TY - CONF
T1 - A secure framework for anti-money-laundering using machine learning and secret sharing
AU - Zandand, Arman
AU - Orwell, James
AU - Pfluegel, Eckhard
N1 - Note: Published in: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), ISBN 9781728164298
Organising Body: IEEE
PY - 2020/6
Y1 - 2020/6
N2 - Nowadays, the scale of Money Laundering is difficult to estimate in the UK and elsewhere. Proceeds of crimes might be transferred using the available business infrastructure offered by banks, and this is a considerable problem. This paper outlines a novel scheme that allows banks to share information leading to Money Laundering (ML) detection all the while preserving confidentiality and integrity. The main contribution is the overall architecture that aims to improve ML detection by getting other banks to collaborate. In order to get other banks to co-operate, a primary directive of preserving privacy is enforced throughout the framework. The proposed scheme has two particular aspects, one of which is the application of encrypted data used in machine learning for ML detection. Another feature is using secret sharing as a collaborative element in this context. These aspects are found in the three phases of the framework: Signalling to the Auditor, ML Detection and finally Suspicious Activity Report (SAR) Feedback.
AB - Nowadays, the scale of Money Laundering is difficult to estimate in the UK and elsewhere. Proceeds of crimes might be transferred using the available business infrastructure offered by banks, and this is a considerable problem. This paper outlines a novel scheme that allows banks to share information leading to Money Laundering (ML) detection all the while preserving confidentiality and integrity. The main contribution is the overall architecture that aims to improve ML detection by getting other banks to collaborate. In order to get other banks to co-operate, a primary directive of preserving privacy is enforced throughout the framework. The proposed scheme has two particular aspects, one of which is the application of encrypted data used in machine learning for ML detection. Another feature is using secret sharing as a collaborative element in this context. These aspects are found in the three phases of the framework: Signalling to the Auditor, ML Detection and finally Suspicious Activity Report (SAR) Feedback.
KW - Computer science and informatics
U2 - 10.1109/CyberSecurity49315.2020.9138889
DO - 10.1109/CyberSecurity49315.2020.9138889
M3 - Paper
T2 - 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
Y2 - 15 June 2020 through 19 June 2020
ER -