internprojects_2015

9
 Institute for Develo (Est Cas tl e Hil ls, Road N Ph: +9 Visit us: w  List of Projects offer RESEARCH AREA -1: Project – 1: Fog Computin Fog computing is a close cousin distributed nature of today’s somewhere like the cloud, the interact with every day. Fog co address a couple of growing c workin g within the limits of avai Fog computing works in conj resource. Currently, most ente after which a decision is made allows computing, decision-m pushes r elevant data t o the cl deploying fog computing in Indi Pr oj ec t – 2: Of fl ine Cert if yi Guide: Dr. N Process Flow Design Design and development Audit and Application Se Live Pilot using actual re Page 1 of 9  ment and Research in Banking Te ablished by Reserve Bank of India)   o. 1, Masab Tank, Hyderabad 500 057 40 2329 4000; Fax: +91 40 2353 5157  w.idrbt.ac.in; e-mail: [email protected]  ed for the IDRBT Pr oj ect Train during Summer 2015 FINANCIAL NETWORKS AND APPL  and its Applic ations to Banking Guide: Dr. N. Raghu Kisore, As to cloud computing, a technology that takes a vir tualiz ed I T r esources. But inst ead of b ei fo g i s al l a round us, amon g t he numerou s s putin g, like many IT d evelopments, grew ou ncerns: being able to act in real time to inc lable bandwidth.  unction with cloud computing, optimizing rprise data is pushed up to the cloud , sto re nd action taken. But this sy stem isn’t ef ficient king and action- taking to happen via IoT d ud. In this project we would like to explore an Banks.  ng Authorit y Appli cat ion  . P. Dhavale, Deputy General Man age r, Stra te of cryptographic module s (3 modules) using st urity Testing  uests from banks.  hnology  India.  e Scheme  ICATIONS  sistant Professor  dvantage of the  ng “out there”  art objects we  t of the need to  ming data and  he use of this  and analyzed,  . Fog computing  vices and only  the possible of  ic Business Unit  andard libraries  

Upload: sasidharchennamsetty

Post on 04-Feb-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 1/9

Institute for Develo(Est

Castle Hills, Road NPh: +9

Visit us: w  

List of Projects offer

RESEARCH AREA - 1 :

Project – 1: Fog Computin

Fog computing is a close cousin

distributed nature of today’s

somewhere like the cloud, the

interact with every day. Fog co

address a couple of growing c

working within the limits of avai

Fog computing works in conj

resource. Currently, most ente

after which a decision is made

allows computing, decision-m

pushes relevant data to the cl

deploying fog computing in Indi

Project – 2: Offline Certifyi

Guide: Dr. N

Process Flow Design

Design and development

Audit and Application Se

Live Pilot using actual re

Page 1 of 9

  ment and Research in Banking Teablished by Reserve Bank of India)

  o. 1, Masab Tank, Hyderabad – 500 05740 2329 4000; Fax: +91 40 2353 5157

  w.idrbt.ac.in; e-mail: [email protected]

  ed for the IDRBT Project Train

during Summer 2015

FINANCIAL NETWORKS AND APPL

  and its Applications to Banking

Guide: Dr. N. Raghu Kisore, As

to cloud computing, a technology that takes a

virtualized IT resources. But instead of bei

fog is all around us, among the numerous s

puting, like many IT developments, grew ou

ncerns: being able to act in real time to inc

lable bandwidth.

  unction with cloud computing, optimizing

rprise data is pushed up to the cloud, store

nd action taken. But this system isn’t efficient

king and action-taking to happen via IoT d

ud. In this project we would like to explore

an Banks.

  ng Authority Application

  . P. Dhavale, Deputy General Manager, Strate

of cryptographic modules (3 modules) using st

urity Testing

  uests from banks.

  hnology 

India. 

e Scheme

ICATIONS

 

sistant Professor

  dvantage of the

  ng “out there”

  art objects we

  t of the need to

  ming data and

 

he use of this

  and analyzed,

  . Fog computing

  vices and only

  the possible of 

 

ic Business Unit

 

andard libraries

 

Page 2: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 2/9

Page 2 of 9

RESEARCH AREA - 2: ELECTRONIC PAYMENTS AND SETTLEMENT

SYSTEMS

Project – 3: Mobile Governance

Guide: Dr. V. N. Sastry, Professor

Enabling the government services of various types onto every citizen’s mobile phone is a challenge. Theproject work involves study of framework of mobile governance as well as e-governance, technical

standards of m-governance, service categorization and development of a prototype mobile application

which can be used by people in multiple languages, over multiple mobile operating systems and offered

by multiple state governments.

Project – 4: Detection of Frauds in Cheque Truncation System

Guide: Dr. Rajarshi Pal, Assistant Professor

Cheque Truncation System is an image based cheque clearing system. It is used to speedy

clearing of cheques. Recently, a huge number of cases related to cheque frauds have beenencountered by banks. Cheque frauds may be of different forms, such as forging signature,

altering payee name and amount, producing duplicate cheques. This project aims to detect

such kind of forgeries by analyzing the captured image of a cheque.

Prerequisite Knowledge: Image Processing, MATLAB.

Project – 5: Prototyping the Concept of Digital Cheque and Demand Draft

Guide: Dr. Rajarshi Pal, Assistant Professor

Cheque and Demand Draft are commonly used payment instrument. Digital Cheque/ DD are

conceptualized as a digital image of a cheque/DD. Can banks, in future, issue a digital

cheque/DD, instead of, paper based cheque/DD? This project aims to seek a solution to this

question. This project will address how digital cheque/DD can be accommodated in the existing

banking system without causing significant change in the system. Moreover, this will reduce

operational cost (through reduction in printing of cheque/DD) and will enhance security of this

payment instrument (if properly designed). Frauds involving paper cheques also will reduce

with decreased usage of paper cheques.

Prerequisite Knowledge: Image Processing, Web Development in Java, Database connectivity.

Project – 6: Issue of Electronic Bank Guarantees with e-Stamping for Paymentof Stamp Duty, through SFMS.

Guide: Shri Patrick Kishore, Chief Operating Officer, Strategic Business Unit

At present Banks issue Guarantees favoring various beneficiaries including Government

Authorities on non-Judicial stamp paper. In the light of many frauds which are taking place

Page 3: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 3/9

Page 3 of 9

using counterfeit stamped paper, it is desirable to develop a system of issuing an electronic

Bank Guarantee which can be communicated by the issuing Bank to the beneficiary through the

beneficiary’s bank. This will protect Banks against fraud and make the process more efficient.

The main issue to be considered is how stamp duty can be paid into State Treasury at the

issuing branch by integrating Bank’s SFMS system with e-stamping system, before an electronic

Bank Guarantee can be issued.

Project – 7: Use of Time Stamping Services for Payment System Applications

Guide: Dr. N. P. Dhavale, Deputy General Manager, Strategic Business Unit

Banks are issuing bank guarantee to their customers and these are sent through SFMS.

The bank guarantees have specific requirement of, to be valid for a particular period and

the time at which the bank guarantee is issued can be of great business value depending

on the circumstances

On receipt of message containing bank guarantee, SFMS hub will send request for time

stamping of the same to the time stamping authority which is part of IDRBT CA. Thetime stamping token will be generated and issued to the SFMS hub which can be

included as part of the message and stored / archived by the SFMS application.

RESEARCH AREA - 3: SECURITY TECHNOLOGIES FOR THE FINANCIAL

SECTOR

Project – 8: Mobile Device Security Vulnerabilities and Prevention

Guide: Dr. V. N. Sastry, Professor

The project involves the study of vulnerabilities of mobile phones of different operating systems.Identification of possible attacks on mobile phones at different levels including operating systems,

communication channels, data bases, mobile applications and devise interfaces. It is proposed to

develop a framework for automatic identification and prevention of vulnerabilities and do prototype

implementation.

Project – 9: Digital Watermarking using Fractals

Guide: Dr. M. V. N. K. Prasad, Associate Professor

The introduction of world wide web has lead to the digital content sharing across the globe

enormously. Due to increase of Internet availability and digital image processing devices, thedigital image sharing and accessing has become simple and convenient. Thus protection of the

digital images has gained main focus of the active researchers. The Copy right is supposed to

occupy the front position in economical development among the rest of Intellectual Property

Rights. Digital Rights Management is a term generally refers to protect the copyrights of digital

Page 4: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 4/9

Page 4 of 9

media files. The protection of the digital images can be enforced through encryption and

decryption, steganographic or digital watermarking.

Watermarking is a technique to insert copy right information within digital contents. A robust

watermarking method provides information that cannot be removed from the watermarked

content. Fractal image encoding theory is developed based on the concept of Iterated function

systems. The image is separated into complex and smooth regions based on fractal dimensionand then watermark is embedded. It is infeasible to identify watermark bits in cover image

through these techniques. The proposed work is to use fractal techniques and contourlet

transformation techniques for watermarking.

Project – 10: Fingerprint Indexing

Guide: Dr. M. V. N. K. Prasad, Associate Professor

Biometric authentication refers to recognizing an individual based on his/her physiological or

behavioral characteristics, which has the capability to reliably distinguish between an

authorized person and an imposter. During the past few decades, many researchers havecarried out experiments on utilizing various biometrics for personal recognition. Among all

these biometrics (e.g., face, fingerprints, hand geometry, iris, retina, signature, voice print,

facial thermo gram, hand vein, gait, ear, odor, keystroke dynamics, etc.), fingerprint- based

recognition is one of the most mature, accurate and reliable technique.

A fingerprint is the pattern of ridges and valleys on the surface of the finger. The uniqueness of 

a fingerprint can be determined by the overall pattern of ridges and valleys as well as the local

ridge anomalies a ridge bifurcation or a ridge ending, called minutiae points. Depending on the

application context, a fingerprint recognition system may be operated in one of the two modes:

verification or identification.

In verification, the user claim his identity along with the biometric data. Then, the

system verifies the person’s identity by comparing the captured biometric with his own

biometric template pre-stored in the system. It conducts one-to-one comparison to

determine whether the identity claimed by the individual is true or not

In identification, the user does not claim any identity along with his biometric data.

Hence, the system in this mode recognizes an individual by sequentially searching the

entire template database for a match.

Note that, this sequential search process in an identification system works well for smalldatabases. But in reality the fingerprint databases contains large number of records (ex. India

AADHAR) and this process is expensive and unreliable. Therefore efficient indexing systems are

required that can search large databases in less time and without compromising system

performance. Unlike structured information such as text or numeric data that can be sorted,

fingerprint data does not have any natural sorting order. As the fingerprint data is unstructured,

Page 5: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 5/9

Page 5 of 9

this type of database cannot be indexed into alphabetical or numerical order. Therefore

indexing these fingerprint databases represents a challenging problem.

Project – 11: Biometric Cryptosystems

Guide: Dr. M. V. N. K. Prasad, Associate Professor

Abstract

In traditional Cryptosystems, user authentication is based on secret keys. If the keys are not

kept secret i.e. possessed by the attackers the system fails. Further the keys may be forgotten,

lost and stolen. Thus traditional cryptosystems cannot provide non-repudiation. Current

authentication systems using various biometric characteristics such as fingerprint, face, iris etc.

can be used in cryptosystems to resolve these problems of traditional cryptosystems. Biometric

Cryptosystems bind a cryptographic key with the biometric template stored in the database.

The key is not revealed until the successful biometric authentication.

Challenges :

Designing a method in way that if a biometric template is compromised , the

biometric itself is not lost forever and a new template can be issued

Designing a method such that different applications use different biometric

templates to ensure privacy preserving and cross matching is not possible by

tracking the applications

Designing a method to generate a cryptographic key from the biometric features

and the key management should be convenient and secure.

Project – 12: Secure Cloud Storage

Guide: Dr. G. R. Gangadharan, Assistant Professor

Cloud storage is an increasingly popular class of online services for archiving, backup, sharing of 

data, synchronization of multiple devices and it is also envisioned for future primary storage of 

enterprise data. The cloud storage system introduces security concerns over protection of data

integrity and data access control. In this project, we will propose a secure storage verification

scheme with explicit dynamic data support to ensure the correctness and availability of users’

data in the cloud.

Project – 13: Application of Hidden Markov Model for Intrusion Detection

System

Guide: Dr. N. Raghu Kisore, Assistant Professor

Network intrusion detection systems NIDS are placed at a strategic point or points within the

network to monitor traffic to and from all devices on the network. It performs an analysis for a

passing traffic on the entire subnet, works in a promiscuous mode, and matches the traffic

Page 6: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 6/9

Page 6 of 9

that is passed on the subnets to the library of known attacks. Once the attack is identified, or

abnormal behavior is sensed, the alert can be sent to the administrator. Example of the NIDS

would be installing it on the subnet where firewalls are located in order to see if someone is

trying to break into the firewall. Ideally one would scan all inbound and outbound traffic,

however doing so might create a bottleneck that would impair the overall speed of the

network.

Recent research work on Hidden Markov Model (HMM) analysis has shown that HMM is more

effective than other techniques like machine learning in detecting of computer viruses and

their classification. In this research, we propose to develop a Profile Hidden Markov Models

(PHMM) for developing Intrusion detection systems for Computer networks.

Project – 14: Modeling and Analysis of Security Requirements of Indian Banking

Community Cloud.

Guide: Dr. N. Raghu Kisore, Assistant Professor

Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years,

spurred by the realization that security must be dealt with in the earliest phases of the

software development process as these phases cover a broader organizational perspective.

Agent-oriented methodologies have proved to be especially useful in this setting as they

support the modeling of the social context in which the system-to-be will operate.

In the current project we would apply secure Trophos in order to model and analyze security

requirements alongside functional requirements of IBCC. The methodology provides a

requirements analysis process that drives system designers from the acquisition of 

requirements up to their verification.

Project – 15: Ensuring Data Storage Security in Cloud Computing

Guide: Dr. P. Syam Kumar, Assistant Professor

Data storage is an important application of cloud computing, where the users remotely store

their data into the cloud servers and access the data from cloud servers. Due to the data

outsourcing, however, this new paradigm of data storage service also introduces security

challenges, such as Confidentiality, Integrity and Availability of data. The protection of these

issues in cloud is a very challenging and potentially formidable task. The aim of this project is to

provide security protocols to ensure the Confidentiality, Integrity and Availability of data stored

in cloud.

Project – 16: Privacy-Preserving of Outsourced Data in Cloud Computing

Guide: Dr. P. Syam Kumar, Assistant Professor

Page 7: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 7/9

Page 7 of 9

With the growing popularity of cloud computing, the data owners are motivated to outsource

their data files from local sites to the commercial public cloud for great flexibility and economic

savings. Although public cloud offers many advantages, privacy of the outsourced data is a big

concern. To protect privacy, sensitive data have to be encrypted before outsourced to the

commercial public cloud, which makes effective data utilization service at very challenging task.

The aim of this project is develop an efficient privacy-preserving protocol for outsourced data in

cloud computing.

Project – 17: Mitigating DDOS Attacks in Cloud Computing

Guide: Dr. P. Syam Kumar, Assistant Professor

Distributed Denial of Service (DDOS) attacks are a great threat to service availability in cloud

computing. In recent years, DDoS attacks have increased tremendously in bandwidth and

technique. Cloud security is one of most important issue that has attracted a lot of research and

development effort in past few years. Within the cloud system, especially the Infrastructure-as-

a-Service (IaaS) clouds, the detection DDOS attacks are extremely difficult. This is because cloud

users may install vulnerable applications on their virtual machines. The aim of this project is to

design a new approach to mitigate the DDOS attacks in cloud computing.

Project – 18: Developing a System of Aadhar Based Biometric Authentication

for Internet Banking.

Guide: Shri Patrick Kishore, Chief Operating Officer, Strategic Business Unit

At present security in internet banking transactions depends only on user ID, password and

OTP. During the recent past many frauds have come to light where all these were

compromised resulting in customers losing money. In the State of Maharashtra many suchcases were ruled against the bank which has resulted in banks bearing the cost of the frauds. It

is proposed to develop a system whereby user’s biometric (fingerprint) is captured and verified

with the database of UIDAI for authentication. This will guard customers and the banks against

phishing and stealing of OTP.

Project – 19: Authentication and Access to Web Based Application using

Biometric in Place of Password.

Guide: Dr. N. P. Dhavale, Deputy General Manager, Strategic Business Unit

Development of basic web based application for logging in using options of password

and finger print based biometric

Integration of various finger print biometric devices available in the market in the

application

Page 8: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 8/9

Page 8 of 9

Integration with Aadhar for authentication in place of authentication from local

fingerprint database

integration with applications such as windows based log in, screen saver log, additional

security for password based log in, file / data encryption, internet banking etc.

RESEARCH AREA - 4: FINANCIAL INFORMATION SYSTEMS AND

ANALYTICS

Project – 20: Mobile Website and Bank’s Intranet Services

Guide: Dr. V. N. Sastry, Professor

The project involves the design and development of a Banks Mobile Website and accessing the various

services of intranet though the mobile phone for day to day works of the employee. The secure coding

practices for such development across multiple mobile browsers and demonstration of key issues of 

security would be highlighted.

Project – 21: Big Data Analytics

Guide: Dr. V. Ravi, Professor

Big data analytics will be explored in finance domain with specific intent on implementing

spiking neural network architecture. It will be tested on a set of problems taken from literature.

Project – 22: Development of Ontology in Financial Domain

Guide: Dr. V. Ravi, Professor

Ontology shall be developed using fuzzy formal concept analysis. We will also investigate its

relationship with fuzzy cognitive maps. The methodology shall be illustrated on few problemstaken from finance.

Project – 23: Hierarchical Classification of Customer Reviews using Evolutionary

Computing

Guide: Dr. V. Ravi, Professor

Evolutionary computing algorithms shall be employed to classify the customer review in a given

domain hierarchically with respect to aspect of products.

Project – 24: Web Service Composition Using Meta-heuristic TechniquesGuide: Dr. G. R. Gangadharan, Assistant Professor

Web service composition is a process by which existing web services can be integrated together

to create value added composite web services that satisfy the user's requirements. However,

due to the availability of large number of web services on the internet offering the same

functionality, finding suitable web services for composition that satisfies a particular user’s

Page 9: InternProjects_2015

7/21/2019 InternProjects_2015

http://slidepdf.com/reader/full/internprojects2015 9/9

Page 9 of 9

requirements is difficult and seen as multi objective optimization problem. In this project, we

propose a novel web service composition methodology using meta-heuristic techniques.

Project – 25: Relative Effectiveness of QoS Attributes in Service Selection and

Composition

Guide: Dr. G. R. Gangadharan, Assistant Professor

With the growing demand for the services there are many service providers delivering many

services with varying Quality of service (QoS) attributes including different prices and

performances. It has now become a challenge for the users to select a service which will best

satisfy their requirements. Service selection is considered the most pivotal step of service

composition, as it determines the quality of the composite service. In this project, we will

evaluate the relative effectiveness of QoS attributes among individual services and possible

composition scenarios, using computational intelligence techniques.