Privacy Enhancement of Telecom Processes Interacting with Charging Data Records

  • Siham ArfaouiEmail author
  • Abdelhamid Belmekki
  • Abdellatif Mezrioui
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 942)


Telecommunication is the foundation stone of the current economic context which allows an opening in all areas and facilitates the interaction using different platforms and technologies (from 2G to 5G). In such context, personal data is massively collected, stored and processed for different aims which is considered as big privacy concerns. Personal data should not be known by no matter whom. It is thus important to raise the question of what can be communicated and to which. The protection of personal data needs a deep attention from companies that process with this data such telecommunication operator. The dilemma of privacy in telecommunication operators is that telecommunication employees, suppliers and subcontractors need personal data access but the privacy requirements consist on knowing less personal data and protects such data. The goal of this article is to deal with this dilemma by providing a privacy approach for protecting personal data in telecommunication operators processes interacting with Charging Data Records CDR in such way to ensure that the illegible employees whom access to personal data cannot use them for purpose other than authorized one.


Privacy Anonymization Charging Data Records Telecommunication 


  1. 1.
    Technical Specification 32.298: Telecommunication management, charging management, Charging Data Record (CDR) parameter description, 3GPP, version 15.3.0 (2018)Google Scholar
  2. 2.
    Technical Specification 32.250: Telecommunication management, charging management, Circuit Switched (CS) domain charging, 3GPP, version 15.0.0 (2018)Google Scholar
  3. 3.
    Technical Specification 32.276: Telecommunication management, charging management, Voice Call Service (VCS) charging, 3GPP, version 15.0.0 (2018)Google Scholar
  4. 4.
    Technical Specification 32.274: Telecommunication management, charging management, Short Message Service (SMS) charging, 3GPP, version 15.0.0 (2018)Google Scholar
  5. 5.
    Technical Specification 32.297: Telecommunication management, charging management, Charging Data Record (CDR) file format and transfer, 3GPP, version 15.0.0 (2018)Google Scholar
  6. 6.
    AFCDP, Glossary anonymization of data (2008)Google Scholar
  7. 7.
    Mivule, K., Turner, C.: A review of privacy essentials for confidential mobile data transactions. In: International Conference on Mobility in Computing-ICMiC 2013, pp. 36–43 (2013)Google Scholar
  8. 8.
    Benjamin, C.M., Fung, M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)Google Scholar
  9. 9.
    Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Puzziness Knowl.-Based Syst. 10(5), 571–588 (2002)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Islam, M.R., Islam, M.E.: An approach to provide security to unstructured big data. In: IEEE 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp. 1–5 (2014)Google Scholar
  11. 11.
    Byun, J.-W., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets, pp. 48–63. Springer, Heidelberg (2006)Google Scholar
  12. 12.
    Fraser, R., Willison, D.: Tools for anonymization of personal health information prepared for the pan-Canadian group of protection of personal health information (PRPS), September 2009Google Scholar
  13. 13.
    Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 229–240 (2006)Google Scholar
  14. 14.
    Križan, T., Brakus, M., Vukelić, D.: In-situ anonymization of big data. In: Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 292–298 (2015)Google Scholar
  15. 15.
    Wong, W.K., Mamoulis, N., Cheung, D.W.: Nonhomogeneous generalization in privacy preserving data publishing, pp. 747–758 (2010)Google Scholar
  16. 16.
    Data Masking: What you need to know before you begin, A Net 2000 Ltd. White paperGoogle Scholar
  17. 17.
  18. 18.
    Call Detail Record Reference, V300R003C01LMA101, pp. 22–229. HUAWEI (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Siham Arfaoui
    • 1
    Email author
  • Abdelhamid Belmekki
    • 1
  • Abdellatif Mezrioui
    • 1
  1. 1.INPTRabatMorocco

Personalised recommendations