Skip to content

Privacera Encryption Gateway (PEG) Overview

Privacera Encryption Gateway (PEG) is a centralized encryption and vaultless tokenization service designed to seamlessly integrate with modern data platforms, cloud-native applications, and analytics tools. Vaultless tokenization refers to the use of format-preserving encryption (FPE) to securely transform sensitive data without relying on a traditional token vault. PEG provides secure, policy-based encryption for sensitive data across both structured and semi-structured formats.

PEG is a stateless encryption service that enables data security teams to enforce field-level encryption, masking, and tokenization across data platforms such as Databricks, Snowflake, Redshift, and more. It is designed to meet enterprise security requirements while being scalable and developer-friendly.

Core Capabilities

What is Vaultless Tokenization? Vaultless tokenization refers to the process of transforming sensitive data (e.g., PII, credit card numbers) into secure tokens using format-preserving encryption (FPE) without storing the original values in a central token vault. This approach improves scalability, reduces latency, and eliminates risks related to vault compromise or availability.

  • Vaultless Tokenization: Secure format-preserving encryption (FPE) without a central vault
  • Support for Multiple Encryption Modes:
    • Native encryption: Performed at the client or connector level
    • Remote encryption: Performed at the PEG server level
  • Presentation Schemes: Allow obfuscation of decrypted values using presentation formats (e.g., partial reveal)
  • Masking: Redact or nullify sensitive values for specific user roles
  • User and Role-based Access Control: Policies enforced via Ranger and Privacera Portal
  • Integration Interfaces: REST API, UDFs, CLI tools, and pipeline processors

Architecture Overview

PEG consists of two main components:

  1. PEG Server

    • Performs encryption, decryption, and masking
    • Enforces scheme-based permissions via JWT and impersonation
    • Integrated with Ranger for policy management
  2. Scheme Server

    • Manages the lifecycle of encryption, presentation, and masking schemes
sequenceDiagram
    title PEG Architecture Flow

    participant User

    %% Group PEG Server and RangerPlugin together
    box Privacera Runtime #E3F4FF
    participant PEG Server
    participant RangerPlugin
    end

    participant Scheme Server

    User->>PEG Server: Request encrypt/decrypt/mask
    PEG Server->>Scheme Server: Fetch scheme details
    Scheme Server-->>PEG Server: Return scheme details
    PEG Server->>RangerPlugin: Validate user permissions
    RangerPlugin-->>PEG Server: Permission status
    PEG Server-->>User: Encrypted/Decrypted/Masked data

Benefits

  • Centralized Policy Enforcement: Ensure consistent data protection across platforms
  • Performance: PEG is stateless and horizontally scalable, ensuring low-latency encryption
  • Developer-Friendly: Exposed via APIs, CLI, and connectors
  • Security: No sensitive data stored. Operations are logged and auditable
  • Compliance-Ready: Aligns with regulatory needs (HIPAA, GDPR, CCPA, etc.)

Where PEG Is Used

PEG can be used directly or via integrations with the following systems:

  • Databricks: Via UDFs and masking policies
  • Snowflake and Redshift: Via tokenization connectors
  • File-based CLI workflows: Via FEU
  • Discovery workflows: For compliance automation

Comments