ADAPTIVE AND AUTOMATED DATA ANONYMIZATION FRAMEWORKS FOR MULTI-CLOUD ENVIRONMENTS

Authors

  • Krupal Gangapatnam IngramMicro, USA Author

Keywords:

Data Anonymization, Multi-Cloud Security, Privacy Framework, Automated Data Masking, Regulatory Compliance

Abstract

This technical article explores the implementation of adaptive and automated data anonymization frameworks across diverse computing environments, focusing on mainframe, SAP ERP, and cloud platforms. The article examines current data security challenges, core anonymization techniques, including K-anonymity, L-diversity, and T-closeness, and the Delphix implementation framework for automated data masking. The article investigates platform-specific considerations, benefits of automation, and comprehensive monitoring systems while providing insights into immediate improvements and future developments. The findings demonstrate that robust anonymization frameworks significantly enhance data protection, operational efficiency, and compliance management across multi-cloud environments.

References

P. Ohm, "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization," 2010. Available: https://www.uclalawreview.org/pdf/57-6-3.pdf

El Emam, K., & Arbuckle, L., "Anonymizing Health Data: Case Studies and Methods to Get You Started," 2013. Available: https://www.oreilly.com/library/view/anonymizing-health-data/9781449363062/

Sweeney, L., "Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression," 2002. Available: https://dataprivacylab.org/projects/kanonymity/paper3.pdf

Duncan, G. T., Elliot, M., & Salazar-González, J. J., "Statistical Confidentiality: Principles and Practice," 2011. Available: https://link.springer.com/book/10.1007/978-1-4419-7802-8

Li, N., Li, T., & Venkatasubramanian, S., "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity," 2007. Available: https://ieeexplore.ieee.org/document/4221659

Fung, B. C., Wang, K., Chen, R., & Yu, P. S., "Privacy-preserving data publishing: A survey of recent developments," 2010. Available: https://dl.acm.org/doi/10.1145/1749603.1749605

Wells, D. et al., "Make Data Compliance Easier Across Your Enterprise," Delphix Blog, 2021. Available: https://www.delphix.com/blog/make-data-compliance-easier-across-your-enterprise

SAP HANA Cloud, "SAP HANA Database Administration Guide: Data Anonymization," SAP Help Portal, 2024. Available: https://help.sap.com/docs/hana-cloud-database/sap-hana-cloud-sap-hana-database-administration-guide/data-anonymization

Wilfred Raj, H., et al., "A Survey of Data Anonymization Techniques for Privacy-Preserving Mining in Bigdata," 2020. Available: https://thescipub.com/pdf/jcssp.2020.194.201.pdf

Shanika Wickramasinghe, "What's Data Masking? Types, Techniques & Best Practices," 2021. Available: https://www.bmc.com/blogs/data-masking/

Narayanan, A., & Shmatikov, V., "Robust de-anonymization of large datasets (how to break anonymity of the Netflix prize dataset)," 2008. Available: https://ieeexplore.ieee.org/document/4531148

Zarsky, T. Z., "Incompatible: The GDPR in the Age of Big Data," 2016. Available: https://scholarship.shu.edu/shlr/vol47/iss4/2

ISO/IEC, "ISO/IEC 20889:2018: Privacy-enhancing data de-identification terminology and classification of techniques," 2019. Available: https://www.iso.org/standard/69373.html

Dwork, C., & Roth, A., "The Algorithmic Foundations of Differential Privacy," 2014. Available: https://www.nowpublishers.com/article/Details/TCS-042

Voigt, P., & Von dem Bussche, A., "The EU General Data Protection Regulation (GDPR): A Practical Guide," 2017. Available: https://link.springer.com/book/10.1007/978-3-319-57959-7

Garfinkel, S., & Leclerc, P., "De-identification of Personal Information," 2015. Available: https://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.8053.pdf

K. Gangapatnam, "Federated Learning for Cross Cloud System Migrations: A Privacy-Preserving Approach," 2024. Available: https://ijsrcseit.com/index.php/home/article/view/CSEIT241061161/CSEIT241061161

K. Gangapatnam, “Automated Cloud Migration Strategies for Enterprise Resource Planning Systems: A Technical Analysis” 2024, Available: https://iaeme.com/MasterAdmin/Journal_uploads/IJCET/VOLUME_15_ISSUE_6/IJCET_15_06_080.pdf

Published

2025-01-09

How to Cite

Krupal Gangapatnam. (2025). ADAPTIVE AND AUTOMATED DATA ANONYMIZATION FRAMEWORKS FOR MULTI-CLOUD ENVIRONMENTS. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 8(1), 187-197. https://ijrcait.com/index.php/home/article/view/IJRCAIT_08_01_019