Abstract
Telecommunication is the foundation stone of the current economic context which allows an opening in all areas and facilitates the interaction using different platforms and technologies (from 2G to 5G). In such context, personal data is massively collected, stored and processed for different aims which is considered as big privacy concerns. Personal data should not be known by no matter whom. It is thus important to raise the question of what can be communicated and to which. The protection of personal data needs a deep attention from companies that process with this data such telecommunication operator. The dilemma of privacy in telecommunication operators is that telecommunication employees, suppliers and subcontractors need personal data access but the privacy requirements consist on knowing less personal data and protects such data. The goal of this article is to deal with this dilemma by providing a privacy approach for protecting personal data in telecommunication operators processes interacting with Charging Data Records CDR in such way to ensure that the illegible employees whom access to personal data cannot use them for purpose other than authorized one.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Technical Specification 32.298: Telecommunication management, charging management, Charging Data Record (CDR) parameter description, 3GPP, version 15.3.0 (2018)
Technical Specification 32.250: Telecommunication management, charging management, Circuit Switched (CS) domain charging, 3GPP, version 15.0.0 (2018)
Technical Specification 32.276: Telecommunication management, charging management, Voice Call Service (VCS) charging, 3GPP, version 15.0.0 (2018)
Technical Specification 32.274: Telecommunication management, charging management, Short Message Service (SMS) charging, 3GPP, version 15.0.0 (2018)
Technical Specification 32.297: Telecommunication management, charging management, Charging Data Record (CDR) file format and transfer, 3GPP, version 15.0.0 (2018)
AFCDP, Glossary anonymization of data (2008)
Mivule, K., Turner, C.: A review of privacy essentials for confidential mobile data transactions. In: International Conference on Mobility in Computing-ICMiC 2013, pp. 36–43 (2013)
Benjamin, C.M., Fung, M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Puzziness Knowl.-Based Syst. 10(5), 571–588 (2002)
Islam, M.R., Islam, M.E.: An approach to provide security to unstructured big data. In: IEEE 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp. 1–5 (2014)
Byun, J.-W., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets, pp. 48–63. Springer, Heidelberg (2006)
Fraser, R., Willison, D.: Tools for anonymization of personal health information prepared for the pan-Canadian group of protection of personal health information (PRPS), September 2009
Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 229–240 (2006)
Križan, T., Brakus, M., Vukelić, D.: In-situ anonymization of big data. In: Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 292–298 (2015)
Wong, W.K., Mamoulis, N., Cheung, D.W.: Nonhomogeneous generalization in privacy preserving data publishing, pp. 747–758 (2010)
Data Masking: What you need to know before you begin, A Net 2000 Ltd. White paper
https://www.quora.com/how-much-does-it-cost-tu-use-informatica
Call Detail Record Reference, V300R003C01LMA101, pp. 22–229. HUAWEI (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Arfaoui, S., Belmekki, A., Mezrioui, A. (2020). Privacy Enhancement of Telecom Processes Interacting with Charging Data Records. In: Madureira, A., Abraham, A., Gandhi, N., Silva, C., Antunes, M. (eds) Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018). SoCPaR 2018. Advances in Intelligent Systems and Computing, vol 942. Springer, Cham. https://doi.org/10.1007/978-3-030-17065-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-17065-3_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17064-6
Online ISBN: 978-3-030-17065-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)