0% found this document useful (0 votes)
3 views2 pages

Secure Arch

arch

Uploaded by

selma.benali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views2 pages

Secure Arch

arch

Uploaded by

selma.benali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Effective Strategies to Safeguard PII Data in Data Pipeline Workloads

Page | 1
# Feature Deterministic Probabilistic Hashing Masking
Encryption Encryption
1 Definition Always produces the Generates different Converts input into Replaces sensitive data
same encrypted encrypted outputs a fixed-size string of with random or
output for a given for the same input. characters. pseudorandom values.
input.
2 Reversibility Fully reversible with Generally reversible Irreversible; the Irreversible; original
access to the with access to original input data cannot be
encryption key. decryption key, but cannot be derived reconstructed.
not always from the hash.
guaranteed.
3 Use Cases Useful for searching Suitable for Securely storing Data masking for non-
and joining protecting data passwords, digital production
encrypted data. where uniqueness is signatures, and environments, like test
not critical. integrity and development.
verification.
4 Examples Format-preserving RSA encryption, SHA-256, MD5, Partial masking
encryption (FPE) probabilistic bcrypt. (showing only a portion
algorithms. encryption schemes. of data) or full masking
(complete data
replacement).
5 Security Depends on the Offers varying levels Highly secure for Provides data
Strength strength of the of security, cryptographic obfuscation but does
encryption depending on the hashing, resistant to not offer cryptographic
algorithm and key encryption reverse engineering. security.
management. algorithm.
6 Performance Typically has a May have higher Efficient and fast, May introduce
Impact minimal computational suitable for hashing performance overhead,
performance impact. overhead due to large datasets. depending on masking
probabilistic nature. complexity.
7 Use-case Encrypting fields in Protecting sensitive Verifying data Concealing PII in
databases for information in non- integrity and environments where
consistent querying. database storage. storing credentials. real data isn't needed.

Page | 2

You might also like