The Secured Financial Transaction Network using User Identity Verification

Mallampalli Sneha, P Rama Krishna

Abstract


Financialdistortion, for example, tax evasion, is known to be a genuine procedure of offense that makes misguidedly acquired assets go to psychological oppression or other crime. This sort of criminal operations include complex systems of exchange and money related exchanges, which makes it hard to recognize the misrepresentation substances and find the highlights of extortion. Luckily, exchanging/exchange system and highlights of substances in the system can be developed from the mind boggling systems of the exchange and money related exchanges. In this manner, system and highlights give reciprocal data to misrepresentation identification, which can possibly improve extortion recognition execution. Meeting the executives in circulated Internet services is customarily based on username and secret key, express logouts and instruments of client meeting lapse utilizing great breaks. Developing biometric arrangements permit subbing username and secret key with biometric data during meeting foundation, yet in such a methodology still a solitary check is regarded adequate, and the identity of a client is viewed as unchanging during the whole meeting. This paper investigates promising choices offered by applying biometrics in the administration of meetings. A safe convention is characterized for never-ending validation through nonstop client confirmation. The convention decides versatile breaks based on the quality, recurrence and kind of biometric data straightforwardly gained from the client. The examination is completed to evaluate the capacity of the convention to differentiate security assaults practiced by various types of assailants.


Keywords


Web Security, Authentication, Continuous client confirmation, biometric verification.

References


Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, Andrea Bondavalli, Continuous and Transparent User Identity Verification for Secure Internet ServicesIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 3, MAY/JUNE 2015.

Sathish Kumar M., Karrunakaran C.M., Vikram M., "Process facilitated enhancement of lipase production from germinated maize oil in Bacillus spp. using various feeding strategies", Australian Journal of Basic and Applied Sciences, ISSN : 1991-8178, 4(10) (2010) pp. 4958-4961.

CASHMA - Context Aware Security by Hierarchical Multilevel Architectures, MIUR FIRB 2005

Kaliyamurthie K.P., Parameswari D., Udayakumar R., "QOS aware privacy preserving location monitoring in wireless sensor network", Indian Journal of Science and Technology, ISSN : 0974-6846, 6(S5) (2013) pp.4648-4652.

L. Hong, A. Jain, and S. Pankanti, “Can Multibiometrics Improve Per- formance?,” Proc. AutoID’99, Summit, NJ, pp. 59–64, 1999.

Sharmila D., Muthusamy P., "Removal of heavy metal from industrial effluent using bio adsorbents (Camellia sinensis)", Journal of Chemical and Pharmaceutical Research, ISSN : 0975 – 7384, 5(2) (2013) pp.10-13.

S. Ojala, J. Keinanen, J. Skytta, “Wearable authentication device for transparent login in nomadic applications environment,” Proc. 2nd International Conference on Signals, Circuits and Systems (SCS 2008), pp. 1-6, 7-9 Nov. 2008 phase directly on the client device)

Udayakumar R., Khanaa V., Saravanan T., Saritha G., "Retinal image analysis using curvelet transform and multistructure elements morphology by reconstruction", Middle - East Journal of Scientific Research, ISSN : 1990-9233, 16(12) (2013) pp.1781-1785.

Kalaiselvi V.S., Prabhu K., Ramesh M., Venkatesan V., "The association of serum osteocalcin with the bone mineral density in post menopausalwomen",Journal of Clinical and Diagnostic Research, ISSN : 0973 - 709X, 7(5) (2013) pp.814-816.

Kulanthaivel L., Srinivasan P., Shanmugam V., Periyasamy B.M., "Therapeutic efficacy of kaempferol against AFB1 induced experimental hepatocarcinogenesis with reference to lipid peroxidation, antioxidants and biotransformation enzymes", Biomedicine and Preventive Nutrition, ISSN : 2210-5239, 2(4) (2012) pp.252-259


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.