Abstract
As a new term in the financial industry, FinTech has become a popular term that describes novel technologies adopted by the financial service institutions. This term also covers aspects in security and privacy issues, such as threats, malicious behaviors, attacks, and adversaries, as well as the existing or potential solutions. This work aims to produce a survey of FinTech by collecting and reviewing contemporary achievements in security and privacy issues of the financial industry. The findings of this work can be used for forming the theoretical framework of FinTech in the security and privacy dimension, which will a fundamental support for establishing a solid security mechanism in FinTech.
Keywords
- FinTech
- Security
- Privacy
- Data mining
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Li, Y., Dai, W., Ming, Z., Qiu, M.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. 65, 1339–1350 (2015)
Gai, K., Qiu, M., Tao, L., Zhu, Y.: Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun. Netw. 9, 1–10 (2015)
Yin, H., Gai, K.: An empirical study on preprocessing high-dimensional class-imbalanced data for classification. In: The IEEE International Symposium on Big Data Security on Cloud, New York, USA, pp. 1314–1319 (2015)
Gai, K., Qiu, M., Chen, M., Zhao, H.: SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. PP, 1 (2016)
Gai, K., Du, Z., Qiu, M., Zhao, H.: Efficiency-aware workload optimizations of heterogenous cloud computing for capacity planning in financial industry. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 1–6. IEEE (2015)
Qiu, M., Zhong, M., Li, J., Gai, K., Zong, Z.: Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)
Qiu, M., Cao, D., Su, H., Gai, K.: Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G. Int. J. Commun. Syst. 29(16), 2364–2374 (2016)
Morgan, S.: Cybersecurity market reaches $75 billion in 2015; expected to reach $170 billion by 2020 (2015)
SVB: Cybersecurity report 2015 (2015). Accessed https://www.svb.com/uploadedFiles/Content/Trends_and_Insights/Reports/Cybersecurity_Report/cybersecurity-report-2015.pdf
Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: The 2nd IEEE International Conference on Big Data Security on Cloud, New York, USA, pp. 171–176 (2016)
Gai, K., Steenkamp, A.: A feasibility study of Platform-as-a-Service using cloud computing for a global service organization. J. Inf. Syst. Appl. Res. 7, 28–42 (2014)
Gai, K., Steenkamp, A.: Feasibility of a Platform-as-a-Service implementation using cloud computing for a global service organization. In: Proceedings of the Conference for Information Systems Applied Research ISSN, vol. 2167, p. 1508 (2013)
Chai, S., Kim, M., Rao, H.: Firms’ information security investment decisions: stock market evidence of investors’ behavior. Decis. Support Syst. 50(4), 651–661 (2011)
Liao, C., Liu, C., Chen, K.: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model. ECRA 10(6), 702–715 (2011)
Roumani, Y., Nwankpa, J., Roumani, Y.: Examining the relationship between firm’s financial records and security vulnerabilities. IJIM 36(6), 987–994 (2016)
Nussbaumer, P., Matter, I., Schwabe, G.: “enforced” vs. “casual” transparency-findings from IT-supported financial advisory encounters. ACM Trans. Manag. Inf. Syst. 3(2), 11 (2012)
Gai, K., Li, S.: Towards cloud computing: a literature review on cloud computing and its development trends. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, pp. 142–146 (2012)
Gai, K., Qiu, M., Zhao, H.: Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing. IEEE Trans. Cloud Comput. PP(99), 1–11 (2016)
Hernandez, P.: Microsoft, Bank of America announce Blockchain collaboration (2016). Accessed http://www.eweek.com/cloud/microsoft-bank-of-america-announce-blockchain-collaboration.html
Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. JNCA 59, 46–54 (2015)
Gai, K., Qiu, M., Zhao, H., Liu, M.: Energy-aware optimal task assignment for mobile heterogeneous embedded systems in cloud computing. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, pp. 198–203. IEEE (2016)
Gai, K.: A review of leveraging private cloud computing in financial service institutions: value propositions and current performances. Int. J. Comput. Appl. 95(3), 40–44 (2014)
Gai, K., Qiu, M., Zhao, H., Dai, W.: Privacy-preserving adaptive multi-channel communications under timing constraints. In: The IEEE International Conference on Smart Cloud 2016, New York, USA, p. 1. IEEE (2016)
Ni, J., Yu, Y., Mu, Y., Xia, Q.: On the security of an efficient dynamic auditing protocol in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(10), 2760–2761 (2014)
Banu, R., Nagaveni, N.: Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario. Inf. Sci. 232, 437–448 (2013)
Elnagdy, S., Qiu, M., Gai, K.: Understanding taxonomy of cyber risks for cybersecurity insurance of financial industry in cloud computing. In: The 2nd IEEE International Conference of Scalable and Smart Cloud, pp. 295–300. IEEE (2016)
Sharma, A., Panigrahi, P.: A review of financial accounting fraud detection based on data mining techniques. arXiv preprint. arXiv:1309.3944 (2013)
Gai, K., Qiu, M., Elnagdy, S.: Security-aware information classifications using supervised learning for cloud-based cyber risk management in financial big data. In: The 2nd IEEE International Conference on Big Data Security on Cloud, New York, USA, pp. 197–202 (2016)
Glancy, F., Yadav, S.: A computational model for financial reporting fraud detection. Decis. Support Syst. 50(3), 595–601 (2011)
Kou, G., Peng, Y., Wang, G.: Evaluation of clustering algorithms for financial risk analysis using MCDM methods. Inf. Sci. 275, 1–12 (2014)
Gai, K., Qiu, M., Zhao, H., Dai, W.: Anti-counterfeit schema using Monte Carlo simulation for e-commerce in cloud systems. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 74–79. IEEE (2015)
Löhr, S., Mursajew, O., Rösch, D., Scheule, H.: Dynamic implied correlation modeling and forecasting in structured finance. J. Futures Markets 33(11), 994–1023 (2013)
Li, Y., Gai, K., Ming, Z., Zhao, H., Qiu, M.: Intercrossed access control for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. 12(4s), 67 (2016)
Asamoah, C., Tao, L., Gai, K., Jiang, N.: Powering filtration process of cyber security ecosystem using knowledge graph. In: The 2nd IEEE International Conference of Scalable and Smart Cloud, pp. 240–246. IEEE (2016)
Kanak, A., Sogukpinar, I.: BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication. Secur. Commun. Netw. 7(1), 123–138 (2014)
Davis, M., Kumiega, A., Van, V.: Ethics, finance, and automation: a preliminary survey of problems in high frequency trading. Sci. Eng. Ethics 19(3), 851–874 (2013)
Gai, K., Qiu, M., Zhao, H., Xiong, J.: Privacy-aware adaptive data encryption strategy of big data in cloud computing. In: The 2nd IEEE International Conference of Scalable and Smart Cloud (SSC 2016), Beijing, China, pp. 273–278. IEEE (2016)
DeStefano, R., Tao, L., Gai, K.: Improving data governance in large organizations through ontology and linked data. In: The 2nd IEEE International Conference of SSC, pp. 279–284. IEEE (2016)
Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138–151 (2016)
Yu, W., Yan, C., Ding, Z., Jiang, C., Zhou, M.: Modeling and validating e-commerce business process based on petri nets. IEEE Trans. SMCS 44(3), 327–341 (2014)
Xiao, L., Yan, Q., Lou, W., Chen, G., Hou, Y.: Proximity-based security techniques for mobile users in wireless networks. IEEE Trans. IFS 8(12), 2089–2100 (2013)
Bilogrevic, I., Jadliwala, M., Joneja, V., Kalkan, K., Hubaux, J., Aad, I.: Privacy-preserving optimal meeting location determination on mobile devices. IEEE Trans. IFS 9(7), 1141–1156 (2014)
Wang, Y., Liu, J., Chen, Y., Gruteser, M., Yang, J., Liu, H.: E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures. In: Proceedings of the 20th Annual International Conference on MCN, Maui, Hawaii, USA, pp. 617–628. ACM (2014)
Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: The 2nd IEEE International Conference on Big Data Security on Cloud, New York, USA, pp. 140–145 (2016)
Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. PP(99), 1 (2016)
Li, M., Yu, S., Ren, K., Lou, W., Hou, Y.: Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4), 56–62 (2013)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. IFS 11(11), 2594–2608 (2016)
Ma, L., Tao, L., Zhong, Y., Gai, K.: RuleSN: research and application of social network access control model. In: IEEE International Conference on IDS, New York, USA, pp. 418–423 (2016)
Ma, L., Tao, L., Gai, K., Zhong, Y.: A novel social network access control model using logical authorization language in cloud computing. CCPE PP(99), 1 (2016)
Gai, K., Qiu, M., Thuraisingham, B., Tao, L.: Proactive attribute-based secure data schema for mobile cloud in financial industry. In: The IEEE International Symposium on BigDataSecurity, New York, USA, pp. 1332–1337 (2015)
Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. PP, 1 (2016)
Merigó, J., Gil-Lafuente, A.: New decision-making techniques and their application in the selection of financial products. Inf. Sci. 180(11), 2085–2094 (2010)
Elnagdy, S., Qiu, M., Gai, K.: Cyber incident classifications using ontology-based knowledge representation for cybersecurity insurance in financial industry. In: The 2nd IEEE International Conference of Scalable and Smart Cloud, pp. 301–306. IEEE (2016)
Gai, K., Qiu, M., Hassan, H.: Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing. CCPE PP(99), 1 (2016)
Ma, D., Saxena, N., Xiang, T., Zhu, Y.: Location-aware and safer cards: enhancing RFID security and privacy via location sensing. IEEE TDSC 10(2), 57–69 (2013)
Wei, C., Hwang, M., Chin, A.: A mutual authentication protocol for RFID. IT Prof. Mag. 13(2), 20 (2011)
Sun, D., Zhong, J.: A hash-based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246–1252 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Gai, K., Qiu, M., Sun, X., Zhao, H. (2017). Security and Privacy Issues: A Survey on FinTech. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2016. Lecture Notes in Computer Science(), vol 10135. Springer, Cham. https://doi.org/10.1007/978-3-319-52015-5_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-52015-5_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52014-8
Online ISBN: 978-3-319-52015-5
eBook Packages: Computer ScienceComputer Science (R0)