Skip to main content

Privacy Enhancement of Telecom Processes Interacting with Charging Data Records

  • Conference paper
  • First Online:
  • 438 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 942))

Abstract

Telecommunication is the foundation stone of the current economic context which allows an opening in all areas and facilitates the interaction using different platforms and technologies (from 2G to 5G). In such context, personal data is massively collected, stored and processed for different aims which is considered as big privacy concerns. Personal data should not be known by no matter whom. It is thus important to raise the question of what can be communicated and to which. The protection of personal data needs a deep attention from companies that process with this data such telecommunication operator. The dilemma of privacy in telecommunication operators is that telecommunication employees, suppliers and subcontractors need personal data access but the privacy requirements consist on knowing less personal data and protects such data. The goal of this article is to deal with this dilemma by providing a privacy approach for protecting personal data in telecommunication operators processes interacting with Charging Data Records CDR in such way to ensure that the illegible employees whom access to personal data cannot use them for purpose other than authorized one.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Technical Specification 32.298: Telecommunication management, charging management, Charging Data Record (CDR) parameter description, 3GPP, version 15.3.0 (2018)

    Google Scholar 

  2. Technical Specification 32.250: Telecommunication management, charging management, Circuit Switched (CS) domain charging, 3GPP, version 15.0.0 (2018)

    Google Scholar 

  3. Technical Specification 32.276: Telecommunication management, charging management, Voice Call Service (VCS) charging, 3GPP, version 15.0.0 (2018)

    Google Scholar 

  4. Technical Specification 32.274: Telecommunication management, charging management, Short Message Service (SMS) charging, 3GPP, version 15.0.0 (2018)

    Google Scholar 

  5. Technical Specification 32.297: Telecommunication management, charging management, Charging Data Record (CDR) file format and transfer, 3GPP, version 15.0.0 (2018)

    Google Scholar 

  6. AFCDP, Glossary anonymization of data (2008)

    Google Scholar 

  7. Mivule, K., Turner, C.: A review of privacy essentials for confidential mobile data transactions. In: International Conference on Mobility in Computing-ICMiC 2013, pp. 36–43 (2013)

    Google Scholar 

  8. Benjamin, C.M., Fung, M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)

    Google Scholar 

  9. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Puzziness Knowl.-Based Syst. 10(5), 571–588 (2002)

    Article  MathSciNet  Google Scholar 

  10. Islam, M.R., Islam, M.E.: An approach to provide security to unstructured big data. In: IEEE 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp. 1–5 (2014)

    Google Scholar 

  11. Byun, J.-W., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets, pp. 48–63. Springer, Heidelberg (2006)

    Google Scholar 

  12. Fraser, R., Willison, D.: Tools for anonymization of personal health information prepared for the pan-Canadian group of protection of personal health information (PRPS), September 2009

    Google Scholar 

  13. Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 229–240 (2006)

    Google Scholar 

  14. Križan, T., Brakus, M., Vukelić, D.: In-situ anonymization of big data. In: Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 292–298 (2015)

    Google Scholar 

  15. Wong, W.K., Mamoulis, N., Cheung, D.W.: Nonhomogeneous generalization in privacy preserving data publishing, pp. 747–758 (2010)

    Google Scholar 

  16. Data Masking: What you need to know before you begin, A Net 2000 Ltd. White paper

    Google Scholar 

  17. https://www.quora.com/how-much-does-it-cost-tu-use-informatica

  18. Call Detail Record Reference, V300R003C01LMA101, pp. 22–229. HUAWEI (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siham Arfaoui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arfaoui, S., Belmekki, A., Mezrioui, A. (2020). Privacy Enhancement of Telecom Processes Interacting with Charging Data Records. In: Madureira, A., Abraham, A., Gandhi, N., Silva, C., Antunes, M. (eds) Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018). SoCPaR 2018. Advances in Intelligent Systems and Computing, vol 942. Springer, Cham. https://doi.org/10.1007/978-3-030-17065-3_27

Download citation

Publish with us

Policies and ethics