Final review for main project

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 25

THANTHAI PERIYAR

GOVERNMENT INSTITUTE OF TECHNOLOGY


VELLORE-02

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


FINAL REVIEW

LEVERAGING BLOCKCHAIN TO PROVIDE TRUST AND


PRIVACY PRESERVING e-KYC SYSTEM
Presented By:
Sharmila Raj S[513119104033] Guided By
Devika N[513119104005]
Kalki D[513119104015]
Mrs A.Elavarasi AP/CSE
Subhashri R[513119104037]
Subhiksha S[5131191040312]
07/02/2024 1
Abstract
• The electronic know your customer (e-KYC) is a system for the banking or identity
provider to establish a customer identity data verification process between relying parties.

• Due to the efficient resource consumption and the high degree of accessibility and
availability of cloud computing.

• Most banks implement their e-KYC system on the cloud.

• Essentially, the security and privacy of e-KYC related documents stored in the cloud
becomes the crucial issue.

• Existing e-KYC platforms generally rely on strong authentication and apply traditional
encryption to support their security and privacy requirement.
07/02/2024 2
• In this model, the e-KYC system owner encrypts the file with their host’s key and
uploads it to the cloud.

• This method induces encryption dependency and communication and key


management overheads.

• In this, we introduce a block chain-based e-KYC scheme called e-KYC Trust


Block, based on the cipher text policy attribute-based encryption (CP-ABE)
method binding with the client consent enforcement to deliver trust, security and
privacy compliance.

• In addition, we introduce attribute-based encryption to enable the privacy


preserving and fine-grained access of sensitive transactions stored in the
blockchain.

07/02/2024 3
Objective

• KYC Blockchain systems enable transparency and immutability that, in


turn, allows financial institutions to validate the trustworthiness of data
present in the DLT platform.

• The decentralized KYC process acts as a streamlined way for gaining secure and
swift access to up-to-date user data.

07/02/2024 4
Scope

 Lowers the turn around time: Through KYC Block chain software solutions,
banking get direct access to the data which saves data gathering & processing
time

 KYC on Block chain eliminates paperwork from the process.

07/02/2024 5
Existing System

• A cloud-based e-KYC system provides a more efficient and flexible authentication


method compared to the host based e-KYC authentication method where
documents need to be validated via the centralized host.

• Host based e-KYC authentication causes a traffic bottleneck and single point of
failure problem.

07/02/2024 6
Proposed System
• The privacy-preserving e-KYC approach based on the blockchain.

• Scheme delivers secure and decentralized authentication and verification of the e-


KYC process with the user’s consent enforcement feature.

• The privacy of both customers’ identity documents stored in the cloud is


guaranteed by the symmetric key and public key encryption while the sensitive
transaction data stored in the blockchain is encrypted by symmetric key
encryption and CP-ABE.

07/02/2024 7
• It allows the KYC data to be updated by the data owner or the customer.

• For the evaluation, we performed comparative analysis between our scheme and
related works in terms of the computation cost, the communication cost, and
performance.

• For future works, we will test a larger sample of data in the real cloud
environment and measure the throughput of the system in accommodating high
number of e-KYC registration and verification requests.

07/02/2024 8
Hardware Requirements

 Processor : 64-bit, four-core, 2.5 GHz minimum per core

 RAM : 8 GB for developer or evaluation use

16 GB for production use

 Hard disk : 80 GB

07/02/2024 9
Software Requirements

• Operating System : Windows 10

• Front End : Html,CSS,Java

• Back End : MySql Server

• Technology : Block Chain

• IDE Tools : Eclipse

07/02/2024 10
System Architecture

07/02/2024 11
MODULES
• CLIENT
• SMART CONTRACTS USER
• CLOUD SERVER
• AUTHORITY
• BLOCKCHAIN SERVER

07/02/2024 12
HOME PAGE

07/02/2024 13
CLIENT REGISTER

07/02/2024 14
CLIENT LOGIN

07/02/2024 15
SMART CONTRACT USER REGISTER

07/02/2024 16
SMART CONTRACT USER LOGIN

07/02/2024 17
CLOUD SERVER LOGIN

07/02/2024 18
AUTHORITY

07/02/2024 19
BLOCKCHAIN SERVER LOGIN

07/02/2024 20
CONCLUSION
•We have presented the privacy-preserving e-KYC approach based on the block chain.

•Our proposed scheme delivers secure and decentralized authentication and


verification of the e-KYC process with the user's consent enforcement feature.

•. In our scheme, the privacy of both customers' identity documents stored in the cloud
is guaranteed by the symmetric key and public key encryption while the sensitive
transaction data stored in the block chain is encrypted by symmetric key encryption
and CP-ABE.

•. Our scheme also allows the KYC data to be updated by the data owner or the
customer.
07/02/2024 21
•The experimental results showed that our scheme outperforms existing schemes in
terms of performance, comprehensive KYC compliance features, and the scalable
access control mechanism.

•For future works, we will test a larger sample of data in the real cloud environment
and measure the throughput of the system in accommodating high number of e-KYC
registration and verification requests.

•In addition, we will investigate the technique to enable batch verification of e-KYC
transactions stored in the block chain with the searchable encryption feature.

07/02/2024 22
REFERNCES
• C.SullivanandE.Smith.``Trade-BasedMoneyLaundering:RisksandRegulatory
Responses,''SocialSci.Electron.Publishing,2012,p.6.
• UnitedPressInternational.(May2009).Trade-BasedMoneyLaunderingFlourishing.
[Online].Available:http://www.upi.com/TopNews/2009/05/11/Trade-based-
money-laundering-_ourishing/UPI-17331242061466.
• L. Akoglu, M. McGlohon, and C. Faloutsos, ``Odd Ball: Spotting anomalies
inweighted graphs,'' in Proc. Pacic-Asia Conf. Knowl. Discovery Data Mining,
2010,pp.410_421.
• V. Chandola, A. Banerjee, and V. Kumar, ``Anomaly detection: A
survey,''ACMComput.Surv.,vol.41,no.3,2009,Art.no.15.
• J. Tang, Y. Chang, and H. Liu ``Mining social media with social theories:
Asurvey,''ACMSIGKDDExplorationsNewslett.,vol.15,no.2,pp.20_29,2013.

07/02/2024 23
• H.TongandC.-Y.Lin,``Non-
negativeresidualmatrixfactorizationwithapplicationtographanomalydetection,''
inProc.SIAMInt.Conf. DataMining,2011,pp.1_11.
• S.Wang, J. Tang, and H. Liu, ``Embedded unsupervised feature selection,''
inProc.29thAAAI Conf.Artif.Intell.,2015,pp.470_476.
• Z.Lin,M.Chen,andY.Ma.
(2010).``TheAugmentedlagrangemultipliermethodforexactrecoveryofcorruptedlo
w-rankmatrices.''[Online].Available:https://arxiv.org/abs/1009.5055.
• J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos, ``Neighborhood
formationandanomalydetectioninbipartitegraphs,''inProc.15thIEEEInt.Conf.DataM
ining.
• C. C. Noble and D. J. Cook, ``Graph-based anomaly detection,'' in Proc.9th
ACMSIGKDDInt.Conf.Knowl.Discovery DataMining,2003,pp.631_636.

07/02/2024 24
Thank you!

07/02/2024 25

You might also like