Loading

An Approach, for Shielding Sensitive Information using Data Mining Technique
Suman1, Ravinder Shahrawat2, Sarita3

1Suman, Department of Information technology, World College of Technology & Management, Gurgaon, (Haryana), India.
2Ravinder Shahrawat, Department of Information Technology, GGSIPU, (Haryana), India.
3Sarita, Department of ECE, World college of Technology and management, Gurgaon, (Haryana), India.

Manuscript received on 12 September 2014 | Revised Manuscript received on 23 September 2014 | Manuscript published on 30 September 2014 | PP: 50-53 | Volume-3 Issue-4, September 2014 | Retrieval Number: D1214093414/2014©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: large volume of data is regularly collected and shared, for the purpose of various data mining application. The data includes a lot of personal and provisional information. Some of the examples like shopping pattern, criminal record, Diagnosis history, bank details, address, personal emails etc. Now, there is very urgency, as to preserve the privacy of these kind of sensitive data. These data are sent to data analyst for further knowledge discovery. In order to share and keeping the goal in mind as to preserve the privacy of such data, this approach is designed. Data Sharing is very important phase in data transformation stage. Need to make sure that ,if any technique is implemented as to preserve the data security ,that must preserve data behavior and characteristic .Here, data is divided in two parts as character and numerical. Character data is shielded using data masking technique. Numerical data is shielded using clustering algorithm
Keyword: Large, Collected, Shopping, Character

Scope of the Article: Data Mining