학술논문

Anonymization, Hashing and Data Encryption Techniques: A Comparative Case Study
Document Type
Conference
Source
2023 International Conference on Applied Mathematics & Computer Science (ICAMCS) ICAMCS Applied Mathematics & Computer Science (ICAMCS), 2023 International Conference on. :129-135 Aug, 2023
Subject
Computing and Processing
Data privacy
Data integrity
Organizations
Information filtering
Encryption
Security
Information integrity
Personal Data
Data Privacy
Data Anonymization
Hashing
Language
Abstract
The Confidentiality of Personal Data has proven to be an important concern for both individuals and organizations around the world in the present day. As a result of rising numbers of security incidents, computer hacking and illicit utilization of personal data effective techniques for preserving the confidentiality of personal data are becoming increasingly important. Three frequently implemented techniques in maintaining data privacy: Anonymization, Hashing and Data Encryption have gained in popularity as time passed. But in general, the right choice of technique relies on the particular application and the necessary degree of integrity and confidentiality of data. In this study, a detailed examination of several anonymization, hashing, and encryption techniques are described. Each technique's strengths and weaknesses will be addressed, as well as recommendations and best practices when using each technique in a variety of situations, based on experimental healthcare data.