НАЦИОНАЛЬНАЯ АКАДЕМИЯ НАУК АЗЕРБАЙДЖАНА
О НЕКОТОРЫХ АКТУАЛЬНЫХ ПРОБЛЕМАХ САНИТАРИЗАЦИИ ДАННЫХ
Оджагвердиева Сабира С.

В статье описываются санитаризация данных, ее цели и задачи, сферы применения, область применения и перспективы. Проанализированы технологии санитаризации данных, существующие методы, некоторые научно-теоретические и актуальные проблемы. Проделана работа, направленная на решение этой проблемы, и предложены соответствующие рекомендации и предложения (стр.99-108).

Ключевые слова:санитаризация данных, очистка данных, конфиденциальность, личная информация.
DOI : 10.25045/jpis.v10.i1.10
Литература
  • İmamverdiyev Y.N. E-dövlətin informasiya təhlükəsizliyinin idarə olunmasının konseptual modeli // İnformasiya cəmiyyəti problemləri, 2013, №1, s.20-25.
  • Azərbaycan Respublikasında informasiya cəmiyyətinin inkişafına dair 2014-2020-ci illər üçün Milli Strategiya, 2 aprel 2014-cü il, http://president.az
  • “Uşaqların zərərli informasiyadan qorunması haqqında” Azərbaycan Respublikasının Qanunu, http://president.az
  • Əliquliyev R.M. Ocaqverdiyeva S.S. Uşaqların İnternetdə informasiya təhlükəsizliyini təmin edən sistemin konseptual modeli / İnformasiya təhlükəsizliyinin aktual problemləri III respublika elmi-praktiki seminarı, Bakı, 2017, 84-87.
  • Crawford R., Bishop M., Bhumiratana B., Clark L., Levitt K. Sanitization Models and their Limitations / Proceedings of the 2006 Workshop on New Security Paradigms,  2006, pp. 41-56. 
  • Spacey J., Edqar D. Data Sanitization Techniques, https://orafaq.com/papers/data_ sanitization.pdf
  • Riley J. Understanding metadata what is metadata, and what is it for? www.niso.org/apps/group_public/download.php/17446/Understanding%20Metadata.pdf
  • Coyle K. Understanding Metadata and Its Purpose// The Journal of Academic Librarianship, Vol. 31, No. 2, pp. 160-163.
  • Shamir A. How to share a secret // Communications of the ACM, 1979, vol.22, no.11, pp. 612-613.
  • Stanley R. M. Oliveira, Osmar R. Zaiane. A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration // International Journal of Business Intelligence and Data Mining, 2006, vol.1, issue 3, pp.247-287.
  • Hughes G., Coughlin T. Tutorial on Disk Drive Data Sanitization, 2006, https://www.researchgate.net/publication/229003088
  • Chakaravarthy V.T., Gupta H., Roy P., Mohania M. Efficient techniques for document sanitization /Proceeding of the 17th ACM Conference on Information and Knowledge Mining (CIKM), 2008, pp.843-852.
  • Ivashcu M. Data erasure on magnetic storage / International conference of scientific paper afases, 2011, pp. 614-617.
  • Data Sanitization Terminology and Definitions, https://www.datasanitization.org/data-sanitization-terminology
  • Krishna A.K, Suriya M. Preventing Private Information Leakage on Social mining // International Journal of Innovative Research in Computer and Communication Engineering, 2014, vol.2, issue 1, pp. 3530-3534.
  • Wiseman L., Gordon V. Data protection: Guidelines for the use of personal data in system testing, 2009. https://www.shop.bsigroup.com/upload/Shop/Download/Books/BIP0002sample.pdf
  • Sarada G., Abitha N., Manikandan G., Sairam N. A few new approaches for data masking / International Conference on Circuits, Power and Computing, India, 2015, pp. 1-4.
  • About Data Sanitization, Redaction & Cleansing Methods, https://forensicsware.com/ blog/data-sanitization.html
  • Edqar D. Data Sanitization Techniques, https://www.orafaq.com/papers/data_sanitization.pdf
  • Ch. Deepika, Bansal P. Study on need of data sanitization and sanitization techniques for memory devices // Access International Journal of Science& Engineering, 2017, vol. 2, Issue 11, pp. 6-16.
  • Degaussing: An Introduction, https://www.veritysystems.com/degaussing-an-introduction/
  • Michael W., Laura M. Grupp, Frederick E. Spadat, Steven S. Reliably Erasing Data From Flash-Based Solid State Drives / FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies, 2011, pp. 8-21.
  • Overview of Data Masking Methods, https://www.smartbridge.com/overview-data-masking-methods
  • Violino B. The in-depth guide to data destruction, CSO Online, 2012, http://www.csoonline.com/article/2130822/it-audit/the-in-depth-guide-to-data-destruction.html
  • R.Q. Ələkbərov, M.A. Həşimov. Bulud texnologiyaları: xidmətlər, problemlər və tətbiq sahələri // İnformasiya texnologiyaları problemləri, 2016, №.1, s.3-10.
  • Cheng-Yuan Ku, Yu-Siang Chiu. A novel infrastructure for data sanitization in cloud computing / Proceedings of Technology Innovation and Industrial Management, 2013, 25-28.
  • Chakaravarthy V. T., H. Gupta, P. Roy, Mohania M. K. Efficient techniques for document sanitization / Proceeding of the 17th ACM Conference on Information and Knowledge Mining (CIKM), 2008, pp. 843-852.
  • Dasseni E., Verykios V. S., Elmagarmid A. K., Bertino E. Hiding Association Rules by Using Confidence and Support / Proc. of the 4th Information Hiding Workshop, 2001, 369-383.
  • Chandra D, Antony Roosevelt L. Sanitations To Prevent Inference Attack On Social Network Data // International Journal of Innovative Research in Science, International Conference on Engineering, 2014, vol.3, special issue 1, pp.1265-1269.