In kACTUS, efficient multidimensional suppression is performed, ., values are suppressed only on certain records depending on other attribute values, without the need for manually produced domain hierarchy trees. | ISSN:2249-5789 G Sai Chaitanya Kumar et al , International Journal of Computer Science & Communication Networks,Vol 2(4), 501-505 Suppression of Multidimensional Data Using K-Anonymity 1 Safali, 2 Murali Krishna, 3 Mr. G Sai Chaitanya Kumar 1 2 , Dept. of CSE, NRI Institute of Technology, Vijayawada, ., India., arunachowdary_maddineni@ Assoc. Professor, Dept. of CSE, Paladugu Parvathi Devi College of Engg & Tech, Vijayawada, . ,India., balu_thati@ 3 , Dept. of CSE, Paladugu Parvathi Devi College of Engg & Tech, Vijayawada, . ,India., Abstract Many applications that employ data mining techniques involve mining data that include private and sensitive information about the subjects. One way to enable effective data mining while preserving privacy is to anonymize the data set that includes private information about subjects before being released for data mining. One way to anonymize data set is to manipulate its content so that the records adhere to k-anonymity. Two common manipulation techniques used to achieve kanonymity of a data set are generalization and suppression. Generalization refers to replacing a value with a less specific but semantically consistent value, while suppression refers to not releasing a value at all. A new method for achieving kanonymity named K-anonymity of Classification Trees Using Suppression (kACTUS). In kACTUS, efficient multidimensional suppression is performed, ., values are suppressed only on certain records depending on other attribute values, without the need for manually produced domain hierarchy trees. Keywords: Privacy-preserving data mining, k-anonymity, decision trees 1 Introduction Knowledge Discovery in Databases (KDDs) is the process of identifying valid, novel, useful, and understandable patterns from large data sets. Data Mining (DM) is the core of the KDD process, involving algorithms that explore the data, .