Skip to main content

On the Application of SDC Stream Methods to Card Payments Analytics

  • Conference paper
  • First Online:
Book cover Modeling Decisions for Artificial Intelligence (MDAI 2018)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11144))

  • 658 Accesses

Abstract

Banks and financial services have to constantly innovate their online payment services to avoid large digital companies take the control of online card transactions, relegating traditional banks to simple payments carriers. Apart from creating new payment methods (e.g. contact-less cards, mobile wallets, etc.), banks offers new services based on historical payments data to endow traditional payments methods with new services and functionalities. In this latter case, it is where privacy preserving techniques play a fundamental role ensuring personal data is managed full-filling all the applicable laws and regulations. In this paper, we introduce some ideas about how SDC stream anonymization methods could be used to mask payments data streams. Besides, we also provide some experimental results over a real card payments database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    BBVA C360 – https://www.bbva.es/autonomos/banca-online/commerce360/index.jsp.

  2. 2.

    Banc Sabadell Kelvin Retail – https://www.bancsabadell.com/cs/Satellite/SabAtl/Kelvin-Retail/6000019696135/es/.

References

  1. Domingo-Ferrer, J., Torra, V.: Disclosure control methods and information loss for microdata. In: Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies, pp. 91–110. Elsevier Science (2001)

    Google Scholar 

  2. Domingo-Ferrer, J., Torra, V.: Disclosure risk assessment in statistical data protection. J. Comput. Appl. Math. 164, 285–293 (2003)

    MathSciNet  MATH  Google Scholar 

  3. Domingo-Ferrer, J., Sebé, F., Solanas, A.: A polynomial-time approximation to optimal multivariate microaggregation. Comput. Math. Appl. 55(4), 714–732 (2008)

    Article  MathSciNet  Google Scholar 

  4. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  5. Hundepool, A., et al.: Statistical Disclosure Control. Wiley, New York (2012)

    Book  Google Scholar 

  6. Leo, Y., Karsai, M., Sarraute, C., Fleury, E.: Correlations of consumption patterns in social-economic networks. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 493–500. IEEE (2016)

    Google Scholar 

  7. Leoni, D.: Non-interactive differential privacy: a survey. In: Proceedings of the First International Workshop on Open Data, WOD 2012, pp. 40–52. ACM, New York (2012)

    Google Scholar 

  8. Li, N., Lyu, M., Su, D., Yang, W.: Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, vol. 8, pp. 1–138 (2016)

    Article  Google Scholar 

  9. Martínez-Rodríguez, D., Nin, J., Nuñez-del-Prado, M.: Towards the adaptation of SDC methods to stream mining. Comput. Secur. 70, 702–722 (2017)

    Article  Google Scholar 

  10. Mateo-Sanz, J.M., Domingo-Ferrer, J., Sebé, F.: Probabilistic information loss measures in confidentiality protection of continuous microdata. Data Min. Knowl. Discov. 11(2), 181–193 (2005)

    Article  MathSciNet  Google Scholar 

  11. BBVA API Market. https://www.bbvaapimarket.com/

  12. Information Commissioner’s Office Guide to the General Data Protection Regulation (GDPR). https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/whats-new/

  13. Navarro-Arribas, G., Torra, V.: Rank swapping for stream data. In: Torra, V., Narukawa, Y., Endo, Y. (eds.) MDAI 2014. LNCS (LNAI), vol. 8825, pp. 217–226. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12054-6_19

    Chapter  Google Scholar 

  14. Nin, J., Herranz, J., Torra, V.: Rethinking rank swapping to decrease disclosure risk. Data Knowl. Eng. 64(1), 346–364 (2008)

    Article  Google Scholar 

  15. Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., Martínez, S.: Enhancing data utility in differential privacy via microaggregation-based k-anonymity. Very Large Data Base J. 23(5), 771–794 (2014)

    Article  Google Scholar 

  16. Templ, M., Meindl, B., Kowarik, A.: Introduction to statistical disclosure control (SDC). http://cran.r-project.org/web/packages/sdcMicro/vignettes/sdc_guidelines.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jordi Nin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nuñez-del-Prado, M., Nin, J. (2018). On the Application of SDC Stream Methods to Card Payments Analytics. In: Torra, V., Narukawa, Y., Aguiló, I., González-Hidalgo, M. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2018. Lecture Notes in Computer Science(), vol 11144. Springer, Cham. https://doi.org/10.1007/978-3-030-00202-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00202-2_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00201-5

  • Online ISBN: 978-3-030-00202-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics