International Journal of Engineering Associates
Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a trend among business partnerships. This has also increased the risk of unexpected information leaks when releasing data. To conceal restrictive itemsets (patterns) contained in the source database, a sanitization process is needed to transform the source database into a released database. The transformed result should also conceal non-restrictive information as an unwanted event.