CFP last date
20 January 2025
Reseach Article

A Study on Dynamic Data Masking with its Trends and Implications

by Ravi kumar G K, Dr B Justus Rabi, Manjunath TN
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 38 - Number 6
Year of Publication: 2012
Authors: Ravi kumar G K, Dr B Justus Rabi, Manjunath TN
10.5120/4692-6828

Ravi kumar G K, Dr B Justus Rabi, Manjunath TN . A Study on Dynamic Data Masking with its Trends and Implications. International Journal of Computer Applications. 38, 6 ( January 2012), 19-24. DOI=10.5120/4692-6828

@article{ 10.5120/4692-6828,
author = { Ravi kumar G K, Dr B Justus Rabi, Manjunath TN },
title = { A Study on Dynamic Data Masking with its Trends and Implications },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 38 },
number = { 6 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume38/number6/4692-6828/ },
doi = { 10.5120/4692-6828 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:51.297870+05:30
%A Ravi kumar G K
%A Dr B Justus Rabi
%A Manjunath TN
%T A Study on Dynamic Data Masking with its Trends and Implications
%J International Journal of Computer Applications
%@ 0975-8887
%V 38
%N 6
%P 19-24
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present information age, Conventional data masking solutions perform Static Data Masking, where the obfuscated values are physically stored in the database. For obvious reasons, Data Masking has been limited to Development and QA environments. Now, for the first time, organizations/enterprises production environments can be dynamically masked without enhancing existing applications and building new security layers. By enhancing the existing application security with Dynamic Data Masking security layer, which enables the application of various security actions, includes masking, hiding or blocking incoming requests. Dynamic Data masking is an effective strategy in reducing the risk of data exposure to insiders and outsiders in organizations and is a best practice for securing production databases. Dynamic data masking is the process of masking specific data elements, Ascend without touching applications or physical production databases. This paper will help data security developers and analysts in securing production data effectively.

References
  1. .Muralidhar, K. and R. Sarathy “Generating Sufficiency-based Non-Synthetic Perturbed Data," Transactions on Data Privacy,1 (1).2008,p-17-33.
  2. .Li, H., K. Muralidhar, and R. Sarathy, “Assessment of Disclosure Risk when using Confidentiality via Camouflage,” Operations Research, 55(6), 2007,p-1178-1182.
  3. . Muralidhar, K. and R. Sarathy, (2006) “A Comparison of Multiple Imputation and Data Perturbation for Masking Numerical Variables,” Journal of Official Statistics, 22(3), 507-524.
  4. . Muralidhar, K. and R. Sarathy, (2006) "Data Shuffling- A New Masking Approach for Numerical Data," Management Science, 52(5), 58-670.
  5. . Muralidhar, K. and R. Sarathy,( 2005) "An Enhanced Data Perturbation Approach for Small Data Sets," Decision Sciences, 36(3), 513-529.
  6. . Muralidhar, K. and R. Sarathy,( 2003 ) "A Rejoinder to the Comments by Polettini and Stander on 'A Theoretical Basis for Perturbation Methods'," Statistics and Computing, 13(4), 339-342.
  7. . Muralidhar, K. and R. Sarathy, (2003)"A Theoretical Basis for Perturbation Methods," Statistics and Computing, 13(4), 329-335,
  8. Sarathy, R., K. Muralidhar, and R. Parsa,(2002) "Perturbing Non-Normal Confidential Attributes: The Copula Approach," Management Science, 48(12), 1613-1627.
  9. . Muralidhar, K. and R. Sarathy,(2002) "What Could They Find? An Assessment of Security Risk," Proceedings of the 2002 National Meeting of the Decision Sciences Institute, San Diego, November.
  10. . Sarathy, R. and K. Muralidhar, (2002)"The Security of Confidential Numerical Data in Databases," Information Systems Research, 13(4), 389-403.
  11. . Muralidhar, K., R. Sarathy, and R. Parsa,(2001) "An Improved Security Requirement for Data Perturbation with Implications for E-Commerce," Decision Sciences, 32(4), 683-698.
  12. . Muralidhar, K. and R.Sarathy,(1999) "Security of Random Data Perturbation Methods," ACM Transactions on Database Systems, 24(4),487-493.
  13. . Muralidhar, K., R. Parsa, and R. Sarathy, (1999)"A General Additive Data Perturbation Method for Database Security," Management Science, 45(10), 1399-1415.
  14. . Muralidhar, K., D. Batra, and P. Kirs (1995) “Accessibility, Security, and Accuracy in Statistical Databases: The Case for the Multiplicative Fixed Data Perturbation Approach,” Management Science, 41(9), 1549-1564.
  15. .Muralidhar, K. and R. Sarathy,(2008) “A Theoretical Comparison of Data Masking Techniques for Numerical Microdata,” 3rd IAB Workshop on Confidentiality and Disclosure - SDC for Microdata, Nuremberg, Germany, November 20-21.
  16. . Ravikumar G K, Dr.Justus rabi, Manjunath T.N, Ravindra S Hegadi,”Design of Data Masking Architecture and Analysis of Data Masking Techniques for Testing -IJEST11-03-06-217- Vol. 3 No. 6 June 2011 p.5150-5159
  17. . Ravikumar G K, Manjunath T N, Ravindra S Hegadi, UMESH I M “A Survey on Recent Trends, Process and Development in Data Masking for Testing"-IJCSI- Vol. 8, Issue 2, March 2011-p-535-544.
  18. . Manjunath T.N, Ravindra S Hegadi, Ravikumar G K."A Survey on Multimedia Data Mining and Its Relevance Today" IJCSNS. Vol. 10 No. 11-Nov 2010, pp. 165-170.
  19. .Manjunath T.N, Ravindra S Hegadi, Ravikumar G K."Analysis of Data Quality Aspects in Data warehouse Systems", (IJCSIT)-Jan-2011.
Index Terms

Computer Science
Information Sciences

Keywords

Data masking ETL Mapping Replacement technique.