%0 Journal Article %T Bit Transformation Perturbative Masking Technique for Protecting Sensitive Information In Privacy Preserving Data Mining %A S.Vijayarani %A A.Tamilarasi %J International Journal of Database Management Systems %D 2010 %I Academy & Industry Research Collaboration Center (AIRCC) %X The goal of data mining is ascertaining novel and valuable knowledge from data. In many situations, theextracted knowledge is highly confidential and it needs sanitization before giving to data miningresearchers and the public in order to address privacy concerns. There have been two types of privacy indata mining. The first type of privacy is that the data is altered so that the mining result will preservecertain privacy. The second type of privacy is that the data is manipulated so that the mining result is notaffected or minimally affected. The aim of privacy preserving data mining researchers is to develop datamining techniques that could be applied on data bases without violating the privacy of individuals. Manytechniques for privacy preserving data mining have come up over the last decade. Some of them arestatistical, cryptographic, randomization methods, k-anonymity model, l-diversity and etc. In this work,we propose a new perturbative masking technique called bit transformation technique for protecting thesensitive information. An experimental result shows that the proposed technique gives the better resultcompared with the existing micro-aggregation technique. %K Privacy %K Sensitive data %K Bit transformation %K Micro-aggregation %K K-means clustering. %U http://airccse.org/journal/ijdms/papers/1110ijdms09.pdf