<s>
Data-centric	B-General_Concept
security	I-General_Concept
is	O
an	O
approach	O
to	O
security	O
that	O
emphasizes	O
the	O
dependability	O
of	O
the	O
data	O
itself	O
rather	O
than	O
the	O
security	O
of	O
networks	B-Architecture
,	O
servers	B-Application
,	O
or	O
applications	O
.	O
</s>
<s>
Data-centric	B-General_Concept
security	I-General_Concept
is	O
evolving	O
rapidly	O
as	O
enterprises	O
increasingly	O
rely	O
on	O
digital	O
information	O
to	O
run	O
their	O
business	O
and	O
big	B-Application
data	I-Application
projects	O
become	O
mainstream	O
.	O
</s>
<s>
Data-centric	B-General_Concept
security	I-General_Concept
also	O
allows	O
organizations	O
to	O
overcome	O
the	O
disconnect	O
between	O
IT	O
security	O
technology	O
and	O
the	O
objectives	O
of	O
business	O
strategy	O
by	O
relating	O
security	O
services	O
directly	O
to	O
the	O
data	O
they	O
implicitly	O
protect	O
;	O
a	O
relationship	O
that	O
is	O
often	O
obscured	O
by	O
the	O
presentation	O
of	O
security	O
as	O
an	O
end	O
in	O
itself	O
.	O
</s>
<s>
Common	O
processes	O
in	O
a	O
data-centric	B-General_Concept
security	I-General_Concept
model	O
include	O
:	O
</s>
<s>
Encryption	O
is	O
a	O
proven	O
data-centric	O
technique	O
to	O
address	O
the	O
risk	O
of	O
data	O
theft	O
in	O
smartphones	O
,	O
laptops	O
,	O
desktops	O
and	O
even	O
servers	B-Application
,	O
including	O
the	O
cloud	O
.	O
</s>
<s>
Data	B-General_Concept
Masking	I-General_Concept
is	O
the	O
process	O
of	O
hiding	O
specific	O
data	O
within	O
a	O
database	O
table	O
or	O
cell	O
to	O
ensure	O
that	O
data	B-General_Concept
security	I-General_Concept
is	O
maintained	O
and	O
that	O
sensitive	O
information	O
is	O
not	O
exposed	O
to	O
unauthorized	O
personnel	O
.	O
</s>
<s>
Data	B-General_Concept
masking	I-General_Concept
can	O
be	O
achieved	O
multiple	O
ways	O
:	O
by	O
duplicating	O
data	O
to	O
eliminate	O
the	O
subset	O
of	O
the	O
data	O
that	O
needs	O
to	O
be	O
hidden	O
,	O
or	O
by	O
obscuring	O
the	O
data	O
dynamically	O
as	O
users	O
perform	O
requests	O
.	O
</s>
<s>
Monitoring	O
all	O
activity	O
at	O
the	O
data	O
layer	O
is	O
a	O
key	O
component	O
of	O
a	O
data-centric	B-General_Concept
security	I-General_Concept
strategy	O
.	O
</s>
<s>
Cloud	B-Architecture
computing	I-Architecture
is	O
an	O
evolving	O
paradigm	O
with	O
tremendous	O
momentum	O
,	O
but	O
its	O
unique	O
aspects	O
exacerbate	O
security	O
and	O
privacy	O
challenges	O
.	O
</s>
<s>
Heterogeneity	O
and	O
diversity	O
of	O
cloud	B-Architecture
services	I-Architecture
and	O
environments	O
demand	O
fine-grained	O
access	O
control	O
policies	O
and	O
services	O
that	O
should	O
be	O
flexible	O
enough	O
to	O
capture	O
dynamic	O
,	O
context	O
,	O
or	O
attribute-based	O
access	O
requirements	O
and	O
data	O
protection	O
.	O
</s>
