Study for Best Data Obfuscation Techniques using Multi-Criteria Decision-Making Technique
Author(s) -
C. Gayatri,
Schoeffler Katherine M.
Publication year - 2018
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2018917137
Subject(s) - computer science , obfuscation , data science , computer security
In this paper, we describe the formatting guidelines for IJCA Journal Submission Data obfuscation (or also known as masking of data) is the process of hiding real data with random characters or data i.e. the process of protecting sensitive data from thefts and hackers. Obfuscation is applied in order to secure data that is classified as personal identifiable data, personally or commercially sensitive data. Keeping the data valid for the use of test cycles. It must also appear consistent. The objective is to protect the privacy of individuals which is getting vital for operative functioning over the internet. Privacy enforcement is being handled primarily through governments for development or testing purposes and study of various data obfuscation techniques for different applications and their comparison study using statistical parameters. In this paper, we study the comparison of various data obfuscation techniques. The results strongly suggest that replacement methods can be used across the domains starting such as finance, banking, military, health care sector, and identity management domain. Different data obfuscation models such as encryption, shuffling, substitution, and masking out are compared. General Terms Computer Science, Project Management, Decision Making, Information System
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom