This paper is published in Volume-7, Issue-3, 2021
Area
Computer Science
Author
Satwik Ram Kodandaram, Kushal Honnappa, Kunal Soni
Org/Univ
Visvesvaraya Technological University, Bangalore, Karnataka, India
Pub. Date
22 June, 2021
Paper ID
V7I3-2048
Publisher
Keywords
Named Entity Recognition, Deep Learning, Social media platforms, Data privacy, Masking, Anonymity

Citationsacebook

IEEE
Satwik Ram Kodandaram, Kushal Honnappa, Kunal Soni. Masking private user information using Natural Language Processing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Satwik Ram Kodandaram, Kushal Honnappa, Kunal Soni (2021). Masking private user information using Natural Language Processing. International Journal of Advance Research, Ideas and Innovations in Technology, 7(3) www.IJARIIT.com.

MLA
Satwik Ram Kodandaram, Kushal Honnappa, Kunal Soni. "Masking private user information using Natural Language Processing." International Journal of Advance Research, Ideas and Innovations in Technology 7.3 (2021). www.IJARIIT.com.

Abstract

The Internet brings a lot of efficiency to our lives but we must be aware that everyone exchanges a huge amount of data while interacting with the internet. One of the most important leisure activities one gets from the internet is to be able to socialize. For example, social media has become part and the core of our lives. With more than 2.3 billion active users, data privacy is an issue of concern. The world of the internet has become full of frauds hunting for personal information they leverage for their immoral activities. So, coming up with an algorithm that could secure data and process it such that no private data is involved, and machines continue to be trained with greater data. This could mean a dataset with data that is processed in a manner to make it anonymous. If there is any private information, we will mask that information with pseudo data. We use Named Entity Recognition using Deep Learning for identifying and masking personal information. In this paper, we will discuss how we mask private data. This model will be a successful technique to hide one’s personal information to achieve complete data privacy.