Increasing Data Anonymity using AES and Privacy Technique
Thamer Khalil Esmeel1, Roslina Abd Hamid2, Rahmah Mokhtarr3

1Thamer Khalil Esmeel, (a) Faculty of Computing. Universiti Malaysia Pahang. Malaysia.
thamerkhalil29@yahoo.com (b) Ministry of Higher Education and Scientific Research., University of Mosul, Computer Science, College of Arts, Iraq.
2Roslina Abd Hamid, Faculty of Computing. Universiti Malaysia Pahang. Malaysia.
3Rahmah Mokhtar, Faculty of Computing. Universiti Malaysia Pahang. Malaysia.

Manuscript received on 1 August 2019. | Revised Manuscript received on 6 August 2019. | Manuscript published on 30 September 2019. | PP: 3243-3248 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5405098319/2019©BEIESP | DOI: 10.35940/ijrte.C5405.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data security and data preserve privacy had been an important area to a huge in recent years. However, rapid developments in collecting, analyzing, and using personal data had made privacy a very important issue. This thesis had addressed the problem the protect user data in the dataset from attacks internal and attacks external by using combination techniques between security technique, and privacy technique and data mining technique. The research objectives were to determine the privacy and security technique in suitable the dataset, and to implement the combination property with chosen and security technique in order to protect user data in the dataset and to validate by comparing result before and after apply privacy techniques in dataset using chosen data mining tool. The research methodology consists of three phases. the analysis phase, combination techniques phase, and results evaluating phase and for every phase has research objective.
Keywords: Security Techniques, Privacy Techniques, Data Mining Techniques, Weka Tools, Weka Explore Interface, Weka Experimenter Environment Interface

Scope of the Article:
Data Mining Methods, Techniques, and Tools