Skip to main content

Security and Privacy Issues: A Survey on FinTech

Part of the Lecture Notes in Computer Science book series (LNISA,volume 10135)

Abstract

As a new term in the financial industry, FinTech has become a popular term that describes novel technologies adopted by the financial service institutions. This term also covers aspects in security and privacy issues, such as threats, malicious behaviors, attacks, and adversaries, as well as the existing or potential solutions. This work aims to produce a survey of FinTech by collecting and reviewing contemporary achievements in security and privacy issues of the financial industry. The findings of this work can be used for forming the theoretical framework of FinTech in the security and privacy dimension, which will a fundamental support for establishing a solid security mechanism in FinTech.

Keywords

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Li, Y., Dai, W., Ming, Z., Qiu, M.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. 65, 1339–1350 (2015)

    Article  MathSciNet  Google Scholar 

  2. Gai, K., Qiu, M., Tao, L., Zhu, Y.: Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun. Netw. 9, 1–10 (2015)

    Google Scholar 

  3. Yin, H., Gai, K.: An empirical study on preprocessing high-dimensional class-imbalanced data for classification. In: The IEEE International Symposium on Big Data Security on Cloud, New York, USA, pp. 1314–1319 (2015)

    Google Scholar 

  4. Gai, K., Qiu, M., Chen, M., Zhao, H.: SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. PP, 1 (2016)

    Google Scholar 

  5. Gai, K., Du, Z., Qiu, M., Zhao, H.: Efficiency-aware workload optimizations of heterogenous cloud computing for capacity planning in financial industry. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 1–6. IEEE (2015)

    Google Scholar 

  6. Qiu, M., Zhong, M., Li, J., Gai, K., Zong, Z.: Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)

    Article  MathSciNet  Google Scholar 

  7. Qiu, M., Cao, D., Su, H., Gai, K.: Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G. Int. J. Commun. Syst. 29(16), 2364–2374 (2016)

    Article  Google Scholar 

  8. Morgan, S.: Cybersecurity market reaches $75 billion in 2015; expected to reach $170 billion by 2020 (2015)

    Google Scholar 

  9. SVB: Cybersecurity report 2015 (2015). Accessed https://www.svb.com/uploadedFiles/Content/Trends_and_Insights/Reports/Cybersecurity_Report/cybersecurity-report-2015.pdf

  10. Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: The 2nd IEEE International Conference on Big Data Security on Cloud, New York, USA, pp. 171–176 (2016)

    Google Scholar 

  11. Gai, K., Steenkamp, A.: A feasibility study of Platform-as-a-Service using cloud computing for a global service organization. J. Inf. Syst. Appl. Res. 7, 28–42 (2014)

    Google Scholar 

  12. Gai, K., Steenkamp, A.: Feasibility of a Platform-as-a-Service implementation using cloud computing for a global service organization. In: Proceedings of the Conference for Information Systems Applied Research ISSN, vol. 2167, p. 1508 (2013)

    Google Scholar 

  13. Chai, S., Kim, M., Rao, H.: Firms’ information security investment decisions: stock market evidence of investors’ behavior. Decis. Support Syst. 50(4), 651–661 (2011)

    Article  Google Scholar 

  14. Liao, C., Liu, C., Chen, K.: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model. ECRA 10(6), 702–715 (2011)

    Google Scholar 

  15. Roumani, Y., Nwankpa, J., Roumani, Y.: Examining the relationship between firm’s financial records and security vulnerabilities. IJIM 36(6), 987–994 (2016)

    Google Scholar 

  16. Nussbaumer, P., Matter, I., Schwabe, G.: “enforced” vs. “casual” transparency-findings from IT-supported financial advisory encounters. ACM Trans. Manag. Inf. Syst. 3(2), 11 (2012)

    Article  Google Scholar 

  17. Gai, K., Li, S.: Towards cloud computing: a literature review on cloud computing and its development trends. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, pp. 142–146 (2012)

    Google Scholar 

  18. Gai, K., Qiu, M., Zhao, H.: Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing. IEEE Trans. Cloud Comput. PP(99), 1–11 (2016)

    Article  Google Scholar 

  19. Hernandez, P.: Microsoft, Bank of America announce Blockchain collaboration (2016). Accessed http://www.eweek.com/cloud/microsoft-bank-of-america-announce-blockchain-collaboration.html

  20. Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. JNCA 59, 46–54 (2015)

    Article  Google Scholar 

  21. Gai, K., Qiu, M., Zhao, H., Liu, M.: Energy-aware optimal task assignment for mobile heterogeneous embedded systems in cloud computing. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, pp. 198–203. IEEE (2016)

    Google Scholar 

  22. Gai, K.: A review of leveraging private cloud computing in financial service institutions: value propositions and current performances. Int. J. Comput. Appl. 95(3), 40–44 (2014)

    Google Scholar 

  23. Gai, K., Qiu, M., Zhao, H., Dai, W.: Privacy-preserving adaptive multi-channel communications under timing constraints. In: The IEEE International Conference on Smart Cloud 2016, New York, USA, p. 1. IEEE (2016)

    Google Scholar 

  24. Ni, J., Yu, Y., Mu, Y., Xia, Q.: On the security of an efficient dynamic auditing protocol in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(10), 2760–2761 (2014)

    Article  Google Scholar 

  25. Banu, R., Nagaveni, N.: Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario. Inf. Sci. 232, 437–448 (2013)

    Article  Google Scholar 

  26. Elnagdy, S., Qiu, M., Gai, K.: Understanding taxonomy of cyber risks for cybersecurity insurance of financial industry in cloud computing. In: The 2nd IEEE International Conference of Scalable and Smart Cloud, pp. 295–300. IEEE (2016)

    Google Scholar 

  27. Sharma, A., Panigrahi, P.: A review of financial accounting fraud detection based on data mining techniques. arXiv preprint. arXiv:1309.3944 (2013)

  28. Gai, K., Qiu, M., Elnagdy, S.: Security-aware information classifications using supervised learning for cloud-based cyber risk management in financial big data. In: The 2nd IEEE International Conference on Big Data Security on Cloud, New York, USA, pp. 197–202 (2016)

    Google Scholar 

  29. Glancy, F., Yadav, S.: A computational model for financial reporting fraud detection. Decis. Support Syst. 50(3), 595–601 (2011)

    Article  Google Scholar 

  30. Kou, G., Peng, Y., Wang, G.: Evaluation of clustering algorithms for financial risk analysis using MCDM methods. Inf. Sci. 275, 1–12 (2014)

    Article  Google Scholar 

  31. Gai, K., Qiu, M., Zhao, H., Dai, W.: Anti-counterfeit schema using Monte Carlo simulation for e-commerce in cloud systems. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 74–79. IEEE (2015)

    Google Scholar 

  32. Löhr, S., Mursajew, O., Rösch, D., Scheule, H.: Dynamic implied correlation modeling and forecasting in structured finance. J. Futures Markets 33(11), 994–1023 (2013)

    Article  Google Scholar 

  33. Li, Y., Gai, K., Ming, Z., Zhao, H., Qiu, M.: Intercrossed access control for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. 12(4s), 67 (2016)

    Google Scholar 

  34. Asamoah, C., Tao, L., Gai, K., Jiang, N.: Powering filtration process of cyber security ecosystem using knowledge graph. In: The 2nd IEEE International Conference of Scalable and Smart Cloud, pp. 240–246. IEEE (2016)

    Google Scholar 

  35. Kanak, A., Sogukpinar, I.: BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication. Secur. Commun. Netw. 7(1), 123–138 (2014)

    Article  Google Scholar 

  36. Davis, M., Kumiega, A., Van, V.: Ethics, finance, and automation: a preliminary survey of problems in high frequency trading. Sci. Eng. Ethics 19(3), 851–874 (2013)

    Article  Google Scholar 

  37. Gai, K., Qiu, M., Zhao, H., Xiong, J.: Privacy-aware adaptive data encryption strategy of big data in cloud computing. In: The 2nd IEEE International Conference of Scalable and Smart Cloud (SSC 2016), Beijing, China, pp. 273–278. IEEE (2016)

    Google Scholar 

  38. DeStefano, R., Tao, L., Gai, K.: Improving data governance in large organizations through ontology and linked data. In: The 2nd IEEE International Conference of SSC, pp. 279–284. IEEE (2016)

    Google Scholar 

  39. Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138–151 (2016)

    Article  Google Scholar 

  40. Yu, W., Yan, C., Ding, Z., Jiang, C., Zhou, M.: Modeling and validating e-commerce business process based on petri nets. IEEE Trans. SMCS 44(3), 327–341 (2014)

    Google Scholar 

  41. Xiao, L., Yan, Q., Lou, W., Chen, G., Hou, Y.: Proximity-based security techniques for mobile users in wireless networks. IEEE Trans. IFS 8(12), 2089–2100 (2013)

    Google Scholar 

  42. Bilogrevic, I., Jadliwala, M., Joneja, V., Kalkan, K., Hubaux, J., Aad, I.: Privacy-preserving optimal meeting location determination on mobile devices. IEEE Trans. IFS 9(7), 1141–1156 (2014)

    Google Scholar 

  43. Wang, Y., Liu, J., Chen, Y., Gruteser, M., Yang, J., Liu, H.: E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures. In: Proceedings of the 20th Annual International Conference on MCN, Maui, Hawaii, USA, pp. 617–628. ACM (2014)

    Google Scholar 

  44. Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: The 2nd IEEE International Conference on Big Data Security on Cloud, New York, USA, pp. 140–145 (2016)

    Google Scholar 

  45. Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. PP(99), 1 (2016)

    Google Scholar 

  46. Li, M., Yu, S., Ren, K., Lou, W., Hou, Y.: Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4), 56–62 (2013)

    Article  Google Scholar 

  47. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. IFS 11(11), 2594–2608 (2016)

    Google Scholar 

  48. Ma, L., Tao, L., Zhong, Y., Gai, K.: RuleSN: research and application of social network access control model. In: IEEE International Conference on IDS, New York, USA, pp. 418–423 (2016)

    Google Scholar 

  49. Ma, L., Tao, L., Gai, K., Zhong, Y.: A novel social network access control model using logical authorization language in cloud computing. CCPE PP(99), 1 (2016)

    Article  Google Scholar 

  50. Gai, K., Qiu, M., Thuraisingham, B., Tao, L.: Proactive attribute-based secure data schema for mobile cloud in financial industry. In: The IEEE International Symposium on BigDataSecurity, New York, USA, pp. 1332–1337 (2015)

    Google Scholar 

  51. Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. PP, 1 (2016)

    Google Scholar 

  52. Merigó, J., Gil-Lafuente, A.: New decision-making techniques and their application in the selection of financial products. Inf. Sci. 180(11), 2085–2094 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  53. Elnagdy, S., Qiu, M., Gai, K.: Cyber incident classifications using ontology-based knowledge representation for cybersecurity insurance in financial industry. In: The 2nd IEEE International Conference of Scalable and Smart Cloud, pp. 301–306. IEEE (2016)

    Google Scholar 

  54. Gai, K., Qiu, M., Hassan, H.: Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing. CCPE PP(99), 1 (2016)

    Google Scholar 

  55. Ma, D., Saxena, N., Xiang, T., Zhu, Y.: Location-aware and safer cards: enhancing RFID security and privacy via location sensing. IEEE TDSC 10(2), 57–69 (2013)

    Google Scholar 

  56. Wei, C., Hwang, M., Chin, A.: A mutual authentication protocol for RFID. IT Prof. Mag. 13(2), 20 (2011)

    Article  Google Scholar 

  57. Sun, D., Zhong, J.: A hash-based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246–1252 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meikang Qiu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Gai, K., Qiu, M., Sun, X., Zhao, H. (2017). Security and Privacy Issues: A Survey on FinTech. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2016. Lecture Notes in Computer Science(), vol 10135. Springer, Cham. https://doi.org/10.1007/978-3-319-52015-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52015-5_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52014-8

  • Online ISBN: 978-3-319-52015-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics