Implementation and Analysis of Enhanced Obfuscation Technique for Data Security
Tanuja1, Meenakshi2

1Tanuja, Department of Computer Science and Technology, Central University of Punjab, City Campus, Bathinda, India.
2Meenakshi, Department of Computer Science and Technology, Central University of Punjab, City Campus, Bathinda, India. 

Manuscript received on 01 August 2019. | Revised Manuscript received on 07 August 2019. | Manuscript published on 30 September 2019. | PP: 6107-6115 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5653098319/2019©BEIESP | DOI: 10.35940/ijrte.C5653.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: With the fast development of digital exchange of data in an electronic way, data and information security are becoming more important in both transmission and data storage. Cryptography is used as a solution which plays an important role in data and information security systems against malicious attacks. The encryption technique is used to provide confidentiality to the data during transmission because security threats are more on data during transmission than data at rest. One can also use encryption to secure user’s data at data storage (i.e., data at rest). But an encryption algorithm consumes a more amount of computing resources such as processing power, memory and computation time. Obfuscation technique is a very lightweight technique that comes into a picture to protect the data at storage from malicious attacks. There are many obfuscation techniques are available to ensure the confidentiality of the data. In this paper, an obfuscation technique has been proposed and implemented which uses a 128-bit key to improve the security of the data. The experimental results show that the time taken for obfuscation and de-obfuscation is less and also from the security point of view it provides high avalanche effect.
Keywords- Obfuscation, De-Obfuscation, Avalanche Effect, Data Security, Information Security, Cryptography, Confidentiality

Scope of the Article:
Predictive Analysis