Enhancing Credit Card Fraud Detection: Privacy-Preserving Association Rule Mining with Secure Multi-Party Computation
Abstract
The proposed research presents a novel method of enhancing credit-card fraud detection using Secure Multi-Party Computation (SMPC), a privacy-saving method. At present data privacy is of utmost concern and the proposed methodology can eliminate the problem of carrying out fruitful fraud detection without putting privacy of user data in danger. Using SMPC, several entities are able to work with transaction data in a collaborative fashion without revealing any of the individual data, establishing privacy compliance. The study aims at a privacy-preserving framework for identifying fraud in credit card payments by linking SMPC and the FP-Growth algorithm. The usage of SMPC means that cooperative calculations may be done without revealing sensitive data, avoiding the possibility of data leakage. As a powerful Association Rule Mining (ARM) approach, FP-Growth protects the secrecy of individual transactions while effectively detecting hidden patterns and correlations inside transaction datasets. The framework is tested using extensive performance metrics including as accuracy, precision, recall, and F1-score, which serve as a robust standard for determining its dependability. The results show that the suggested technique is highly effective in identifying fraudulent actions while ensuring tight privacy protection.
Keywords
References
- Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases (VLDB ’94) (pp. 487–499). Morgan Kaufmann.
- Aggarwal, C. C., & Yu, P. S. (2008). A general survey of privacy-preserving data mining models and algorithms. In: C. C. Aggarwal & P. S. Yu (Eds.), Privacy-preserving data mining: Models and algorithms (pp. 11–52). Springer. https://doi.org/10.1007/978-0-387-70992-5_2
- Benchaji, I., Douzi, S., & El Ouahidi, B. (2021). Credit card fraud detection model based on LSTM recurrent neural networks. Journal of Advances in Information Technology, 12(2), 113–118. https://doi.org/10.12720/jait.12.2.113-118
- Bhutta, M. N. M., Irtaza, G., Mehmood, A., Hamood, R., Makhdoom, I., ELHADEF, M., & Rehman, M. H. U. (2026). A systematic review of secure federated learning based on blockchain and Multi-Party computation. Peer-to-Peer Networking and Applications, 19, 7. https://doi.org/10.1007/s12083-025-02167-6
- Diaz-Garcia, J. A., Ruiz, M. D., & Martin-Bautista, M. J. (2023). A survey on the use of association rules mining techniques in textual social media. Artificial Intelligence Review, 56, 1175–1200. https://doi.org/10.1007/s10462-022-10196-3
- Du, W., & Atallah, M. J. (2001). Secure multi-party computation problems and their applications: A review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms (pp. 13–22).
- Dwork, C. (2006). Differential Privacy. In: M. Bugliesi, B. Preneel, V. Sassone, & I. Wegener (Eds.), Automata, Languages and Programming. ICALP 2006 (Lecture Notes in Computer Science, Vol. 4052). Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787006_1
- Gamiz, I., Regueiro, C., Lage, O., Jacob, E., & Astorga, J. (2025). Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations. International Journal of Information Security, 24, 27. https://doi.org/10.1007/s10207-024-00939-4
Details
Primary Language
English
Subjects
Data Mining and Knowledge Discovery
Journal Section
Research Article
Publication Date
March 31, 2026
Submission Date
October 16, 2025
Acceptance Date
March 16, 2026
Published in Issue
Year 2026 Volume: 13 Number: 1