Tagged articles
52 articles
Page 1 of 1
dbaplus Community
dbaplus Community
Apr 9, 2026 · Information Security

Designing Practical Encrypted Storage for Sensitive User Data

This article explains why encrypting sensitive fields like passwords, phone numbers, and ID numbers is essential, details a balanced approach using AES‑GCM encryption, HMAC indexes, and masked fields, and shares real‑world lessons from implementing the solution in a production system.

AES-GCMDatabase designHMAC
0 likes · 21 min read
Designing Practical Encrypted Storage for Sensitive User Data
Alibaba Cloud Observability
Alibaba Cloud Observability
Jan 19, 2026 · Information Security

How AI Companies Can Overcome Global Compliance Hurdles with Cloud‑Native Log Auditing

The article explains the complex data‑sovereignty and privacy regulations that AI enterprises face when expanding overseas, analyzes the three‑tier "sandwich" data architecture and regional regulatory differences, and demonstrates how Alibaba Cloud Log Service (SLS) and Cloud Monitoring 2.0 provide unified log collection, cross‑domain correlation, risk tracing, and masking functions to achieve continuous, scalable compliance.

AIcloud-nativecompliance
0 likes · 16 min read
How AI Companies Can Overcome Global Compliance Hurdles with Cloud‑Native Log Auditing
Alibaba Cloud Observability
Alibaba Cloud Observability
Sep 15, 2025 · Information Security

How Alibaba Cloud’s New mask Function Boosts Log Data Security and Performance

This article explains why data desensitization is now a compliance must‑have, reviews Alibaba Cloud Log Service’s existing masking pipelines, introduces the new mask function with its keyword and built‑in modes, compares its performance against regex solutions, and showcases three real‑world use cases covering transaction logs, large‑model interactions, and Nginx URI parameters.

AILog ProcessingSLS
0 likes · 12 min read
How Alibaba Cloud’s New mask Function Boosts Log Data Security and Performance
FunTester
FunTester
Sep 10, 2025 · Information Security

How Data Masking Protects Privacy: Techniques, Stages, and Future Challenges

This article explains data masking (data desensitization), its importance for privacy and compliance, outlines the four implementation stages, compares common masking techniques, and discusses the challenges and future directions for secure data handling in development and testing.

Data ProtectionGDPRdata masking
0 likes · 7 min read
How Data Masking Protects Privacy: Techniques, Stages, and Future Challenges
Alibaba Cloud Native
Alibaba Cloud Native
Sep 10, 2025 · Information Security

How Alibaba Cloud SLS’s New mask Function Simplifies Large‑Scale Log Desensitization

In the AI era, massive interaction data drives rapid smart‑app growth, but personal privacy risks demand robust data‑masking; Alibaba Cloud Log Service (SLS) introduces a versatile mask function that replaces complex regex pipelines with concise configurations, boosting performance, reducing maintenance, and meeting strict compliance such as GDPR and China’s Personal Information Protection Law.

Cloud NativeLog ProcessingSLS
0 likes · 12 min read
How Alibaba Cloud SLS’s New mask Function Simplifies Large‑Scale Log Desensitization
Architect
Architect
Sep 8, 2025 · Information Security

Mask Sensitive Data in Java with YAML Rules – A Step‑by‑Step Guide

This article demonstrates a practical approach to data desensitization in Java applications by storing masking rules in YAML files, loading them into maps, and recursively applying regex‑based transformations to nested response structures without using AOP annotations, complete with sample code and execution results.

Javadata maskingdesensitization
0 likes · 22 min read
Mask Sensitive Data in Java with YAML Rules – A Step‑by‑Step Guide
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 27, 2025 · Backend Development

5 Powerful Techniques to Mask Sensitive Fields in Spring Boot 3

This article explains why masking sensitive data such as ID numbers, phone numbers, and bank cards is essential, then demonstrates five practical Spring Boot 3 solutions—including custom JsonSerializer, Jackson modules, AOP, ResponseBodyAdvice, and JsonFilter—complete with code examples and output screenshots.

JacksonSpring Bootaop
0 likes · 8 min read
5 Powerful Techniques to Mask Sensitive Fields in Spring Boot 3
IT Services Circle
IT Services Circle
May 20, 2025 · Information Security

Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity

This article presents six practical data‑desensitization methods—including string replacement, encryption, database masking, cache‑based replacement, dynamic AOP masking, and K‑anonymity—explains their principles, shows Java implementations, compares security, performance, and reversibility, and offers concrete recommendations for protecting sensitive fields such as phone numbers and ID cards.

Securitydata maskingencryption
0 likes · 8 min read
Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity
Su San Talks Tech
Su San Talks Tech
May 17, 2025 · Information Security

6 Practical Data Masking Techniques to Secure Sensitive Information

This article presents six widely used data masking solutions—from simple regex string replacement to advanced K‑anonymity—detailing their principles, Java implementations, pros and cons, performance impact, and suitable application scenarios, helping developers protect sensitive data in production and test environments.

data maskingencryptioninformation security
0 likes · 10 min read
6 Practical Data Masking Techniques to Secure Sensitive Information
Architecture Digest
Architecture Digest
Apr 24, 2025 · Backend Development

Configurable Data Desensitization in Spring Boot Using Custom Annotations and Serializer

This article demonstrates how to create a configurable data‑masking solution for Spring Boot APIs by defining a custom @DataMasking annotation, implementing masking strategies, building a custom Jackson serializer, integrating it via an AnnotationIntrospector, and testing the functionality with a sample controller.

Custom AnnotationJavaSerializer
0 likes · 8 min read
Configurable Data Desensitization in Spring Boot Using Custom Annotations and Serializer
IT Architects Alliance
IT Architects Alliance
Mar 29, 2025 · Information Security

Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison

The article explains why data masking is essential for protecting sensitive information, then details three implementation methods—SQL, Java (with open‑source plugins), and the MyBatis‑Mate‑Sensitive‑Jackson ORM extension—comparing their principles, code examples, advantages, limitations, performance, suitable scenarios, and cost considerations.

JavaMyBatisSQL
0 likes · 17 min read
Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison
Code Ape Tech Column
Code Ape Tech Column
Mar 8, 2025 · Information Security

Enterprise Data Desensitization Solutions Using MyBatis and Fastjson

The article explains why data desensitization is essential for enterprises, classifies common masking techniques, and provides concrete implementation guides for database, log, and output level masking in Java applications using MyBatis plugins and Fastjson filters, complete with sample code and configuration.

Backend SecurityJavaMyBatis
0 likes · 12 min read
Enterprise Data Desensitization Solutions Using MyBatis and Fastjson
Su San Talks Tech
Su San Talks Tech
Jan 19, 2025 · Information Security

How Data Masking Protects Sensitive Information: Techniques and Best Practices

This article explains data masking techniques—including static (SDM) and dynamic (DDM) methods—detailing how to protect sensitive fields like phone numbers and IDs through replacement, truncation, encryption, randomization, and other schemes, while preserving data utility for testing and analysis.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques and Best Practices
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Nov 5, 2024 · Backend Development

Solve Long Precision Loss in Spring Boot 3 with Jackson and Custom Annotations

This article demonstrates how to handle Java Long precision loss in Spring Boot 3 front‑end displays, configures Jackson to serialize Long as String, uses @JsonValue for single‑property serialization, and creates custom annotations with a SensitiveSerializer for data masking, complete with code examples and screenshots.

Custom AnnotationJacksonLong precision
0 likes · 9 min read
Solve Long Precision Loss in Spring Boot 3 with Jackson and Custom Annotations
dbaplus Community
dbaplus Community
Oct 13, 2024 · Databases

Master MySQL Data Masking: Percona Plugin & Custom Functions Guide

Learn how to protect sensitive information in MySQL by installing the open‑source Percona data_masking plugin, verifying its status, and using built‑in and custom masking functions for IDs, phone numbers, emails, names, amounts, and addresses, with step‑by‑step SQL examples.

PerconaSQLdata masking
0 likes · 7 min read
Master MySQL Data Masking: Percona Plugin & Custom Functions Guide
macrozheng
macrozheng
Sep 5, 2024 · Information Security

How to Automatically Mask Sensitive Data in Spring Boot with Jackson Annotations

This article explains how to implement unified data desensitization in Java Spring Boot applications by creating custom annotations, enums, serializers, and utility methods that automatically mask personal information during JSON serialization, complete with code examples and test results.

Backend DevelopmentJacksonJava
0 likes · 13 min read
How to Automatically Mask Sensitive Data in Spring Boot with Jackson Annotations
Selected Java Interview Questions
Selected Java Interview Questions
Jul 20, 2024 · Backend Development

Introduction and Usage Guide for MyBatis-Mate: Enterprise Features for MyBatis-Plus

This article introduces MyBatis-Mate, an official MyBatis‑Plus extension offering enterprise‑level capabilities such as dictionary binding, field encryption, data masking, dynamic DDL maintenance, sharding, multi‑datasource switching, performance logging, and data permission control, with detailed Spring Boot integration examples.

BackendJavaMyBatis
0 likes · 15 min read
Introduction and Usage Guide for MyBatis-Mate: Enterprise Features for MyBatis-Plus
Top Architect
Top Architect
Apr 15, 2024 · Backend Development

Implementing Data Masking in SQL, Java, and MyBatis‑Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers, ID cards, and personal information using SQL string functions, a Java library (sensitive‑plus), and the MyBatis‑Mate Sensitive Jackson plugin, providing complete code examples, configuration files, and test results for backend developers.

Backend DevelopmentJavaMyBatis
0 likes · 11 min read
Implementing Data Masking in SQL, Java, and MyBatis‑Mate Sensitive Jackson
Su San Talks Tech
Su San Talks Tech
Apr 5, 2024 · Information Security

How Data Masking Protects Sensitive Information: Techniques & Best Practices

This article explains why personal data leaks happen, defines data masking (desensitization), compares static and dynamic masking, and details six common masking techniques—invalidating, randomization, replacement, symmetric encryption, averaging, and offsetting—to help developers safeguard privacy.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques & Best Practices
Yum! Tech Team
Yum! Tech Team
Feb 6, 2024 · Information Security

Log Data Masking Solution for Java Spring Applications

This article analyzes the growing risk of personal data leakage, defines data masking, compares common log‑masking techniques, and presents a comprehensive Java‑Spring solution that combines annotation‑based marking, custom Jackson serializers, and extended SLF4J methods to achieve precise, low‑overhead log masking.

data maskinglog maskingslf4j
0 likes · 8 min read
Log Data Masking Solution for Java Spring Applications
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 8, 2024 · Databases

AIKOS Open Source Community Weekly Newsletter – SQLE Release, Community Updates, and Selected Database Articles

This newsletter announces the SQLE 3.2401.0-pre1 release with automatic data masking, shares recent community development work, outlines upcoming plans, and curates several technical articles covering MySQL EXPLAIN enhancements, transaction fundamentals, hardware considerations for database stability, consistent backup techniques, and efficient JDBC connection testing.

SQLSQLEcommunity
0 likes · 6 min read
AIKOS Open Source Community Weekly Newsletter – SQLE Release, Community Updates, and Selected Database Articles
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Oct 7, 2023 · Information Security

Secure API Responses with Data Masking, Encryption, and Jackson Annotations

This article explains practical methods to protect sensitive API data in Spring Boot applications, covering encryption, masking, access control, logging, HTTPS, and database security, and demonstrates three implementation approaches: SQL‑level masking, field‑level encryption, and custom Jackson serialization using annotations and a contextual serializer.

API SecurityJacksonJava
0 likes · 8 min read
Secure API Responses with Data Masking, Encryption, and Jackson Annotations
Weimob Technology Center
Weimob Technology Center
Jul 25, 2023 · Information Security

How to Secure Data: Practical Guide to Masking and Encryption Strategies

This comprehensive guide explains why modern enterprises must shift from network‑centric protection to data‑centric security, detailing practical approaches for data masking and storage encryption, evaluating regulatory requirements, outlining solution selection, and providing step‑by‑step implementation practices to safeguard sensitive information.

compliancedata maskingdata security
0 likes · 29 min read
How to Secure Data: Practical Guide to Masking and Encryption Strategies
HomeTech
HomeTech
Jun 21, 2023 · Information Security

Transparent Data Masking with AutoProxy Middleware at AutoHome

This article describes AutoHome's data security challenges in the big‑data era and explains how the self‑developed AutoProxy encryption middleware provides transparent, compliant data masking across legacy and new sensitive data, reducing cost, improving performance, and enabling automated masking workflows.

Transparent Encryptionauto-proxycompliance
0 likes · 8 min read
Transparent Data Masking with AutoProxy Middleware at AutoHome
Top Architect
Top Architect
Sep 13, 2022 · Information Security

Implementing Data Masking in MySQL and Java with MyBatis-Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers and ID cards using SQL functions, introduces Java masking libraries, and provides a complete MyBatis-Mate Sensitive Jackson example with configuration, custom strategies, entity annotations, controller endpoints, and sample responses.

JavaMyBatisSQL
0 likes · 11 min read
Implementing Data Masking in MySQL and Java with MyBatis-Mate Sensitive Jackson
Liangxu Linux
Liangxu Linux
Aug 28, 2022 · Information Security

10 Proven Strategies to Secure API Data: Encryption, Signing, Tokens & More

This article outlines ten practical methods to secure API data, covering encryption of transmission, digital signing, token authentication, timestamp and nonce replay protection, rate limiting, blacklist/whitelist controls, data masking, and parameter validation, with detailed explanations and implementation steps.

API SecurityParameter Validationdata masking
0 likes · 13 min read
10 Proven Strategies to Secure API Data: Encryption, Signing, Tokens & More
Architect
Architect
Jul 28, 2022 · Information Security

Implementing Data Masking in MySQL and Java Using MyBatis‑Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers, ID cards, and emails in MySQL and Java applications by combining SQL string functions with the MyBatis‑Mate Sensitive Jackson plugin, providing complete configuration, custom strategies, and runnable Spring Boot examples.

JavaMyBatisSQL
0 likes · 9 min read
Implementing Data Masking in MySQL and Java Using MyBatis‑Mate Sensitive Jackson
Architect
Architect
Jul 19, 2022 · Information Security

Custom Logback Desensitization Component: Configuration and Usage Guide

This article introduces a Logback desensitization component for Java applications, explains two common masking approaches, compares their pros and cons, and provides step‑by‑step instructions—including Maven dependency, appender replacement, YAML configuration, supported data types, matching rules, custom regex, and jar installation—to securely mask sensitive information in logs.

Securitydata maskingdesensitization
0 likes · 12 min read
Custom Logback Desensitization Component: Configuration and Usage Guide
Top Architect
Top Architect
Jul 13, 2022 · Backend Development

Configurable Data Masking in Spring Boot Using Custom Annotations and Jackson

This article demonstrates how to implement a flexible data‑masking solution for sensitive fields in Spring Boot APIs by defining a custom annotation, creating a serializer, integrating it with Jackson via an AnnotationIntrospector, configuring the ObjectMapper, and applying the annotation to domain objects.

Backend DevelopmentCustom AnnotationJackson
0 likes · 7 min read
Configurable Data Masking in Spring Boot Using Custom Annotations and Jackson
ITPUB
ITPUB
Jul 4, 2022 · Information Security

10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More

This article outlines ten practical methods for protecting API data, covering transmission encryption, digital signatures, token authentication, timestamp and nonce mechanisms, rate limiting, blacklist/whitelist controls, data masking, and parameter validation to ensure comprehensive interface security.

API SecurityParameter Validationdata masking
0 likes · 14 min read
10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More

Building a Scalable Data Masking and Mock Service for Warehouse Testing

This article explains how to design and implement a data‑masking service that also provides mock data generation for data‑warehouse testing, covering the architecture, pain points, masking principles, workflow, evolution into a warehouse mock service, practical scenarios, and the significant efficiency and cost benefits achieved.

Big DataData Warehousedata masking
0 likes · 12 min read
Building a Scalable Data Masking and Mock Service for Warehouse Testing
DataFunSummit
DataFunSummit
May 24, 2022 · Information Security

Data Masking Techniques and Their Applications in Enterprise Data Security

This article explains the importance of data security under emerging privacy laws and provides a comprehensive overview of data masking concepts, common technical methods, typical enterprise scenarios—including static, database, and application-level masking—and strategic considerations for balancing business needs with privacy protection.

anonymizationdata maskinginformation security
0 likes · 12 min read
Data Masking Techniques and Their Applications in Enterprise Data Security
Code Ape Tech Column
Code Ape Tech Column
May 16, 2022 · Information Security

Data Masking with Sharding-JDBC: Concepts, Configuration, and Custom Encryptors

This article explains how Sharding-JDBC can perform data masking at the persistence layer, detailing key concepts, configuration of data sources, encryptors, and tables, demonstrating practical examples with built‑in MD5 and AES encryptors, and showing how to implement custom encryptors and query‑assisted encryption for enhanced security.

Custom EncryptorDatabase SecuritySharding-JDBC
0 likes · 20 min read
Data Masking with Sharding-JDBC: Concepts, Configuration, and Custom Encryptors
NetEase LeiHuo UX Big Data Technology
NetEase LeiHuo UX Big Data Technology
May 9, 2022 · Information Security

Data Masking (Data Desensitization) Strategies and Techniques

In the era of big data, protecting sensitive information through static and dynamic data masking techniques—such as nullification, randomization, substitution, symmetric encryption, averaging, and offset—ensures data security while preserving usability for development, testing, and analytics.

Dynamic Maskingdata maskingdata security
0 likes · 8 min read
Data Masking (Data Desensitization) Strategies and Techniques
Code Ape Tech Column
Code Ape Tech Column
Sep 3, 2021 · Backend Development

Data Desensitization Techniques for Configuration Files, API Responses, and Log Files in Spring Boot

This article explains how to protect sensitive information in Spring Boot applications by encrypting configuration files with jasypt‑spring‑boot, masking API response fields using a custom Jackson annotation, and filtering log output with a custom Log4j2 PatternLayout, providing complete code examples for each method.

JacksonJasyptSpring Boot
0 likes · 16 min read
Data Desensitization Techniques for Configuration Files, API Responses, and Log Files in Spring Boot
Java Architecture Diary
Java Architecture Diary
Sep 2, 2021 · Backend Development

Master MyBatis‑Mate: Dictionary Binding, Encryption, Sharding & Data Scope Explained

This guide introduces MyBatis‑Mate’s core capabilities—including dictionary binding, field encryption, data masking, automatic DDL maintenance, dynamic sharding, and data‑scope permissions—while providing Maven dependencies and complete Java code examples for integrating these features into Spring Boot applications.

BackendData PermissionJava
0 likes · 8 min read
Master MyBatis‑Mate: Dictionary Binding, Encryption, Sharding & Data Scope Explained
Su San Talks Tech
Su San Talks Tech
Apr 21, 2021 · Information Security

How Data Masking Protects Sensitive Information: Techniques & Best Practices

This article explains what data masking (also called data de‑identification) is, why it is essential for protecting personal data in sectors like finance and healthcare, and details static and dynamic masking methods along with common techniques such as truncation, randomization, replacement, encryption, averaging and offsetting.

DDMSDMdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques & Best Practices
macrozheng
macrozheng
Dec 17, 2020 · Information Security

How Data Masking Protects Your Users: Techniques & Best Practices

Data masking, also known as data desensitization, transforms sensitive information such as phone numbers and ID numbers using static and dynamic methods—including truncation, randomization, replacement, encryption, and averaging—to prevent privacy breaches while preserving data utility for testing, analysis, and production environments.

Dynamic Maskingdata anonymizationdata masking
0 likes · 9 min read
How Data Masking Protects Your Users: Techniques & Best Practices
JD Tech Talk
JD Tech Talk
Sep 5, 2019 · Information Security

Comprehensive Solution for Data Masking with Apache ShardingSphere (Part 2)

This article explains how to use Apache ShardingSphere's data‑masking (encryption) features to protect both new and existing MySQL/Oracle/PostgreSQL/SQLServer workloads, providing detailed YAML configurations, migration steps, advantages, applicable scenarios, and limitations for secure database operations.

Database SecurityEncrypt-JDBCShardingSphere
0 likes · 12 min read
Comprehensive Solution for Data Masking with Apache ShardingSphere (Part 2)
dbaplus Community
dbaplus Community
Aug 22, 2019 · Information Security

Transparent Data Masking with Apache ShardingSphere for New and Legacy Apps

Apache ShardingSphere provides a complete, transparent, low‑cost data masking solution that lets both new and existing applications encrypt sensitive fields without modifying business SQL, using Encrypt‑JDBC or Encrypt‑Proxy, configurable encryption rules, and step‑by‑step migration guidance for seamless, secure database transformations.

Database SecurityEncrypt-JDBCShardingSphere
0 likes · 19 min read
Transparent Data Masking with Apache ShardingSphere for New and Legacy Apps
JD Tech Talk
JD Tech Talk
Aug 14, 2019 · Information Security

Apache ShardingSphere Data Masking: Architecture, Scenarios, and Implementation Details

This article explains how Apache ShardingSphere provides a comprehensive, transparent, and low‑cost data masking solution for both new and existing applications, detailing the background, use‑case scenarios, architecture, masking rules, and processing flow that enable secure encryption and decryption without modifying business logic.

ShardingSpheredata masking
0 likes · 10 min read
Apache ShardingSphere Data Masking: Architecture, Scenarios, and Implementation Details
Meituan Technology Team
Meituan Technology Team
May 17, 2018 · Information Security

Data Security Practices and Solutions at Meituan: Application Systems and Data Warehouse

Meituan‑Dianping’s Information Security Center combats data leakage by deploying multi‑layered safeguards—device fingerprinting, CAPTCHAs, behavior‑based crawler detection, robust watermarking, honey‑pot datasets, UEBA analytics, and advanced masking, tokenization, privacy‑preserving techniques, asset mapping, and automated database scanning—to protect both application systems and its massive data‑warehouse environment.

Application SecurityUEBAdata masking
0 likes · 18 min read
Data Security Practices and Solutions at Meituan: Application Systems and Data Warehouse
21CTO
21CTO
Jan 8, 2018 · Backend Development

Mastering WebSocket: Handshake, Data Frames & Node.js Examples

This article provides a comprehensive guide to WebSocket, covering its purpose, connection establishment, handshake process, data frame structure, masking algorithm, security considerations, and includes practical Node.js server and client code examples to illustrate real‑time bidirectional communication.

HandshakeNode.jsWebSocket
0 likes · 22 min read
Mastering WebSocket: Handshake, Data Frames & Node.js Examples