Skip to main content

Data Protection on Fintech Platforms

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1047))

Abstract

The security of data has been challenged by the incorporation of new services into the digital world. Data protection has become essential to continue operating in the new financial environment, especially due to the advent of Financial Technology (Fintech). This article reviews how data protection is applied to financial recommendation platforms identifying current trends in this area. Moreover, it looks at the evolution of computer security in the field of Fintech due to the security level that it requires. In addition, it examines the solution techniques for data storage issues in cloud security and encryption methods that assure data protection. Also, the European Union’s data protection regulation is considered; it not only affects the entities based in the European territory but also those that are outside of it but manage the data of European citizens.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hendre, A., Joshi, K.P.: A semantic approach to cloud security and compliance. In: 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, pp. 1081–1084 (2015)

    Google Scholar 

  2. Addis, M.C., Kutar, M.: The general data protection regulation (GDPR), emerging technologies and UK organisations: awareness, implementation and readiness (2018)

    Google Scholar 

  3. Addis, M.C., Kutar, M.: The general data protection regulation (GDPR), emerging technologies and UK organisations: awareness, implementation and readiness. In: UK Academy for Information Systems Conference Proceedings 2018

    Google Scholar 

  4. Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H.: Security algorithms for cloud computing. Procedia Comput. Sci. 85, 535–542 (2016)

    Article  Google Scholar 

  5. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p. 9. ACM, September 2008

    Google Scholar 

  6. Banu, R.V., Nagaveni, N.: Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario. Inf. Sci. 232, 437–448 (2013)

    Article  Google Scholar 

  7. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220–232 (2012)

    Article  Google Scholar 

  8. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  9. Chen, S., Weiss, G.: An intelligent agent for bilateral negotiation with unknown opponents in continuous-time domains. In: ACM Transactions on Autonomous and Adaptive Systems (TAAS), vol. 9(3), p. 16 (2014)

    Google Scholar 

  10. Choi, C., Choi, J., Kim, P.: Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 67(3), 711–722 (2014)

    Article  Google Scholar 

  11. Zhe, D., Qinghong, W., Naizheng, S., Yuhan, Z.: Study on data security policy based on cloud storage. In: 2017 IEEE 3rd International Conference on Big Data Security on Cloud (Bigdatasecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and Ieee International Conference on Intelligent Data and Security (IDS), Beijing, pp. 145–149 (2017)

    Google Scholar 

  12. De la Prieta, F., Barriuso, A.L., Corchado, J.M., de Colsa, L.E.C.: Security services as cloud capabilities using MAS. In: Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad: León, 14, 15, 16 de septiembre de 2015: I JNIC2015, pp. 82–83 (2015)

    Google Scholar 

  13. DeStefano, R.J., Tao, L., Gai, K.: Improving data governance in large organizations through ontology and linked data. In: IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 279–284. IEEE (2016)

    Google Scholar 

  14. Gai, K., Du, Z., Qiu, M., Zhao, H.: Efficiency-aware workload optimizations of heterogeneous cloud computing for capacity planning in financial industry. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 1–6. IEEE (2015)

    Google Scholar 

  15. Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 236–247. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52015-5_24

    Chapter  Google Scholar 

  16. Gomber, P., Koch, J.A., Siering, M.: Digital Finance and FinTech: current research and future research directions. Bus. Econ. 87, 537–580 (2017)

    Google Scholar 

  17. González Briones, A., Chamoso, P., Barriuso, A.L.: Review of the main security problems with multi-agent systems used in e-commerce applications. In: ADCAIJ: Advances in Distributed Computing and Artificial Intelligence, vol. 5, no. 3, pp. 55–61. Ediciones Universidad de Salamanca (2017)

    Google Scholar 

  18. Gonzalez, N., et al.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput.: Adv. Syst. Appl. 1(1), 11 (2012)

    Article  Google Scholar 

  19. Gai, K., Qiu, M., Zhao, H., Xiong, J.: Privacy-aware adaptive data encryption strategy of big data in cloud computing. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, pp. 273–278 (2016)

    Google Scholar 

  20. Gai, K., Qiu, M., Sun, X.: A survey on FinTech. J. Netw. Comput. Appl. 103, 262–273 (2018)

    Article  Google Scholar 

  21. Gai, K., Qiu, M., Li, Y., Liu, X.: Advanced fully homomorphic encryption scheme over real numbers. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, pp. 64–69 (2017)

    Google Scholar 

  22. Kou, G., Peng, Y., Wang, G.: Evaluation of clustering algorithms for financial risk analysis using MCDM methods. Inf. Sci. 275, 1–12 (2014)

    Article  Google Scholar 

  23. Elluri, L., Joshi, K.P.: A knowledge representation of cloud data controls for EU GDPR compliance. In: 2018 IEEE World Congress on Services (SERVICES), San Francisco, CA, pp. 45–46 (2018)

    Google Scholar 

  24. Lazarova, D.: Fintech trends: the Internet of Things, January 2018. https://www.finleap.com/insights/fintech-trends-the-internet-of-things/

  25. Li, B., Hoi, S.C.: Online portfolio selection: a survey. ACM Comput. Surv. (CSUR) 46(3), 35 (2014)

    MATH  Google Scholar 

  26. Li, M., Yu, S., Ren, K., Lou, W., Hou, Y.T.: Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4), 56–62 (2013)

    Article  Google Scholar 

  27. Li, T., Corchado, J.M., Sun, S., Bajo, J.: Clustering for filtering: multi-object detection and estimation using multiple/massive sensors. Inf. Sci. 388, 172–190 (2017)

    Article  Google Scholar 

  28. Ma, J., Xu, W., Sun, Y., Turban, E., Wang, S., Liu, O.: An ontology-based textmining method to cluster proposals for research project selection. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 42(3), 784–790 (2012)

    Article  Google Scholar 

  29. Vurukonda, N., Thirumala Rao, B.: A study on data storage security issues in cloud computing. Procedia Comput. Sci. 92, 128–135 (2016)

    Article  Google Scholar 

  30. Ravi Kumar, P., Herbert Raj, P., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 125, 691–697 (2018)

    Article  Google Scholar 

  31. Prieto-Castrillo, F., Kushch, S., Corchado, J.M.: Distributed sequential consensus in networks: analysis of partially connected blockchains with uncertainty. Complexity 2017, 1–11 (2017)

    Article  MathSciNet  Google Scholar 

  32. Liu, Q., Wang, G., Jie, W.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014)

    Article  Google Scholar 

  33. Sánchez, R., Almenares, F., Arias, P., Díaz-Sánchez, D., Marín, A.: Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Trans. Consum. Electron. 58(1), 95–103 (2012)

    Article  Google Scholar 

  34. Shim, Y., Shin, D.H.: Analyzing China’s fintech industry from the perspective of actor–network theory. Telecommun. Policy 40(2–3), 168–181 (2016)

    Article  Google Scholar 

  35. Aldossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 7(4), 485–598 (2016)

    Google Scholar 

  36. Wei, L., et al.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258(371–386), 2014 (2014)

    Google Scholar 

  37. Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)

    Article  Google Scholar 

  38. Yu, K., Gao, Y., Zhang, P., Qiu, M.: Design and architecture of dell acceleration appliances for database (DAAD): a practical approach with high availability guaranteed. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS), pp. 430–435. IEEE (2015)

    Google Scholar 

  39. Zarandi, M.H., Hadavandi, E., Turksen, I.B.: A hybrid fuzzy intelligent agent - based system for stock price prediction. Int. J. Intell. Syst. 27(11), 947–969 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

This research has been partially supported by the European Regional Development Fund (FEDER) within the framework of the Interreg program V-A Spain-Portugal 2014-2020 (PocTep) under the IOTEC project grant 0123 IOTEC 3 E.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elena Hernández .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hernández, E., Öztürk, M., Sittón, I., Rodríguez, S. (2019). Data Protection on Fintech Platforms. In: De La Prieta, F., et al. Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection. PAAMS 2019. Communications in Computer and Information Science, vol 1047. Springer, Cham. https://doi.org/10.1007/978-3-030-24299-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24299-2_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24298-5

  • Online ISBN: 978-3-030-24299-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics