№1, 2019

SOME ACTUAL PROBLEMS OF DATA SANITIZATION
Sabira S. Ojagverdiyeva

The article explores the goals and objectives of data sanitization, its scope and application areas and prospects. Data sanitization technologies, existing methods, and some scientific-theoretical and actual problems in this field are analyzed. The implementations for the solution of this problem are analyzed, and relevant recommendations and suggestions are put forward (pp.99-108).

Keywords:data sanitization, data cleaning, confidentiality, personal data.
References
  • İmamverdiyev Y.N. E-dövlətin informasiya təhlükəsizliyinin idarə olunmasının konseptual modeli // İnformasiya cəmiyyəti problemləri, 2013, №1, s.20-25.
  • Azərbaycan Respublikasında informasiya cəmiyyətinin inkişafına dair 2014-2020-ci illər üçün Milli Strategiya, 2 aprel 2014-cü il, http://president.az
  • “Uşaqların zərərli informasiyadan qorunması haqqında” Azərbaycan Respublikasının Qanunu, http://president.az
  • Əliquliyev R.M. Ocaqverdiyeva S.S. Uşaqların İnternetdə informasiya təhlükəsizliyini təmin edən sistemin konseptual modeli / İnformasiya təhlükəsizliyinin aktual problemləri III respublika elmi-praktiki seminarı, Bakı, 2017, 84-87.
  • Crawford R., Bishop M., Bhumiratana B., Clark L., Levitt K. Sanitization Models and their Limitations / Proceedings of the 2006 Workshop on New Security Paradigms,  2006, pp. 41-56. 
  • Spacey J., Edqar D. Data Sanitization Techniques, https://orafaq.com/papers/data_ sanitization.pdf
  • Riley J. Understanding metadata what is metadata, and what is it for? www.niso.org/apps/group_public/download.php/17446/Understanding%20Metadata.pdf
  • Coyle K. Understanding Metadata and Its Purpose// The Journal of Academic Librarianship, Vol. 31, No. 2, pp. 160-163.
  • Shamir A. How to share a secret // Communications of the ACM, 1979, vol.22, no.11, pp. 612-613.
  • Stanley R. M. Oliveira, Osmar R. Zaiane. A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration // International Journal of Business Intelligence and Data Mining, 2006, vol.1, issue 3, pp.247-287.
  • Hughes G., Coughlin T. Tutorial on Disk Drive Data Sanitization, 2006, https://www.researchgate.net/publication/229003088
  • Chakaravarthy V.T., Gupta H., Roy P., Mohania M. Efficient techniques for document sanitization /Proceeding of the 17th ACM Conference on Information and Knowledge Mining (CIKM), 2008, pp.843-852.
  • Ivashcu M. Data erasure on magnetic storage / International conference of scientific paper afases, 2011, pp. 614-617.
  • Data Sanitization Terminology and Definitions, https://www.datasanitization.org/data-sanitization-terminology
  • Krishna A.K, Suriya M. Preventing Private Information Leakage on Social mining // International Journal of Innovative Research in Computer and Communication Engineering, 2014, vol.2, issue 1, pp. 3530-3534.
  • Wiseman L., Gordon V. Data protection: Guidelines for the use of personal data in system testing, 2009. https://www.shop.bsigroup.com/upload/Shop/Download/Books/BIP0002sample.pdf
  • Sarada G., Abitha N., Manikandan G., Sairam N. A few new approaches for data masking / International Conference on Circuits, Power and Computing, India, 2015, pp. 1-4.
  • About Data Sanitization, Redaction & Cleansing Methods, https://forensicsware.com/ blog/data-sanitization.html
  • Edqar D. Data Sanitization Techniques, https://www.orafaq.com/papers/data_sanitization.pdf
  • Ch. Deepika, Bansal P. Study on need of data sanitization and sanitization techniques for memory devices // Access International Journal of Science& Engineering, 2017, vol. 2, Issue 11, pp. 6-16.
  • Degaussing: An Introduction, https://www.veritysystems.com/degaussing-an-introduction/
  • Michael W., Laura M. Grupp, Frederick E. Spadat, Steven S. Reliably Erasing Data From Flash-Based Solid State Drives / FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies, 2011, pp. 8-21.
  • Overview of Data Masking Methods, https://www.smartbridge.com/overview-data-masking-methods
  • Violino B. The in-depth guide to data destruction, CSO Online, 2012, http://www.csoonline.com/article/2130822/it-audit/the-in-depth-guide-to-data-destruction.html
  • R.Q. Ələkbərov, M.A. Həşimov. Bulud texnologiyaları: xidmətlər, problemlər və tətbiq sahələri // İnformasiya texnologiyaları problemləri, 2016, №.1, s.3-10.
  • Cheng-Yuan Ku, Yu-Siang Chiu. A novel infrastructure for data sanitization in cloud computing / Proceedings of Technology Innovation and Industrial Management, 2013, 25-28.
  • Chakaravarthy V. T., H. Gupta, P. Roy, Mohania M. K. Efficient techniques for document sanitization / Proceeding of the 17th ACM Conference on Information and Knowledge Mining (CIKM), 2008, pp. 843-852.
  • Dasseni E., Verykios V. S., Elmagarmid A. K., Bertino E. Hiding Association Rules by Using Confidence and Support / Proc. of the 4th Information Hiding Workshop, 2001, 369-383.
  • Chandra D, Antony Roosevelt L. Sanitations To Prevent Inference Attack On Social Network Data // International Journal of Innovative Research in Science, International Conference on Engineering, 2014, vol.3, special issue 1, pp.1265-1269.