
A Data Privacy Enforcement Tool for Personally Identifiable Information | IJET – Volume 12 Issue 2 | IJET-V12I2P77

Table of Contents
ToggleInternational Journal of Engineering and Techniques (IJET)
Open Access • Peer Reviewed • High Citation & Impact Factor • ISSN: 2395-1303
Volume 12, Issue 2 | Published: April 2026
Author: Dr. R. Kavitha, U. Hari Pratha, R. Dhanya, M. Arthy, S. Lathika
DOI: https://doi.org/{{doi}} • PDF: Download
Abstract
The rapid growth of digital systems has led organizations to store large volumes of sensitive information, including Personally Identifiable Information. Improper handling of such data can result in privacy breaches and significant security risks. This paper presents a Data Privacy Enforcement Tool that focuses on protecting sensitive data using data masking techniques. The proposed system identifies PII fields within datasets and applies masking methods such as partial masking, character replacement and format- preserving masking to conceal confidential information while retaining its usability.
The system is implemented using a Django-based backend and a React-based web interface, allowing users to upload datasets, configure masking rules and export the protected data in formats such as CSV, JSON and Excel. By restricting the solution to data masking, the tool ensures simplicity, efficiency and ease of integration into existing data workflows.
Experimental results demonstrate that the proposed approach effectively protects sensitive information while maintaining the structural integrity and usability of the data for analysis and testing purposes.
Keywords
Data Privacy, Data Masking, Personally Identifiable Information, Data Security
Conclusion
This work presents a data masking–based privacy enforcement framework for securing PII in structured datasets. The system integrates rule-based PII detection with configurable masking algorithms to transform sensitive attributes while preserving schema consistency and data utility. Techniques such as partial masking, character replacement, substitution, and format-preserving masking are systematically applied to ensure that original values are irreversibly concealed without affecting downstream usability. The proposed architecture, built using a Django backend and React interface, enables efficient data ingestion, rule configuration, and transformation workflows within a unified environment. The masking process is designed to maintain referential integrity and structural constraints, allowing the masked datasets to be seamlessly utilized in development, testing, and analytical pipelines. Experimental evaluation indicates that the system achieves effective privacy protection with minimal impact on data usability. By emphasizing transformation-based security over traditional access control mechanisms, the proposed approach demonstrates a scalable and practical solution for privacy preservation. Overall, this work highlights data masking as a robust technique for enforcing data privacy in modern data management systems.
References
[1]B. Manzanares and D. Sanchez, “Improving Text Anonymization through Pre-trained Large Language Models,” Journal of Information Security and Applications, vol. 65, pp. 1–12, 2023.
[2]C. Diaz-Asper, M. Todisco, and N. Evans, “Speaker Anonymization for Privacy Protection in Clinical Speech Data,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 30, pp. 195–205, 2022.
[3]O. Ali and A. Ouda, “Data Masking Framework for Healthcare Business Intelligence Systems,” International Journal of Information Management, vol. 52, pp. 102–110, 2020.
[4]M. Cunha, J. Mendes, and P. Silva, “Privacy-Preserving Techniques for Heterogeneous Data Sources: A Comprehensive Survey,” ACM Computing Surveys, vol. 55, no. 3, pp. 1–36, 2023.
[5]A. Majeed and S. Lee, “Anonymization Techniques for Privacy Preserving Data Publishing: A Survey,” IEEE Access, vol. 9, pp. 27863–27878, 2021.
[6]M. Keswani, A. Kaul, S. Braghin, N. Hilohan, and S. Antonatos, “Secure k-Anonymization Framework for Encrypted Databases,” Proceedings of the IEEE International Conference on Data Engineering Workshops,
pp. 89–96, 2021.
[7]P. R. M. Rao, S. Murali Krishna, and A. P. Siva Kumar, “Privacy Preservation Techniques in Big Data Analytics: A Survey,” Journal of Big Data, vol. 6, no. 1, pp. 1–23, 2019.
[8]J. Rapsik and M. Kvet, “Improving Cybersecurity through Anonymization Techniques,” International Journal of Computer Science and Network Security, vol. 21, no. 7,
pp. 45–52, 2021.
[9]L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570,
2002.
[10]C. Dwork, “Differential Privacy,” Proceedings of the International Colloquium on Automata, Languages and Programming, Springer, pp. 1–12, 20
Cite this article
APA
{{author}} (April 2026). {{title}}. International Journal of Engineering and Techniques (IJET), 12(2). https://doi.org/{{doi}}
{{author}}, “{{title}},” International Journal of Engineering and Techniques (IJET), vol. 12, no. 2, April 2026, doi: {{doi}}.
