Abstract
The security of data has been challenged by the incorporation of new services into the digital world. Data protection has become essential to continue operating in the new financial environment, especially due to the advent of Financial Technology (Fintech). This article reviews how data protection is applied to financial recommendation platforms identifying current trends in this area. Moreover, it looks at the evolution of computer security in the field of Fintech due to the security level that it requires. In addition, it examines the solution techniques for data storage issues in cloud security and encryption methods that assure data protection. Also, the European Union’s data protection regulation is considered; it not only affects the entities based in the European territory but also those that are outside of it but manage the data of European citizens.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Hendre, A., Joshi, K.P.: A semantic approach to cloud security and compliance. In: 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, pp. 1081–1084 (2015)
Addis, M.C., Kutar, M.: The general data protection regulation (GDPR), emerging technologies and UK organisations: awareness, implementation and readiness (2018)
Addis, M.C., Kutar, M.: The general data protection regulation (GDPR), emerging technologies and UK organisations: awareness, implementation and readiness. In: UK Academy for Information Systems Conference Proceedings 2018
Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H.: Security algorithms for cloud computing. Procedia Comput. Sci. 85, 535–542 (2016)
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p. 9. ACM, September 2008
Banu, R.V., Nagaveni, N.: Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario. Inf. Sci. 232, 437–448 (2013)
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220–232 (2012)
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Chen, S., Weiss, G.: An intelligent agent for bilateral negotiation with unknown opponents in continuous-time domains. In: ACM Transactions on Autonomous and Adaptive Systems (TAAS), vol. 9(3), p. 16 (2014)
Choi, C., Choi, J., Kim, P.: Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 67(3), 711–722 (2014)
Zhe, D., Qinghong, W., Naizheng, S., Yuhan, Z.: Study on data security policy based on cloud storage. In: 2017 IEEE 3rd International Conference on Big Data Security on Cloud (Bigdatasecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and Ieee International Conference on Intelligent Data and Security (IDS), Beijing, pp. 145–149 (2017)
De la Prieta, F., Barriuso, A.L., Corchado, J.M., de Colsa, L.E.C.: Security services as cloud capabilities using MAS. In: Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad: León, 14, 15, 16 de septiembre de 2015: I JNIC2015, pp. 82–83 (2015)
DeStefano, R.J., Tao, L., Gai, K.: Improving data governance in large organizations through ontology and linked data. In: IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 279–284. IEEE (2016)
Gai, K., Du, Z., Qiu, M., Zhao, H.: Efficiency-aware workload optimizations of heterogeneous cloud computing for capacity planning in financial industry. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 1–6. IEEE (2015)
Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 236–247. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52015-5_24
Gomber, P., Koch, J.A., Siering, M.: Digital Finance and FinTech: current research and future research directions. Bus. Econ. 87, 537–580 (2017)
González Briones, A., Chamoso, P., Barriuso, A.L.: Review of the main security problems with multi-agent systems used in e-commerce applications. In: ADCAIJ: Advances in Distributed Computing and Artificial Intelligence, vol. 5, no. 3, pp. 55–61. Ediciones Universidad de Salamanca (2017)
Gonzalez, N., et al.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput.: Adv. Syst. Appl. 1(1), 11 (2012)
Gai, K., Qiu, M., Zhao, H., Xiong, J.: Privacy-aware adaptive data encryption strategy of big data in cloud computing. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, pp. 273–278 (2016)
Gai, K., Qiu, M., Sun, X.: A survey on FinTech. J. Netw. Comput. Appl. 103, 262–273 (2018)
Gai, K., Qiu, M., Li, Y., Liu, X.: Advanced fully homomorphic encryption scheme over real numbers. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, pp. 64–69 (2017)
Kou, G., Peng, Y., Wang, G.: Evaluation of clustering algorithms for financial risk analysis using MCDM methods. Inf. Sci. 275, 1–12 (2014)
Elluri, L., Joshi, K.P.: A knowledge representation of cloud data controls for EU GDPR compliance. In: 2018 IEEE World Congress on Services (SERVICES), San Francisco, CA, pp. 45–46 (2018)
Lazarova, D.: Fintech trends: the Internet of Things, January 2018. https://www.finleap.com/insights/fintech-trends-the-internet-of-things/
Li, B., Hoi, S.C.: Online portfolio selection: a survey. ACM Comput. Surv. (CSUR) 46(3), 35 (2014)
Li, M., Yu, S., Ren, K., Lou, W., Hou, Y.T.: Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4), 56–62 (2013)
Li, T., Corchado, J.M., Sun, S., Bajo, J.: Clustering for filtering: multi-object detection and estimation using multiple/massive sensors. Inf. Sci. 388, 172–190 (2017)
Ma, J., Xu, W., Sun, Y., Turban, E., Wang, S., Liu, O.: An ontology-based textmining method to cluster proposals for research project selection. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 42(3), 784–790 (2012)
Vurukonda, N., Thirumala Rao, B.: A study on data storage security issues in cloud computing. Procedia Comput. Sci. 92, 128–135 (2016)
Ravi Kumar, P., Herbert Raj, P., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 125, 691–697 (2018)
Prieto-Castrillo, F., Kushch, S., Corchado, J.M.: Distributed sequential consensus in networks: analysis of partially connected blockchains with uncertainty. Complexity 2017, 1–11 (2017)
Liu, Q., Wang, G., Jie, W.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014)
Sánchez, R., Almenares, F., Arias, P., Díaz-Sánchez, D., Marín, A.: Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Trans. Consum. Electron. 58(1), 95–103 (2012)
Shim, Y., Shin, D.H.: Analyzing China’s fintech industry from the perspective of actor–network theory. Telecommun. Policy 40(2–3), 168–181 (2016)
Aldossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 7(4), 485–598 (2016)
Wei, L., et al.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258(371–386), 2014 (2014)
Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)
Yu, K., Gao, Y., Zhang, P., Qiu, M.: Design and architecture of dell acceleration appliances for database (DAAD): a practical approach with high availability guaranteed. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS), pp. 430–435. IEEE (2015)
Zarandi, M.H., Hadavandi, E., Turksen, I.B.: A hybrid fuzzy intelligent agent - based system for stock price prediction. Int. J. Intell. Syst. 27(11), 947–969 (2012)
Acknowledgements
This research has been partially supported by the European Regional Development Fund (FEDER) within the framework of the Interreg program V-A Spain-Portugal 2014-2020 (PocTep) under the IOTEC project grant 0123 IOTEC 3 E.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Hernández, E., Öztürk, M., Sittón, I., Rodríguez, S. (2019). Data Protection on Fintech Platforms. In: De La Prieta, F., et al. Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection. PAAMS 2019. Communications in Computer and Information Science, vol 1047. Springer, Cham. https://doi.org/10.1007/978-3-030-24299-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-24299-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24298-5
Online ISBN: 978-3-030-24299-2
eBook Packages: Computer ScienceComputer Science (R0)