Security Information Hiding in Data Mining on the bases of Privacy Preserving Technique

Data mining has attracted a great deal of information industry and in society as a whole in recent years, due to the wide availability of huge amount of data and the imminent need for such data into useful information and knowledge. The information and knowledge gained can be used for applications ranging from market analysis, fraud detection and customer retention, to production control and science exploration. With and more information accessible in electronic forms and available on the web, and increasingly powerful data mining tools being developed and put into use, data mining may pose a threat to our privacy and data security .The real privacy concerns are with unconstrained access of individual records, like credit card, banking applications, customer ID, which must access privacy sensitive information. In this paper we investigate the issue of data mining, as data shared before mining the means to shield it with Unified Modeling Language diagrams. Describing the privacy preserving definition, problem statement privacy preserving data mining technique, Architecture of the proposed work. We propose an amalgamated scaffold for Privacy Preserving Data Mining that ensures that the mining process will not trespass Privacy up to a certain degree of security. Varun Yadav Department of Computer Science PEC University of Technology Chandigarh-160012, India Richa Jindal Lecturer, Department of Information Technology PEC University of Technology Chandigarh 160012, India The full text of the article is not available in the cache. Kindly refer the IJCA digital library at www.ijcaonline.org for the complete article. In case, you face problems while downloading the full-text, please send a mail to editor at editor@ijcaonline.org