Professional Documents
Culture Documents
Final review for main project
Final review for main project
Final review for main project
• Due to the efficient resource consumption and the high degree of accessibility and
availability of cloud computing.
• Essentially, the security and privacy of e-KYC related documents stored in the cloud
becomes the crucial issue.
• Existing e-KYC platforms generally rely on strong authentication and apply traditional
encryption to support their security and privacy requirement.
07/02/2024 2
• In this model, the e-KYC system owner encrypts the file with their host’s key and
uploads it to the cloud.
07/02/2024 3
Objective
• The decentralized KYC process acts as a streamlined way for gaining secure and
swift access to up-to-date user data.
07/02/2024 4
Scope
Lowers the turn around time: Through KYC Block chain software solutions,
banking get direct access to the data which saves data gathering & processing
time
07/02/2024 5
Existing System
• Host based e-KYC authentication causes a traffic bottleneck and single point of
failure problem.
07/02/2024 6
Proposed System
• The privacy-preserving e-KYC approach based on the blockchain.
07/02/2024 7
• It allows the KYC data to be updated by the data owner or the customer.
• For the evaluation, we performed comparative analysis between our scheme and
related works in terms of the computation cost, the communication cost, and
performance.
• For future works, we will test a larger sample of data in the real cloud
environment and measure the throughput of the system in accommodating high
number of e-KYC registration and verification requests.
07/02/2024 8
Hardware Requirements
Hard disk : 80 GB
07/02/2024 9
Software Requirements
07/02/2024 10
System Architecture
07/02/2024 11
MODULES
• CLIENT
• SMART CONTRACTS USER
• CLOUD SERVER
• AUTHORITY
• BLOCKCHAIN SERVER
07/02/2024 12
HOME PAGE
07/02/2024 13
CLIENT REGISTER
07/02/2024 14
CLIENT LOGIN
07/02/2024 15
SMART CONTRACT USER REGISTER
07/02/2024 16
SMART CONTRACT USER LOGIN
07/02/2024 17
CLOUD SERVER LOGIN
07/02/2024 18
AUTHORITY
07/02/2024 19
BLOCKCHAIN SERVER LOGIN
07/02/2024 20
CONCLUSION
•We have presented the privacy-preserving e-KYC approach based on the block chain.
•. In our scheme, the privacy of both customers' identity documents stored in the cloud
is guaranteed by the symmetric key and public key encryption while the sensitive
transaction data stored in the block chain is encrypted by symmetric key encryption
and CP-ABE.
•. Our scheme also allows the KYC data to be updated by the data owner or the
customer.
07/02/2024 21
•The experimental results showed that our scheme outperforms existing schemes in
terms of performance, comprehensive KYC compliance features, and the scalable
access control mechanism.
•For future works, we will test a larger sample of data in the real cloud environment
and measure the throughput of the system in accommodating high number of e-KYC
registration and verification requests.
•In addition, we will investigate the technique to enable batch verification of e-KYC
transactions stored in the block chain with the searchable encryption feature.
07/02/2024 22
REFERNCES
• C.SullivanandE.Smith.``Trade-BasedMoneyLaundering:RisksandRegulatory
Responses,''SocialSci.Electron.Publishing,2012,p.6.
• UnitedPressInternational.(May2009).Trade-BasedMoneyLaunderingFlourishing.
[Online].Available:http://www.upi.com/TopNews/2009/05/11/Trade-based-
money-laundering-_ourishing/UPI-17331242061466.
• L. Akoglu, M. McGlohon, and C. Faloutsos, ``Odd Ball: Spotting anomalies
inweighted graphs,'' in Proc. Pacic-Asia Conf. Knowl. Discovery Data Mining,
2010,pp.410_421.
• V. Chandola, A. Banerjee, and V. Kumar, ``Anomaly detection: A
survey,''ACMComput.Surv.,vol.41,no.3,2009,Art.no.15.
• J. Tang, Y. Chang, and H. Liu ``Mining social media with social theories:
Asurvey,''ACMSIGKDDExplorationsNewslett.,vol.15,no.2,pp.20_29,2013.
07/02/2024 23
• H.TongandC.-Y.Lin,``Non-
negativeresidualmatrixfactorizationwithapplicationtographanomalydetection,''
inProc.SIAMInt.Conf. DataMining,2011,pp.1_11.
• S.Wang, J. Tang, and H. Liu, ``Embedded unsupervised feature selection,''
inProc.29thAAAI Conf.Artif.Intell.,2015,pp.470_476.
• Z.Lin,M.Chen,andY.Ma.
(2010).``TheAugmentedlagrangemultipliermethodforexactrecoveryofcorruptedlo
w-rankmatrices.''[Online].Available:https://arxiv.org/abs/1009.5055.
• J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos, ``Neighborhood
formationandanomalydetectioninbipartitegraphs,''inProc.15thIEEEInt.Conf.DataM
ining.
• C. C. Noble and D. J. Cook, ``Graph-based anomaly detection,'' in Proc.9th
ACMSIGKDDInt.Conf.Knowl.Discovery DataMining,2003,pp.631_636.
07/02/2024 24
Thank you!
07/02/2024 25