학술논문
Anonymization, Hashing and Data Encryption Techniques: A Comparative Case Study
Document Type
Conference
Author
Source
2023 International Conference on Applied Mathematics & Computer Science (ICAMCS) ICAMCS Applied Mathematics & Computer Science (ICAMCS), 2023 International Conference on. :129-135 Aug, 2023
Subject
Language
Abstract
The Confidentiality of Personal Data has proven to be an important concern for both individuals and organizations around the world in the present day. As a result of rising numbers of security incidents, computer hacking and illicit utilization of personal data effective techniques for preserving the confidentiality of personal data are becoming increasingly important. Three frequently implemented techniques in maintaining data privacy: Anonymization, Hashing and Data Encryption have gained in popularity as time passed. But in general, the right choice of technique relies on the particular application and the necessary degree of integrity and confidentiality of data. In this study, a detailed examination of several anonymization, hashing, and encryption techniques are described. Each technique's strengths and weaknesses will be addressed, as well as recommendations and best practices when using each technique in a variety of situations, based on experimental healthcare data.