SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 647
SECURE MULTIPLE BANK TRANSACTION LOG: A CASE STUDY
Amol Bhatnagar1
, Shekhar Tanwar2
, R. Manjula3
1
Student, Computer Science & Engineering, VIT University, Tamil Nadu, India
2
Student, Computer Science & Engineering, VIT University, Tamil Nadu, Indi
3
Professor, Computer Science & Engineering, VIT University, Tamil Nadu, India
Abstract
This work will demonstrate a case study of a secure multiple bank transaction log. In particular we have implemented and evaluate a
multiple bank transaction maintenance log. In this application we have implemented a transaction catalog which will maintain the
transaction log from various bank in which the user has accounts. In this application we have identified a set of security issues and
have applied the appropriate approach to minimize these security issues.
Keywords: Security, Mobile databases, Server, Consortium, MySQL database, Mobile device, Third party auditor.
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
The use of mobile devices is increasing day by day. Every day
there is an increase in the processing and computation power of
the mobile devices and new technologies are being
implemented to support the growing need of the mobile
technology. Now database management is not only limited to
the field of web technology but has expanded itself to cover
mobile technologies as well. We have developed an application
that comprises of a central database connected through a server
to consortium of different banks and a number of autonomous
mobile users with a mobile application.
One of the most important issue of concern in this application
is providing sufficient security and privacy of the user data.
Security issues of data flow through mobile devices are of
prime importance as this involves the consortiums of different
banks which will be carrying the important private data. We
have come up with a solution that will ensure the security of
the user data through an additional layer of security that we
will discuss in the later part.
2. SECURE TRANSACTION LOG
We have considered the following system to maintain a secure
transaction of multiple banks; our application is basically
divided into three parts:
 A mobile device running on the Android Platform.
 A mobile database maintaining the transaction log.
 A third party Auditor for additional layer of
security
 A PHP based web server.
 Assumed bank consortium.
Fig-1: Secure transaction log of different bank
2.1. Mobile Device
The application running on the mobile device comprises of an
interactive user interface. This user interface is compatible to
all the android versions in the market. Through this user
interface, user can interactively maintain their transaction log
both in offline and online modes [2].
When the client is operating in offline mode then the client has
a privilege to maintain the transaction log manually without
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 648
having connected to the server. This approach has several
advantages compared to orthodox approach where there is no
local storage available on the mobile device.
 Reduced dependency on network usage: As this
application can work in an offline mode, thus it
helps in reducing the dependency on network
usage.
 Immediate access: Except for the
synchronization of the latest entry, this
application has access to all the previous
transaction, enabling user the immediate access
to all his transaction.
 Energy efficient: Once synchronized this
application will update and maintain the
transaction log locally on the mobile database,
thereby reducing the need to synchronize and
use the mobile hardware every time to access the
transaction.
2.2. Mobile Database
Basically the mobile database is used to maintain the
transaction log. The mobile database consists of two tables i.e.
transaction and accounts, the transaction table is responsible of
holding all the transaction from the different banks and account
table maintains the information about the different accounts
which the user had registered on this application [1]. Moreover
the updation made through the transaction would be reflected
back in the accounts table as well.
2.2.1. Security Issue
This application will provide two fold security i.e.
 The user level security.
 Network connection security.
2.2.1.1. User Level Security
As this application consists of sensitive data there is a need of
providing two layers of security. The first layer of secure
access consists of providing the propriety use of passwords
security, this phase will enables user to create a password
protected environment and will restrict the malicious use of
information by the other user as the password is only known to
the authorizing user.
Due to the modernization of different cryptographic
techniques, the security through password is no moreover a
secure access [7]. Thus to overcome this issue, there is a need
of providing a more efficient, reliable and robust algorithm of
supporting the futuristic need of security. One of these
algorithms which we have implemented is providing the
application with a third party auditor (TPA). Before allowing
access to the application, the TPA will authenticate the user by
a secret key which will be send to the authorized email of the
user. This secret key will consists of pseudo randomly
generated alphanumeric characters of length 6 or more, there
by restricting the unauthorized access to the user data.
2.2.1.2. Network Connection Security
To maintain the efficient transaction log, the mobile database
and the central database have to be synchronized at a particular
time. This synchronization of both the databases is
implemented in the system software of the mobile device and is
performed on the HTTP protocol to serve the synchronization
at a specific time [4]. Using HTTP protocol has the significant
advantages, which will provide a wide range of protocol for the
synchronization operation and a minor disadvantage of lower
performance than the other protocols for the database
synchronization operation. More precisely we have used secure
HTTP protocol (HTTPS) to achieve the synchronization
between the mobile database and the central database [10]. The
reason for choosing HTTPS is as follows:
 HTTPS ensures authentication of the server computer.
 HTTPS ensures authentication of the client computer.
 Secure transfer that is confidentiality of the data that
is transferred.
2.3. Third Party Auditor
As this application includes the high sensitive data of the user
thus there is a need to provide the additional layer of security to
the user. This addition layer of security ensures the integrity of
the user and prevents the access to confidential user data by an
unwanted user. This third layer of security that is third party
auditor will ensure more restricted access to the application by
the following way.
Before allowing access to the application, the TPA will
authenticate the user by a secret key which will be send to the
authorized email of the user. This secret key will consists of
pseudo randomly generated alphanumeric characters of length
6 or more, there by restricting the unauthorized access to the
user data [9]. The secret key generation involves the
java.util.UUID library and generates and 128 bit key which we
have limited to 6 bit of length only. This secret key length can
be controlled according to the level of the security demanded
by the user.
2.4. A Web Server
A web server is behaving as a portal to provide synchronization
of mobile database and the central database.
2.5. Assumed Bank Consortium
It consists of a database which contains the table holding the
various transactions being carried out by the user. On polling
the database picks up the latest row entered into the database
and update this row to the mobile database thus updating the
transaction log [3].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 649
3. ARCHITECTURE
The architecture of secure transaction log maintenance is
shown in figure 2.This application works on the Client Server
Architecture. The Client side of the application basically
consists of three important modules i.e. Mobile Database,
Application Interface and the User Interface. The Application
Interface provide the user the interactive way of
communicating with the mobile database, basically the
application interface provides the end to end communication
link that is used to transfer data between the mobile database
and the user interface [5].
Basically the client side is a mobile application with a
graphical user interface that used to provide an interactive way
of maintaining a transaction log of the user. The mobile
database is a small database on the client side i.e. mobile
device which reflects the specific past of the bank database.
Fig-2: Architecture of the application
The server side of the application also has three main
components i.e. web server, web agent and bank database. The
bank database provides the transaction information updated by
the specific bank according to the user activity [6]. The web
agent connects the web server to the bank database; basically
the web agent provides the end to end connection between the
web server and the web database.
This application has to use a communication link between the
client side and the server side for maintaining the updated
transaction log. The link is secured by HTTPS protocol but
there is another way of establishing the link like JSON object
4. The MOBILE APPLICATION
We consider the following mobile application: In this
application there is a read only client which is basically used to
access the application, the viewer will provide the user with the
different options like Add Account, Add transaction, View
Transaction ,View Account and the web server connected with
the bank database to provide the synchronization [8].
The Add Account feature in the application will provide a way
to add the new account to the application, Add Transaction is
used to add the transaction manually, View Transaction will
provide the synchronized transaction log obtained from the
bank database through a secure server connection and View
Account will list all the account added by the user in this
application.
Fig-3: The mobile application
5. CONCLUSIONS
Paper proposes the models which enables a user to maintain the
secure multiple bank transaction log over a secure channel.
This application will provide two fold security i.e. The user
level security and Security of network connection. This will
ensure the privacy and the protection of the user from
unauthorized access.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 650
FUTURE WORK
In particular we have developed a prototype of a mobile
application which maintains a transaction log of the various
transactions that a user makes in various bank accounts. We
have identified a set of security issue in maintaining secure
transaction log and had implemented an additional layer of
security through a third interface that will ensure the
authenticity of the user. In future work we will try to improve
our models in respect of the security and performance issues
also we propose to increase the efficiency of the fetching of the
data from the database and making it more robust.
ACKNOWLEDGEMENTS
We would like to express our sincere gratitude to my guide and
the other author of this paper for their valuable help.
REFERENCES
[1]. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant,
and Yirong Xu. Hippo-cratic databases. In 28th Int’l Conf. on
Very Large Databases (VLDB), Hong Kong, 2002
[2]. Guy Bernard, Jalel Ben-Othman, Luc Bouganim, G´erˆome
Canals, Sophie Chabri-don, Bruno Defude, Jean Ferri´e,
St´ephane Gan¸carski, Rachid Guerraoui, Pas-cal Molli,
Philippe Pucheral, Claudia Roncancio, Patricia Serrano-
Alvarado, andPatrick Valduriez. Mobile databases: a selection
of open issues and research directions. SIGMOD Record,
33(2):78–83, 2004.
[3]. Thomas Connolly and Carolyn E. Begg. Database
Systems:A Practical Approachto Design, Implementation and
Management 4th Ed. Addison-Wesley, 2005.
[4]. Microsoft Corporation. Step by step: Developing a sql
mobile application withvisual studio 2005 and sql server2005,
June2006.(http://msdn2.microsoft.com/enus/library/aa454892.a
spx).
[5]. Georgios Drosatos. Data management on platforms with
restricted computational resources Master’s thesis, Dept.
Electrical and Computer Engineering, School of Engineering,
Democritus University of Thrace, Greece, 2006 Written in
Modern Greek
[6]. Ramez Elmasri and Shamkant B. Navathe. Fundamentals
of Database Systems, 4th Edition Addison-Wesley, 2004
[7]. Benjamin Halpert. Mobile device security In InfoSecCD
’04: Proceedings of the 1st annual conference on Information
security curriculum development, pages 99–101,New York,
NY, USA, 2004. ACM Press
[8]. Sushil Jajodia. Database security and privacy ACM
Comput. Surv., 28(1):129–131, 1996.
[9]. Sumit Jeloka. Oracle Database Security Guide Oracle
Corp., Redwood City, CA,USA, February 2005. B14266-01
[10]. Abraham Silberschatz, Henry F. Korth, and S. Sudarshan.
Database System Concepts, 5th Edition McGraw-Hill Book
Company, 2005
BIOGRAPHIES
Manjula R, associate professor at VIT
University. E-mail: rmanjula@vit.ac.in
Amol Bhatnagar, student of computer
science engineering at Vellore Institute Of
Technology, Vellore, Tamil Nadu. He is
currently pursuing B.Tech in Computer
science at VIT University. His current area of
research includes Cloud Computing.
Email:amolmbd@gmail.com
Shekhar Tanwar, student of computer
science engineering at Vellore Institute Of
Technology, Vellore, Tamil Nadu. He is
currently pursuing B.Tech in Computer
science at VIT University. His current area
of research includes Mobile application
development.
E-mail: shekhart91@gmail.com

More Related Content

What's hot

A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scetpankaj gamit
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger serviceAditya Gupta
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingIRJET Journal
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 

What's hot (19)

A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger service
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
120 i143
120 i143120 i143
120 i143
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
A011140104
A011140104A011140104
A011140104
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
 
P0704085089
P0704085089P0704085089
P0704085089
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 

Viewers also liked

2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UKGary Chambers
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationPa Al
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03Akash Kamble
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureKim Jensen
 
The Everyday Bank: The Role of Cloud Computing in the Future of Banking
The Everyday Bank: The Role of Cloud Computing in the Future of BankingThe Everyday Bank: The Role of Cloud Computing in the Future of Banking
The Everyday Bank: The Role of Cloud Computing in the Future of BankingAccenture Technology
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Protecting your business - managing flood risk
Protecting your business - managing flood risk Protecting your business - managing flood risk
Protecting your business - managing flood risk Lucas Fettes & Partners
 
Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...eSAT Publishing House
 
Wavelet based ecg signal component identification
Wavelet based ecg signal component identificationWavelet based ecg signal component identification
Wavelet based ecg signal component identificationeSAT Publishing House
 
An experimental investigation into the performance
An experimental investigation into the performanceAn experimental investigation into the performance
An experimental investigation into the performanceeSAT Publishing House
 
Design of vco using current mode logic with low supply
Design of vco using current mode logic with low supplyDesign of vco using current mode logic with low supply
Design of vco using current mode logic with low supplyeSAT Publishing House
 
Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...eSAT Publishing House
 
Vlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter forVlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter foreSAT Publishing House
 
A survey on clustering techniques for identification of
A survey on clustering techniques for identification ofA survey on clustering techniques for identification of
A survey on clustering techniques for identification ofeSAT Publishing House
 

Viewers also liked (20)

2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK
 
Cloud computing for banking
Cloud computing for bankingCloud computing for banking
Cloud computing for banking
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cloud banking
Cloud bankingCloud banking
Cloud banking
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - Accenture
 
Green banking
Green bankingGreen banking
Green banking
 
The Everyday Bank: The Role of Cloud Computing in the Future of Banking
The Everyday Bank: The Role of Cloud Computing in the Future of BankingThe Everyday Bank: The Role of Cloud Computing in the Future of Banking
The Everyday Bank: The Role of Cloud Computing in the Future of Banking
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Protecting your business - managing flood risk
Protecting your business - managing flood risk Protecting your business - managing flood risk
Protecting your business - managing flood risk
 
Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...
 
Wavelet based ecg signal component identification
Wavelet based ecg signal component identificationWavelet based ecg signal component identification
Wavelet based ecg signal component identification
 
An experimental investigation into the performance
An experimental investigation into the performanceAn experimental investigation into the performance
An experimental investigation into the performance
 
Design of vco using current mode logic with low supply
Design of vco using current mode logic with low supplyDesign of vco using current mode logic with low supply
Design of vco using current mode logic with low supply
 
Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...
 
Vlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter forVlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter for
 
A survey on clustering techniques for identification of
A survey on clustering techniques for identification ofA survey on clustering techniques for identification of
A survey on clustering techniques for identification of
 

Similar to Secure multiple bank transaction log a case study

Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Journals
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsIJNSA Journal
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSIJNSA Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Centralized Tool for Software and USB
Centralized Tool for Software and USBCentralized Tool for Software and USB
Centralized Tool for Software and USBijtsrd
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
 

Similar to Secure multiple bank transaction log a case study (20)

Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
publishable paper
publishable paperpublishable paper
publishable paper
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applications
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Centralized Tool for Software and USB
Centralized Tool for Software and USBCentralized Tool for Software and USB
Centralized Tool for Software and USB
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Secure multiple bank transaction log a case study

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 647 SECURE MULTIPLE BANK TRANSACTION LOG: A CASE STUDY Amol Bhatnagar1 , Shekhar Tanwar2 , R. Manjula3 1 Student, Computer Science & Engineering, VIT University, Tamil Nadu, India 2 Student, Computer Science & Engineering, VIT University, Tamil Nadu, Indi 3 Professor, Computer Science & Engineering, VIT University, Tamil Nadu, India Abstract This work will demonstrate a case study of a secure multiple bank transaction log. In particular we have implemented and evaluate a multiple bank transaction maintenance log. In this application we have implemented a transaction catalog which will maintain the transaction log from various bank in which the user has accounts. In this application we have identified a set of security issues and have applied the appropriate approach to minimize these security issues. Keywords: Security, Mobile databases, Server, Consortium, MySQL database, Mobile device, Third party auditor. -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION The use of mobile devices is increasing day by day. Every day there is an increase in the processing and computation power of the mobile devices and new technologies are being implemented to support the growing need of the mobile technology. Now database management is not only limited to the field of web technology but has expanded itself to cover mobile technologies as well. We have developed an application that comprises of a central database connected through a server to consortium of different banks and a number of autonomous mobile users with a mobile application. One of the most important issue of concern in this application is providing sufficient security and privacy of the user data. Security issues of data flow through mobile devices are of prime importance as this involves the consortiums of different banks which will be carrying the important private data. We have come up with a solution that will ensure the security of the user data through an additional layer of security that we will discuss in the later part. 2. SECURE TRANSACTION LOG We have considered the following system to maintain a secure transaction of multiple banks; our application is basically divided into three parts:  A mobile device running on the Android Platform.  A mobile database maintaining the transaction log.  A third party Auditor for additional layer of security  A PHP based web server.  Assumed bank consortium. Fig-1: Secure transaction log of different bank 2.1. Mobile Device The application running on the mobile device comprises of an interactive user interface. This user interface is compatible to all the android versions in the market. Through this user interface, user can interactively maintain their transaction log both in offline and online modes [2]. When the client is operating in offline mode then the client has a privilege to maintain the transaction log manually without
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 648 having connected to the server. This approach has several advantages compared to orthodox approach where there is no local storage available on the mobile device.  Reduced dependency on network usage: As this application can work in an offline mode, thus it helps in reducing the dependency on network usage.  Immediate access: Except for the synchronization of the latest entry, this application has access to all the previous transaction, enabling user the immediate access to all his transaction.  Energy efficient: Once synchronized this application will update and maintain the transaction log locally on the mobile database, thereby reducing the need to synchronize and use the mobile hardware every time to access the transaction. 2.2. Mobile Database Basically the mobile database is used to maintain the transaction log. The mobile database consists of two tables i.e. transaction and accounts, the transaction table is responsible of holding all the transaction from the different banks and account table maintains the information about the different accounts which the user had registered on this application [1]. Moreover the updation made through the transaction would be reflected back in the accounts table as well. 2.2.1. Security Issue This application will provide two fold security i.e.  The user level security.  Network connection security. 2.2.1.1. User Level Security As this application consists of sensitive data there is a need of providing two layers of security. The first layer of secure access consists of providing the propriety use of passwords security, this phase will enables user to create a password protected environment and will restrict the malicious use of information by the other user as the password is only known to the authorizing user. Due to the modernization of different cryptographic techniques, the security through password is no moreover a secure access [7]. Thus to overcome this issue, there is a need of providing a more efficient, reliable and robust algorithm of supporting the futuristic need of security. One of these algorithms which we have implemented is providing the application with a third party auditor (TPA). Before allowing access to the application, the TPA will authenticate the user by a secret key which will be send to the authorized email of the user. This secret key will consists of pseudo randomly generated alphanumeric characters of length 6 or more, there by restricting the unauthorized access to the user data. 2.2.1.2. Network Connection Security To maintain the efficient transaction log, the mobile database and the central database have to be synchronized at a particular time. This synchronization of both the databases is implemented in the system software of the mobile device and is performed on the HTTP protocol to serve the synchronization at a specific time [4]. Using HTTP protocol has the significant advantages, which will provide a wide range of protocol for the synchronization operation and a minor disadvantage of lower performance than the other protocols for the database synchronization operation. More precisely we have used secure HTTP protocol (HTTPS) to achieve the synchronization between the mobile database and the central database [10]. The reason for choosing HTTPS is as follows:  HTTPS ensures authentication of the server computer.  HTTPS ensures authentication of the client computer.  Secure transfer that is confidentiality of the data that is transferred. 2.3. Third Party Auditor As this application includes the high sensitive data of the user thus there is a need to provide the additional layer of security to the user. This addition layer of security ensures the integrity of the user and prevents the access to confidential user data by an unwanted user. This third layer of security that is third party auditor will ensure more restricted access to the application by the following way. Before allowing access to the application, the TPA will authenticate the user by a secret key which will be send to the authorized email of the user. This secret key will consists of pseudo randomly generated alphanumeric characters of length 6 or more, there by restricting the unauthorized access to the user data [9]. The secret key generation involves the java.util.UUID library and generates and 128 bit key which we have limited to 6 bit of length only. This secret key length can be controlled according to the level of the security demanded by the user. 2.4. A Web Server A web server is behaving as a portal to provide synchronization of mobile database and the central database. 2.5. Assumed Bank Consortium It consists of a database which contains the table holding the various transactions being carried out by the user. On polling the database picks up the latest row entered into the database and update this row to the mobile database thus updating the transaction log [3].
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 649 3. ARCHITECTURE The architecture of secure transaction log maintenance is shown in figure 2.This application works on the Client Server Architecture. The Client side of the application basically consists of three important modules i.e. Mobile Database, Application Interface and the User Interface. The Application Interface provide the user the interactive way of communicating with the mobile database, basically the application interface provides the end to end communication link that is used to transfer data between the mobile database and the user interface [5]. Basically the client side is a mobile application with a graphical user interface that used to provide an interactive way of maintaining a transaction log of the user. The mobile database is a small database on the client side i.e. mobile device which reflects the specific past of the bank database. Fig-2: Architecture of the application The server side of the application also has three main components i.e. web server, web agent and bank database. The bank database provides the transaction information updated by the specific bank according to the user activity [6]. The web agent connects the web server to the bank database; basically the web agent provides the end to end connection between the web server and the web database. This application has to use a communication link between the client side and the server side for maintaining the updated transaction log. The link is secured by HTTPS protocol but there is another way of establishing the link like JSON object 4. The MOBILE APPLICATION We consider the following mobile application: In this application there is a read only client which is basically used to access the application, the viewer will provide the user with the different options like Add Account, Add transaction, View Transaction ,View Account and the web server connected with the bank database to provide the synchronization [8]. The Add Account feature in the application will provide a way to add the new account to the application, Add Transaction is used to add the transaction manually, View Transaction will provide the synchronized transaction log obtained from the bank database through a secure server connection and View Account will list all the account added by the user in this application. Fig-3: The mobile application 5. CONCLUSIONS Paper proposes the models which enables a user to maintain the secure multiple bank transaction log over a secure channel. This application will provide two fold security i.e. The user level security and Security of network connection. This will ensure the privacy and the protection of the user from unauthorized access.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 650 FUTURE WORK In particular we have developed a prototype of a mobile application which maintains a transaction log of the various transactions that a user makes in various bank accounts. We have identified a set of security issue in maintaining secure transaction log and had implemented an additional layer of security through a third interface that will ensure the authenticity of the user. In future work we will try to improve our models in respect of the security and performance issues also we propose to increase the efficiency of the fetching of the data from the database and making it more robust. ACKNOWLEDGEMENTS We would like to express our sincere gratitude to my guide and the other author of this paper for their valuable help. REFERENCES [1]. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Hippo-cratic databases. In 28th Int’l Conf. on Very Large Databases (VLDB), Hong Kong, 2002 [2]. Guy Bernard, Jalel Ben-Othman, Luc Bouganim, G´erˆome Canals, Sophie Chabri-don, Bruno Defude, Jean Ferri´e, St´ephane Gan¸carski, Rachid Guerraoui, Pas-cal Molli, Philippe Pucheral, Claudia Roncancio, Patricia Serrano- Alvarado, andPatrick Valduriez. Mobile databases: a selection of open issues and research directions. SIGMOD Record, 33(2):78–83, 2004. [3]. Thomas Connolly and Carolyn E. Begg. Database Systems:A Practical Approachto Design, Implementation and Management 4th Ed. Addison-Wesley, 2005. [4]. Microsoft Corporation. Step by step: Developing a sql mobile application withvisual studio 2005 and sql server2005, June2006.(http://msdn2.microsoft.com/enus/library/aa454892.a spx). [5]. Georgios Drosatos. Data management on platforms with restricted computational resources Master’s thesis, Dept. Electrical and Computer Engineering, School of Engineering, Democritus University of Thrace, Greece, 2006 Written in Modern Greek [6]. Ramez Elmasri and Shamkant B. Navathe. Fundamentals of Database Systems, 4th Edition Addison-Wesley, 2004 [7]. Benjamin Halpert. Mobile device security In InfoSecCD ’04: Proceedings of the 1st annual conference on Information security curriculum development, pages 99–101,New York, NY, USA, 2004. ACM Press [8]. Sushil Jajodia. Database security and privacy ACM Comput. Surv., 28(1):129–131, 1996. [9]. Sumit Jeloka. Oracle Database Security Guide Oracle Corp., Redwood City, CA,USA, February 2005. B14266-01 [10]. Abraham Silberschatz, Henry F. Korth, and S. Sudarshan. Database System Concepts, 5th Edition McGraw-Hill Book Company, 2005 BIOGRAPHIES Manjula R, associate professor at VIT University. E-mail: rmanjula@vit.ac.in Amol Bhatnagar, student of computer science engineering at Vellore Institute Of Technology, Vellore, Tamil Nadu. He is currently pursuing B.Tech in Computer science at VIT University. His current area of research includes Cloud Computing. Email:amolmbd@gmail.com Shekhar Tanwar, student of computer science engineering at Vellore Institute Of Technology, Vellore, Tamil Nadu. He is currently pursuing B.Tech in Computer science at VIT University. His current area of research includes Mobile application development. E-mail: shekhart91@gmail.com