identity management domain. Different data obfuscation models such as encryption, shuffling, substitution, and masking out are compared.

References
  1. Ravikumar G K, Manjunath T N, Ravindra S Hegadi, Umesh I M, 2011, A Survey on Recent Trends, Process and Development in Data Masking for Testing
  2. A Net 2000 Ltd. White Paper, 2016, Data Masking: What You Need to Know, What You Really Need To Know Before You Begin
  3. Madurika, HKGM, & Hemakumara, GPTS., 2015, Gis Based Analysis for Suitability Location Finding in The Residential Development Areas of Greater Matara Region. International Journal of Scientific & Technology Research, 4(8)
  4. Rew, L., 1988, Intuition in Decision‐making Journal of Nursing Scholarship. 20 (3): 150–154. doi:10.1111/j.1547-5069. 1988.tb00056
  5. R. Venkata Rao, 2007, Decision Making in the Manufacturing Environment Using Graph Theory and Fuzzy Multiple Attribute Decision Making Methods
  6. Gault, RH, 1907, "A history of the questionnaire method of research in psychology". Research in Psychology.
  7. Evangelos Triantaphyllou, 2011,”Multi-Criteria Decision Making Methods: A Comparative Study”.
  8. Securosis, L.L.C., 2012, Understanding and Selecting Data Masking Solutions: Creating Secure and Useful Data
  9. An Oracle White Paper, 2013, Data Masking Best Practice
  10. L. Karlitasari, D. Suhartini and Benny,2017, “Comparison of simple additive weighting (SAW) and composite performance index (CPI) methods in employee remuneration determination”
  11. Ricardo Jorge Santos, Jorge Bernardino, Marco Vieira,2011, A Data Masking Technique for Data Warehouses
  12. Rupa Parameswaran, Douglas M Blough, 2007, Privacy Preserving Collaborative Filtering using Data Obfuscation
  13. David E. Bakken, Rupa Parameswaran And Douglas M. Blough, Andy A. Franz And Ty J. Palmer, 2004, Data Obfuscation: Anonymity and Desensitization of Usable Data Sets
  14. Wei Xu, Fangfang Zhang and Sencun Zhu, 2012, The Power of Obfuscation Techniques in Malicious JavaScript Code: A Measurement Study
  15. A Hidayat, H Mustafidah, and A Suyadi. 2015, Penerapan Metode Simple Additive Weighting (Saw) Untuk Sistem Pendukung Keputusan Penilaian Kinerja Dosen Di Universitas Muhammadiyah Purwokerto. Prosiding SENATEK 2015. Technique Faculty. Universitas Muhammadiyah Purwokerto. Purwokerto. ISBN 978-602-14355-0 -2, pp. 367-374.
  16. A Memariania, A Aminib and A Alinezhadc, 2009, Sensitivity Analysis of Simple Additive Weighting Method (SAW): The Results of Change in the Weight of One Attribute on the Final Ranking of Alternatives. Journal of Optimization in Industrial Engineering. Article 2. Volume 2. Issue 4. Page 13-18.
  17. G S Pandian, N Jawahar, and SP Nachiappan, 2013, Composite Performance Index for Sustainability. IOSR Journal of Environmental Science, Toxicology and Food Technology (IOSR-JESTFT) e-ISSN: 2319-2402, p- ISSN: 2319-2399.Volume 3, Issue 1. PP 91-102.
  18. Turban, Efrain, Aronson, and Jay, 2001, Decision Support System and Intelligent System, Prentice Hall, New Jersey.
  19. Valensia, 2012, Sistem Pendukung Keputusan penilaian Kinerja Karyawan Dengan Menggunakan Metode Simple Additive Weighting (SAW).
Index Terms

Computer Science
Information Sciences

Keywords

Data obfuscation Multi Criteria Decision Making Encryption Substitution Shuffling