Skip to main content

A Secure Bank Transaction Using Blockchain Computing and Forest Oddity

  • Chapter
  • First Online:
Security and Privacy in Cyberspace

Part of the book series: Blockchain Technologies ((BT))

  • 316 Accesses

Abstract

The Indian banking system has progressed from nationalization to liberalization. The banks are the backbone of any country wherever financial support is required. Security is an important factor that must be followed in any organization to protect its user’s confidential data. This paper removes issues using Blockchain Algorithm SHA-256. The aim of the study is to compare the security and privacy features of selected banks. The study further investigates the bank customers’ perception towards security and privacy concern’ regarding the use of e-banking services. The current framework, various following partner issues that break away at projected tasks using Blockchain algorithm SHA-256 which are extremely traditional and effectively accessible for software engineer action within the event that it needs to interrupt. During this paper, we tend to use SHA-256 calculation for message key age and for info encoding utilized upgraded Blowfish algorithm. When the procedure of this is finished, we tend to boot discover the negotiated server in the cloud framework. For replicas, we tend to utilize Cloudsim, a java primarily based check system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Freedman DH (2000) How to hack a bank. Forbes ASAP

    Google Scholar 

  2. Orr S (2005) DDoS threatens financial institutions-get prepared! Reyman Group, Inc

    Google Scholar 

  3. Rogers L (2004) What is a distributed denial of service (DDoS) attack and what can I do about it? CERT Carnegie Mellon University

    Google Scholar 

  4. Moore D, Voelker GM, Savage S (2001) Inferring internet denial-of-service activity. In: Proceedings of the USENIX security symposium, Washington DC

    Google Scholar 

  5. Susan O (2005) DDoS threatens financial institutions. Reymann Group Inc

    Google Scholar 

  6. Mark S, David K (2009) Credit card breach affects Conn. banks and credit unions. Waterbury Republican-American (Connecticut)

    Google Scholar 

  7. Grimes RA (2001) Malicious mobile code—virus protection for windows. O’Reilly Media Inc., Sebastopol, CA

    Google Scholar 

  8. Harley D, Slade R, Gattiker U (2001) Viruses revealed. McGraw-Hill

    Google Scholar 

  9. Marsia S (2009) Information security magazine

    Google Scholar 

  10. Thakral M, Singh RR, Jain A, Chhabra G (2021) Rigid wrap ATM debit card fraud detection using multistage detection. In: 2021 6th international conference on signal processing, computing and control (ISPCC), pp 774–778. https://doi.org/10.1109/ISPCC53510.2021.9609521

  11. Singh RR, Thakral M, Kaushik S, Jain A, Chhabra G (2022) A blockchain-based expectation solution for the internet of bogus media. In: Hemanth DJ, Pelusi D, Vuppalapati C (eds) Intelligent data communication technologies and internet of things. Lecture notes on data engineering and communications technologies, vol 101. Springer, Singapore. https://doi.org/10.1007/978-981-16-7610-9_28

  12. Thakral M, Jain A, Kadyan V, Jain A (2021) An innovative intelligent solution incorporating artificial neural networks for medical diagnostic application. In: Sixth international conference on image information processing (ICIIP), pp 529–532. https://doi.org/10.1109/ICIIP53038.2021.9702631

  13. Mike M (2009) Banks send confidential emails to wrong addresses. Grab-Some-Popcorn Dept

    Google Scholar 

  14. Wilke CA (2000) Infrastructure threats—intrusion risks

    Google Scholar 

  15. Linda McG (2008) Data loss case study: how to tackle the email threat. Bank information security articles

    Google Scholar 

  16. Kivumbi (2009) Difference between hardware firewall and software firewall. DifferenceBetween.net

    Google Scholar 

  17. (2009) McAfee network security platform protects bank customers’ financial assets and personal data. McAfee, Inc

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandeep Pratap Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thakral, M., Singh, S.P. (2022). A Secure Bank Transaction Using Blockchain Computing and Forest Oddity. In: Kaiwartya, O., Kaushik, K., Gupta, S.K., Mishra, A., Kumar, M. (eds) Security and Privacy in Cyberspace. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-19-1960-2_6

Download citation

Publish with us

Policies and ethics