internprojects_2015
TRANSCRIPT
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 1/9
Institute for Develo(Est
Castle Hills, Road NPh: +9
Visit us: w
List of Projects offer
RESEARCH AREA - 1 :
Project – 1: Fog Computin
Fog computing is a close cousin
distributed nature of today’s
somewhere like the cloud, the
interact with every day. Fog co
address a couple of growing c
working within the limits of avai
Fog computing works in conj
resource. Currently, most ente
after which a decision is made
allows computing, decision-m
pushes relevant data to the cl
deploying fog computing in Indi
Project – 2: Offline Certifyi
Guide: Dr. N
Process Flow Design
Design and development
Audit and Application Se
Live Pilot using actual re
Page 1 of 9
ment and Research in Banking Teablished by Reserve Bank of India)
o. 1, Masab Tank, Hyderabad – 500 05740 2329 4000; Fax: +91 40 2353 5157
w.idrbt.ac.in; e-mail: [email protected]
ed for the IDRBT Project Train
during Summer 2015
FINANCIAL NETWORKS AND APPL
and its Applications to Banking
Guide: Dr. N. Raghu Kisore, As
to cloud computing, a technology that takes a
virtualized IT resources. But instead of bei
fog is all around us, among the numerous s
puting, like many IT developments, grew ou
ncerns: being able to act in real time to inc
lable bandwidth.
unction with cloud computing, optimizing
rprise data is pushed up to the cloud, store
nd action taken. But this system isn’t efficient
king and action-taking to happen via IoT d
ud. In this project we would like to explore
an Banks.
ng Authority Application
. P. Dhavale, Deputy General Manager, Strate
of cryptographic modules (3 modules) using st
urity Testing
uests from banks.
hnology
India.
e Scheme
ICATIONS
sistant Professor
dvantage of the
ng “out there”
art objects we
t of the need to
ming data and
he use of this
and analyzed,
. Fog computing
vices and only
the possible of
ic Business Unit
andard libraries
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 2/9
Page 2 of 9
RESEARCH AREA - 2: ELECTRONIC PAYMENTS AND SETTLEMENT
SYSTEMS
Project – 3: Mobile Governance
Guide: Dr. V. N. Sastry, Professor
Enabling the government services of various types onto every citizen’s mobile phone is a challenge. Theproject work involves study of framework of mobile governance as well as e-governance, technical
standards of m-governance, service categorization and development of a prototype mobile application
which can be used by people in multiple languages, over multiple mobile operating systems and offered
by multiple state governments.
Project – 4: Detection of Frauds in Cheque Truncation System
Guide: Dr. Rajarshi Pal, Assistant Professor
Cheque Truncation System is an image based cheque clearing system. It is used to speedy
clearing of cheques. Recently, a huge number of cases related to cheque frauds have beenencountered by banks. Cheque frauds may be of different forms, such as forging signature,
altering payee name and amount, producing duplicate cheques. This project aims to detect
such kind of forgeries by analyzing the captured image of a cheque.
Prerequisite Knowledge: Image Processing, MATLAB.
Project – 5: Prototyping the Concept of Digital Cheque and Demand Draft
Guide: Dr. Rajarshi Pal, Assistant Professor
Cheque and Demand Draft are commonly used payment instrument. Digital Cheque/ DD are
conceptualized as a digital image of a cheque/DD. Can banks, in future, issue a digital
cheque/DD, instead of, paper based cheque/DD? This project aims to seek a solution to this
question. This project will address how digital cheque/DD can be accommodated in the existing
banking system without causing significant change in the system. Moreover, this will reduce
operational cost (through reduction in printing of cheque/DD) and will enhance security of this
payment instrument (if properly designed). Frauds involving paper cheques also will reduce
with decreased usage of paper cheques.
Prerequisite Knowledge: Image Processing, Web Development in Java, Database connectivity.
Project – 6: Issue of Electronic Bank Guarantees with e-Stamping for Paymentof Stamp Duty, through SFMS.
Guide: Shri Patrick Kishore, Chief Operating Officer, Strategic Business Unit
At present Banks issue Guarantees favoring various beneficiaries including Government
Authorities on non-Judicial stamp paper. In the light of many frauds which are taking place
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 3/9
Page 3 of 9
using counterfeit stamped paper, it is desirable to develop a system of issuing an electronic
Bank Guarantee which can be communicated by the issuing Bank to the beneficiary through the
beneficiary’s bank. This will protect Banks against fraud and make the process more efficient.
The main issue to be considered is how stamp duty can be paid into State Treasury at the
issuing branch by integrating Bank’s SFMS system with e-stamping system, before an electronic
Bank Guarantee can be issued.
Project – 7: Use of Time Stamping Services for Payment System Applications
Guide: Dr. N. P. Dhavale, Deputy General Manager, Strategic Business Unit
Banks are issuing bank guarantee to their customers and these are sent through SFMS.
The bank guarantees have specific requirement of, to be valid for a particular period and
the time at which the bank guarantee is issued can be of great business value depending
on the circumstances
On receipt of message containing bank guarantee, SFMS hub will send request for time
stamping of the same to the time stamping authority which is part of IDRBT CA. Thetime stamping token will be generated and issued to the SFMS hub which can be
included as part of the message and stored / archived by the SFMS application.
RESEARCH AREA - 3: SECURITY TECHNOLOGIES FOR THE FINANCIAL
SECTOR
Project – 8: Mobile Device Security Vulnerabilities and Prevention
Guide: Dr. V. N. Sastry, Professor
The project involves the study of vulnerabilities of mobile phones of different operating systems.Identification of possible attacks on mobile phones at different levels including operating systems,
communication channels, data bases, mobile applications and devise interfaces. It is proposed to
develop a framework for automatic identification and prevention of vulnerabilities and do prototype
implementation.
Project – 9: Digital Watermarking using Fractals
Guide: Dr. M. V. N. K. Prasad, Associate Professor
The introduction of world wide web has lead to the digital content sharing across the globe
enormously. Due to increase of Internet availability and digital image processing devices, thedigital image sharing and accessing has become simple and convenient. Thus protection of the
digital images has gained main focus of the active researchers. The Copy right is supposed to
occupy the front position in economical development among the rest of Intellectual Property
Rights. Digital Rights Management is a term generally refers to protect the copyrights of digital
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 4/9
Page 4 of 9
media files. The protection of the digital images can be enforced through encryption and
decryption, steganographic or digital watermarking.
Watermarking is a technique to insert copy right information within digital contents. A robust
watermarking method provides information that cannot be removed from the watermarked
content. Fractal image encoding theory is developed based on the concept of Iterated function
systems. The image is separated into complex and smooth regions based on fractal dimensionand then watermark is embedded. It is infeasible to identify watermark bits in cover image
through these techniques. The proposed work is to use fractal techniques and contourlet
transformation techniques for watermarking.
Project – 10: Fingerprint Indexing
Guide: Dr. M. V. N. K. Prasad, Associate Professor
Biometric authentication refers to recognizing an individual based on his/her physiological or
behavioral characteristics, which has the capability to reliably distinguish between an
authorized person and an imposter. During the past few decades, many researchers havecarried out experiments on utilizing various biometrics for personal recognition. Among all
these biometrics (e.g., face, fingerprints, hand geometry, iris, retina, signature, voice print,
facial thermo gram, hand vein, gait, ear, odor, keystroke dynamics, etc.), fingerprint- based
recognition is one of the most mature, accurate and reliable technique.
A fingerprint is the pattern of ridges and valleys on the surface of the finger. The uniqueness of
a fingerprint can be determined by the overall pattern of ridges and valleys as well as the local
ridge anomalies a ridge bifurcation or a ridge ending, called minutiae points. Depending on the
application context, a fingerprint recognition system may be operated in one of the two modes:
verification or identification.
In verification, the user claim his identity along with the biometric data. Then, the
system verifies the person’s identity by comparing the captured biometric with his own
biometric template pre-stored in the system. It conducts one-to-one comparison to
determine whether the identity claimed by the individual is true or not
In identification, the user does not claim any identity along with his biometric data.
Hence, the system in this mode recognizes an individual by sequentially searching the
entire template database for a match.
Note that, this sequential search process in an identification system works well for smalldatabases. But in reality the fingerprint databases contains large number of records (ex. India
AADHAR) and this process is expensive and unreliable. Therefore efficient indexing systems are
required that can search large databases in less time and without compromising system
performance. Unlike structured information such as text or numeric data that can be sorted,
fingerprint data does not have any natural sorting order. As the fingerprint data is unstructured,
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 5/9
Page 5 of 9
this type of database cannot be indexed into alphabetical or numerical order. Therefore
indexing these fingerprint databases represents a challenging problem.
Project – 11: Biometric Cryptosystems
Guide: Dr. M. V. N. K. Prasad, Associate Professor
Abstract
In traditional Cryptosystems, user authentication is based on secret keys. If the keys are not
kept secret i.e. possessed by the attackers the system fails. Further the keys may be forgotten,
lost and stolen. Thus traditional cryptosystems cannot provide non-repudiation. Current
authentication systems using various biometric characteristics such as fingerprint, face, iris etc.
can be used in cryptosystems to resolve these problems of traditional cryptosystems. Biometric
Cryptosystems bind a cryptographic key with the biometric template stored in the database.
The key is not revealed until the successful biometric authentication.
Challenges :
Designing a method in way that if a biometric template is compromised , the
biometric itself is not lost forever and a new template can be issued
Designing a method such that different applications use different biometric
templates to ensure privacy preserving and cross matching is not possible by
tracking the applications
Designing a method to generate a cryptographic key from the biometric features
and the key management should be convenient and secure.
Project – 12: Secure Cloud Storage
Guide: Dr. G. R. Gangadharan, Assistant Professor
Cloud storage is an increasingly popular class of online services for archiving, backup, sharing of
data, synchronization of multiple devices and it is also envisioned for future primary storage of
enterprise data. The cloud storage system introduces security concerns over protection of data
integrity and data access control. In this project, we will propose a secure storage verification
scheme with explicit dynamic data support to ensure the correctness and availability of users’
data in the cloud.
Project – 13: Application of Hidden Markov Model for Intrusion Detection
System
Guide: Dr. N. Raghu Kisore, Assistant Professor
Network intrusion detection systems NIDS are placed at a strategic point or points within the
network to monitor traffic to and from all devices on the network. It performs an analysis for a
passing traffic on the entire subnet, works in a promiscuous mode, and matches the traffic
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 6/9
Page 6 of 9
that is passed on the subnets to the library of known attacks. Once the attack is identified, or
abnormal behavior is sensed, the alert can be sent to the administrator. Example of the NIDS
would be installing it on the subnet where firewalls are located in order to see if someone is
trying to break into the firewall. Ideally one would scan all inbound and outbound traffic,
however doing so might create a bottleneck that would impair the overall speed of the
network.
Recent research work on Hidden Markov Model (HMM) analysis has shown that HMM is more
effective than other techniques like machine learning in detecting of computer viruses and
their classification. In this research, we propose to develop a Profile Hidden Markov Models
(PHMM) for developing Intrusion detection systems for Computer networks.
Project – 14: Modeling and Analysis of Security Requirements of Indian Banking
Community Cloud.
Guide: Dr. N. Raghu Kisore, Assistant Professor
Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years,
spurred by the realization that security must be dealt with in the earliest phases of the
software development process as these phases cover a broader organizational perspective.
Agent-oriented methodologies have proved to be especially useful in this setting as they
support the modeling of the social context in which the system-to-be will operate.
In the current project we would apply secure Trophos in order to model and analyze security
requirements alongside functional requirements of IBCC. The methodology provides a
requirements analysis process that drives system designers from the acquisition of
requirements up to their verification.
Project – 15: Ensuring Data Storage Security in Cloud Computing
Guide: Dr. P. Syam Kumar, Assistant Professor
Data storage is an important application of cloud computing, where the users remotely store
their data into the cloud servers and access the data from cloud servers. Due to the data
outsourcing, however, this new paradigm of data storage service also introduces security
challenges, such as Confidentiality, Integrity and Availability of data. The protection of these
issues in cloud is a very challenging and potentially formidable task. The aim of this project is to
provide security protocols to ensure the Confidentiality, Integrity and Availability of data stored
in cloud.
Project – 16: Privacy-Preserving of Outsourced Data in Cloud Computing
Guide: Dr. P. Syam Kumar, Assistant Professor
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 7/9
Page 7 of 9
With the growing popularity of cloud computing, the data owners are motivated to outsource
their data files from local sites to the commercial public cloud for great flexibility and economic
savings. Although public cloud offers many advantages, privacy of the outsourced data is a big
concern. To protect privacy, sensitive data have to be encrypted before outsourced to the
commercial public cloud, which makes effective data utilization service at very challenging task.
The aim of this project is develop an efficient privacy-preserving protocol for outsourced data in
cloud computing.
Project – 17: Mitigating DDOS Attacks in Cloud Computing
Guide: Dr. P. Syam Kumar, Assistant Professor
Distributed Denial of Service (DDOS) attacks are a great threat to service availability in cloud
computing. In recent years, DDoS attacks have increased tremendously in bandwidth and
technique. Cloud security is one of most important issue that has attracted a lot of research and
development effort in past few years. Within the cloud system, especially the Infrastructure-as-
a-Service (IaaS) clouds, the detection DDOS attacks are extremely difficult. This is because cloud
users may install vulnerable applications on their virtual machines. The aim of this project is to
design a new approach to mitigate the DDOS attacks in cloud computing.
Project – 18: Developing a System of Aadhar Based Biometric Authentication
for Internet Banking.
Guide: Shri Patrick Kishore, Chief Operating Officer, Strategic Business Unit
At present security in internet banking transactions depends only on user ID, password and
OTP. During the recent past many frauds have come to light where all these were
compromised resulting in customers losing money. In the State of Maharashtra many suchcases were ruled against the bank which has resulted in banks bearing the cost of the frauds. It
is proposed to develop a system whereby user’s biometric (fingerprint) is captured and verified
with the database of UIDAI for authentication. This will guard customers and the banks against
phishing and stealing of OTP.
Project – 19: Authentication and Access to Web Based Application using
Biometric in Place of Password.
Guide: Dr. N. P. Dhavale, Deputy General Manager, Strategic Business Unit
Development of basic web based application for logging in using options of password
and finger print based biometric
Integration of various finger print biometric devices available in the market in the
application
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 8/9
Page 8 of 9
Integration with Aadhar for authentication in place of authentication from local
fingerprint database
integration with applications such as windows based log in, screen saver log, additional
security for password based log in, file / data encryption, internet banking etc.
RESEARCH AREA - 4: FINANCIAL INFORMATION SYSTEMS AND
ANALYTICS
Project – 20: Mobile Website and Bank’s Intranet Services
Guide: Dr. V. N. Sastry, Professor
The project involves the design and development of a Banks Mobile Website and accessing the various
services of intranet though the mobile phone for day to day works of the employee. The secure coding
practices for such development across multiple mobile browsers and demonstration of key issues of
security would be highlighted.
Project – 21: Big Data Analytics
Guide: Dr. V. Ravi, Professor
Big data analytics will be explored in finance domain with specific intent on implementing
spiking neural network architecture. It will be tested on a set of problems taken from literature.
Project – 22: Development of Ontology in Financial Domain
Guide: Dr. V. Ravi, Professor
Ontology shall be developed using fuzzy formal concept analysis. We will also investigate its
relationship with fuzzy cognitive maps. The methodology shall be illustrated on few problemstaken from finance.
Project – 23: Hierarchical Classification of Customer Reviews using Evolutionary
Computing
Guide: Dr. V. Ravi, Professor
Evolutionary computing algorithms shall be employed to classify the customer review in a given
domain hierarchically with respect to aspect of products.
Project – 24: Web Service Composition Using Meta-heuristic TechniquesGuide: Dr. G. R. Gangadharan, Assistant Professor
Web service composition is a process by which existing web services can be integrated together
to create value added composite web services that satisfy the user's requirements. However,
due to the availability of large number of web services on the internet offering the same
functionality, finding suitable web services for composition that satisfies a particular user’s
7/21/2019 InternProjects_2015
http://slidepdf.com/reader/full/internprojects2015 9/9
Page 9 of 9
requirements is difficult and seen as multi objective optimization problem. In this project, we
propose a novel web service composition methodology using meta-heuristic techniques.
Project – 25: Relative Effectiveness of QoS Attributes in Service Selection and
Composition
Guide: Dr. G. R. Gangadharan, Assistant Professor
With the growing demand for the services there are many service providers delivering many
services with varying Quality of service (QoS) attributes including different prices and
performances. It has now become a challenge for the users to select a service which will best
satisfy their requirements. Service selection is considered the most pivotal step of service
composition, as it determines the quality of the composite service. In this project, we will
evaluate the relative effectiveness of QoS attributes among individual services and possible
composition scenarios, using computational intelligence techniques.