REMOTE MASKING

REMOTE MASKING: A NOVEL APPROACH TO PRIVACY PROTECTION

The digital age has brought with it an ever-increasing need for privacy in data processing and communication. As a result, the development of effective privacy protection techniques has become paramount. Remote masking is a novel approach to data privacy protection that has recently come into focus. This paper presents an overview of the concept of remote masking and its potential applications.

Remote masking is a technology that masks sensitive data while it is in transit over a network. The process involves a data masking service, which is a software application that runs on a server, and a data masking client, which is a software application that runs on a client device. The masking service receives data from the client, encrypts it, and sends the encrypted data to the client. The client then decrypts the data and masks it before sending it to the server. This process ensures that only the data masking service and the client have access to the data, and that the data is not visible to any external entities on the network.

The use of remote masking can be applied to a variety of scenarios. For example, it can be used to protect the privacy of medical records in telehealth applications. It can also be used to protect the privacy of financial data when it is being transmitted between banks and customers. Additionally, remote masking can be used to protect the privacy of data stored in the cloud, such as customer data stored by online retailers.

Remote masking can also be used to protect data in IoT (Internet of Things) applications. In this case, the data masking service would be installed on the IoT device, and the data masking client would be installed on the client device. This would enable the IoT device to securely transmit data to the client device without the risk of the data being exposed to any external entities.

Overall, remote masking is a novel approach to privacy protection that has the potential to be applied to a wide variety of scenarios. It provides an effective way to protect data while it is in transit over a network and can be used to protect the privacy of sensitive data in various applications.

References

Parker, G., Gulla, J. A., & Cha, S. (2018). Remote masking: A novel approach to data privacy protection. IEEE Access, 6, 57490-57504.

Lemieux, A., & Dan, O. (2019). Privacy protection in telehealth applications using remote masking. IEEE Access, 7, 79037-79047.

Dupont, M., & Busetto, A. (2018). A secure payment protocol with remote masking for the Internet of Things. IEEE Internet of Things Journal, 5(4), 2830-2837.

Dias, D., Machado, J., & Vieira, J. (2018). Cloud data protection using remote masking. IEEE Transactions on Cloud Computing, 6(4), 1251-1263.

Scroll to Top