Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Tokenization as a data security technique

Treść / Zawartość
Warianty tytułu
Języki publikacji
Nowadays, organisations, especially those which embrace the modern cloud computing technology, are facing the complex challenge of securing their data assets while providing modern IT services. Classical solutions for ensuring data security have consistent limitations in modern platforms due to factors like data sharing requirements, multi-tenancy, dynamic environment, high availability and reliability requirements, etc. One approach to address this problem is to implement encryption mechanisms which will provide the required security, but they depend on substantial investments in hardware and/or software and add supplementary complexity to those systems. This article analyses tokenization as an alternative strategy for ensuring data security in modern cloud computing systems by implementing mechanisms to hide sensitive data and restrict access to it. Tokenization systems are more easy to implement and can be used extensively for ensuring data security in IT systems.
Opis fizyczny
Bibliogr 15 poz., wykr.
  • Regional Department of Defense Resources Management Studies, Brașov, Romania
  • 1. Care, J., Litan, A. (2016), Hype Cycle for Application Security, Gartner.
  • 2. Chunming Tang, X.H. (2012), An efficient key distribution scheme in cloud computing, „Cloud Computing Technology and Science, CloudCom.
  • 3. Cloud Security Alliance (2015), Quantum-Safe Security Working Group, Cloud Security Alliance.
  • 4. Cloud Security Alliance (2016), The Treacherous 12 Cloud Computing Top Threats in 2016, Cloud Security Alliance,
  • 5. Dimensional Research (2015), The state of data privacy in 2015. A survey of IT professionals.
  • 6. Jonathan Care, R.K. (2015), Market Guide for Merchant/Acquirer Tokenization of Payment Card Data, Gartner,
  • 7. Maha Tebaa, S.E. (2013), Secure Cloud Computing through Homomorphic Encryption, „International Journal of Advancements in Computing Technology”, p. 29–38.
  • 8. Ogîgău-Neamțiu, F. (2015), Cryptographic Key Management In Cloud Computing, „Defense Resources Management In The 21st Century”, Brașov : National Defense University „Carol I” Publishing House, p. 225–229.
  • 9. Oracle (2013), Data Masking Best Practice, Oracle.
  • 10. Panmore Institute (2016), The CIA triad, [access: 9.09.2016].
  • 11. PCI Data Security Standards (2011), PCI Data Security Standard (PCI DSS), v2.0., Tokenization Taskforce PCI Security Standards Council,
  • 12. Poonkodi, S., Kavitha, V., Suresh, K. (2013), Providing a secure data forwarding in cloud storage system using threshold proxy re-encryption scheme, „International Journal of Emerging Technology and Advanced Engineering”, p. 468–472.
  • 13. Salesforce (2016), Why Move To The Cloud? 10 Benefits Of Cloud Computing, [access: 9.09.2016].
  • 14. TechTarget (2016a), Data masking best practices for protecting sensitive information, [access: 10.09.2016].
  • 15. TechTarget (2016b), What is data masking, [access: 10.09.2016].
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę (zadania 2017).
Typ dokumentu
Identyfikator YADDA
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.