Proper Baking System With Secure Transaction
Proper Baking System With Secure Transaction
Secure Transaction
0
Acknowledgement:
The online banking system in PHP is a system which can be used to create an online
banking website. This online banking system has so many features a normal bank
system should have and even more.
This system focuses more on making financial transaction like deposing withdrawals
and making of transfer to other account registered on the platform. The system has
a lot of features which can be done by the admin or staff when they login.
1
ABSTRACT:
In today's digital age, secure online transactions are crucial for maintaining the
confidentiality, integrity, and authenticity of sensitive data. This project presents a
Secure Online Transaction System developed in Java, utilizing MySQL as the
database management system, and employing the AES (Advanced Encryption
Standard) algorithm for encryption purposes. The objective of this project was to
design and implement a robust system that ensures secure online transactions,
safeguarding against unauthorized access, data breaches, and fraudulent activities.
To achieve this, the project leveraged the AES algorithm, a widely adopted
symmetric encryption algorithm known for its high level of security and
performance. The system architecture includes a client-server model, where the
clients are responsible for initiating and executing transactions, while the server
manages the transaction requests and interacts with the MySQL database. The Java
programming language was used to develop the client and server components,
facilitating platform independence and ease of deployment. To secure the sensitive
transaction data during transmission and storage, the AES algorithm was
implemented. The AES algorithm operates on 128-bit blocks and supports key
lengths of 128, 192, and 256 bits. It provides robust encryption and decryption
functions, ensuring that the data remains confidential and tamper-proof. The keys
used in the AES algorithm were securely generated and managed within the system.
The MySQL database was employed to store transaction-related information, user
credentials, and other relevant data. The integration of MySQL allowed for efficient
data management and retrieval, with appropriate security measures implemented
to protect against SQL injection attacks and unauthorized database access. The
2
implemented Secure Online Transaction System with Cryptography successfully
provides a secure environment for users to conduct online transactions. The
utilization of the AES algorithm ensures the confidentiality and integrity of the
transaction data, protecting it from unauthorized access and tampering. The
system's integration with MySQL enables efficient and reliable data management,
further enhancing the overall user experience. The outcomes of this project
contribute to the field of secure online transactions by demonstrating the successful
implementation of cryptography techniques using the AES algorithm. The
developed system serves as a practical example of how Java, MySQL, and AES can
be combined to create a robust and secure online transaction platform. The
project's findings can benefit individuals, businesses, and financial institutions by
providing them with a secure framework for conducting online transactions and
protecting sensitive information.
3
Table of contents
1 INTRODUCTION (6-10)
Prevention.
2.3-> Combine use of steganography and visual cryptography for online payment
system
2.4-> Study of Hidden Markov Model in Credit Card Fraudulent Detection
3 Requirements (14)
4 Existing System (15-21)
6 Implementation (23-24)
6.1-> Admin
6.2-> Staff
6.3-> Users
4
6.4-> AES Algorithm Module
8 Conclusion (34-37)
9 References (38-39)
5
INTRODUCTION
What is Secure Computing?
6
Working conditions and basic needs in the secure computing:
If you don't take basic steps to protect your work computer, you put it and all the
information on it at risk. You can potentially compromise the operation of other
computers on your organization's network, or even the functioning of the network
as a whole.
1. Physical security:
Technical measures like login passwords, anti-virus are essential. (More about those
below) However, a secure physical space is the first and more important line of
defense.
Is the place you keep your workplace computer secure enough to prevent theft or
access to it while you are away? While the Security Department provides coverage
across the Medical center, it only takes seconds to steal a computer, particularly a
portable device like a laptop or a PDA. A computer should be secured like any other
valuable possession when you are not present.
Human threats are not the only concern. Computers can be compromised by
environmental mishaps (e.g., water, coffee) or physical trauma. Make sure the
physical location of your computer takes account of those risks as well.
2. Access passwords:
The University's networks and shared information systems are protected in part by
login credentials (user-IDs and passwords). Access passwords are also an essential
protection for personal computers in most circumstances. Offices are usually open
and shared spaces, so physical access to computers cannot be completely
7
controlled. To protect your computer, you should consider setting passwords for
particularly sensitive applications resident on the computer (e.g., data analysis
software), if the software provides that capability.
Because we deal with all facets of clinical, research, educational and administrative
data here on the medical campus, it is important to do everything possible to
minimize exposure of data to unauthorized individuals.
4. Anti-virus software:
5. Firewalls:
Anti-virus products inspect files on your computer and in email. Firewall software
and hardware monitor communications between your computer and the outside
world. That is essential for any networked computer.
6. Software updates:
8
Almost all anti-virus have automatic update features (including SAV). Keeping the
"signatures" (digital patterns) of malicious software detectors up-to-date is
essential for these products to be effective.
Even if you take all these security steps, bad things can still happen. Be prepared
for the worst by making backup copies of critical data, and keeping those backup
copies in a separate, secure location. For example, use supplemental hard drives,
CDs/DVDs, or flash drives to store critical, hard-to-replace data.
8. Report problems:
If you believe that your computer or any data on it has been compromised, your
should make a information security incident report. That is required by University
policy for all data on our systems, and legally required for health, education,
financial and any other kind of record containing identifiable personal information.
9
You may require compliancy with the Data Protection Act, the FSA, SOX or
other regulatory standards. Each of these bodies stipulates that certain
measures be taken to protect the data on your network.
• Protect your reputation - Spam:
A common use for infected systems is to join them to a botnet (a collection of
infected machines which takes orders from a command server) and use them
to send out spam. This spam can be traced back to you, your server could be
blacklisted and you could be unable to send email.
10
LITERATURE SURVEY
Random number generator is a key component for strengthening and securing the
confidentiality of electronic communications. Random number generators can be
divided as either pseudo random number generators or true random number
generators. A pseudo random number generator produces a stream of numbers
that appears to be random but actually follow predefined sequence. A true random
number generator produces a stream of unpredictable numbers that have no
defined pattern. There has been growing interest to design true random number
generator in past few years. Several Field Programmable Gate Array (FPGA) and
Application Specific Integrated Circuit (ASIC) based approaches have been used to
generate random data that requires analog circuit. RNGs having analog circuits
demand for more power and area. These factors weaken hardware analog
circuitbased RNG systems relative to hardware completely digital-based RNGs
systems. This thesis is focused on the design of completely digital true random
number generator ASIC.
This paper is a conceptual review of the major crimes leading to ID fraud and losses
of millions of dollars for business and people in the world every year. The paper
provides a review of the unique effective techniques for sustainable development
of prevention methods that have been offered to people and business. In addition,
the paper reviews literature and summarizes the most effective ways for people and
11
business to protect them against ID theft because victims may face a lengthy
process of cleaning up the damage, such as their reputation, credit rating, and jobs.
Identity (ID) theft is unauthorized obtaining of others confidential information in
order to misuse it. ID theft is one of the major problems that impose billions of
dollars annually on people and businesses across the globe. In 2008 only, 9.9
millions of Americans were victimized which show 22% increase compared to 2007.
Analyzing four major factors - political, economic, social, and technological- reveals
that social and technological factors are the significant origins of ID theft. Social
engineering is a technique for thieves by which social engineers take advantage of
people’s behaviors in social networks such as Facebook to steal individuals’ key
information. This report examines different types of frauds that are the major
outcomes of ID theft. The frauds as the results of ID theft comprise ID fraud,
financial fraud, tax fraud, medical fraud, resume fraud, mortgage fraud, and
organized crimes such as money laundering, terrorism, and illegal immigration.
Moreover, the various techniques that thieves use to attack individuals and
organizations are discussed. The different techniques are divided to two major
ones, physical and technological. Physical techniques include several traditional
ways such as mail theft and insider theft. It is crucial for organizations’ managers to
know that despite new technology-based techniques, more than 70% of ID theft
occurs by insiders. In addition, it will be shown how thieves apply both technology-
based techniques such as phishing and social engineering to steal personal
information. Finally several effective prevention techniques will be provided for
individuals and organization to protect key data and information against identity
theft. Usually, thieves attempt to bypass security systems through human elements.
12
Therefore, the recommendation significantly emphasizes developing individuals’
awareness through public and organizational training.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
14
EXISTING SYSTEM:
15
DISADVANTAGES OF EXISTING SYSTEM:
16
Vulnerability to Social Engineering: The existing system may be susceptible to
social engineering attacks, where attackers manipulate users into divulging
sensitive information or performing unauthorized actions. This vulnerability
undermines the security of online transactions and compromises user trust.
Limited Scalability and Performance: Some earlier systems may lack
scalability and suffer from performance issues, especially during peak
transaction periods. This limitation can lead to slow response times,
transaction failures, and an overall poor user experience.
Regulatory Compliance Challenges: Inadequate security measures in the
existing system may pose challenges in meeting regulatory compliance
requirements, such as the Payment Card Industry Data Security Standard (PCI
DSS) or General Data Protection Regulation (GDPR). This deficiency can result
in legal consequences and reputational damage.
Lack of User Awareness: The existing system may not prioritize user
education and awareness regarding online transaction security. Users may
not be adequately informed about best practices, potential risks, or how to
identify and report suspicious activities, increasing the likelihood of falling
victim to scams or fraudulent transactions.
17
PROPOSED SYSTEM:
The proposed system aims to address the limitations of the existing online
transaction systems by introducing enhanced security measures and
leveraging cryptography techniques. This system ensures secure online
transactions with improved data confidentiality, integrity, and
authentication. The proposed system incorporates the AES (Advanced
Encryption Standard) algorithm, a widely recognized and secure symmetric
encryption algorithm. AES ensures the confidentiality of transaction data
during transmission and storage, protecting it from unauthorized access and
data breaches.
The proposed system integrates with a MySQL database management system
to efficiently store and manage transaction-related information and user
credentials. Secure practices are implemented to protect against SQL
injection attacks and unauthorized access to the database. The system is
designed to optimize performance and scalability, ensuring smooth and
reliable transaction processing even during peak periods. Efficient algorithms
and database optimization techniques are employed to enhance system
responsiveness.
The proposed system offers a secure environment for users to conduct online
transactions. It instills confidence by protecting sensitive data, enhancing the
integrity of transactions, and mitigating the risks associated with
unauthorized access and fraudulent activities. The proposed system's
implementation and evaluation involve rigorous testing and validation
procedures to ensure its effectiveness, performance, and resistance to
18
potential attacks. The findings from this project contribute to the
development of secure online transaction systems and cryptography
research, paving the way for future advancements in online transaction
security.
20
The advantages of the proposed system contribute to a secure and trustworthy
online transaction environment. Users can confidently engage in online
transactions, knowing that their data is protected, transactions are reliable, and
risks of unauthorized access and fraud are mitigated.
21
SYSTEM ARCHITECTURE:
22
IMPLEMENTATION
MODULES:
Admin:
Activate Users
Create Account details for users
Reject Applications
View Rejected applications
View Active Use
View transaction
Create staff
Delete staff
Staff:
Activate Users
Create Account details for users
Reject Applications
View Rejected applications
View Active Use
View transaction
Users:
Account Register
Login with Credentials
23
Update Pin Number
Deposits Money
Update Pin Number
Withdraw Money
Transfer Money
• Encryption
• Decryption
24
MODULES DESCSRIPTION:
Admin Module:
Activate Users:
This sub-module allows the administrator to activate user accounts after reviewing
their applications. It validates user information and grants access to the system.
This sub-module enables the administrator to create and manage account details
for users. It involves assigning unique identifiers, setting up user profiles, and
ensuring accurate information.
Reject Applications:
25
This sub-module allows the administrator to reject user applications that do not
meet the system's criteria or have insufficient information. It provides feedback to
the rejected applicants.
This sub-module allows the administrator to view a list of active users currently
using the system. It provides an overview of user accounts and their status.
View Transactions:
This sub-module provides the administrator with access to view transaction details,
including the sender, recipient, transaction amount, and timestamp.
View Complaints:
This sub-module allows the administrator to view and address user complaints.
Staff Module:
Just like the admin the staff has its own dashboard which shows all transaction
analytics, number of clients, and other finance reports.
The staff can only login using the details create by the admin for the particular staff.
The staff can manage the clients and transaction done on the platform only. They
26
can update client’ details, delete clients. The staff can also see the transaction
history; they can also print the deposit, withdrawal or transfer history just like the
admin does.
The staff can deposit into any account or withdraw from any account. They can also
make transfer from one account to other or roll back wrong transactions. The staff
can also make balance enquiry on any single account create on the system with
every single transaction made on the account; this page can be printed using print
button.
Users Module:
This module provides a user-friendly interface for users to interact with the system.
It includes functionalities such as displaying transaction details, managing user
settings, and providing feedback to users regarding the status of their transactions.
User’s first register all the details requested in the account activation form after
filling the form user have to submit. User will get a unique account number after
activating the account. Users can perform the deposits, withdraw, transfer money
to another accounts. User can view all the transactions and also if any complaint
needs the register then users can raise the complaints. All the details shown to users
are End to End Encryptions.
Account Register:
27
This sub-module enables users to create an account by providing necessary
personal information. It validates user inputs, checks for duplicate accounts, and
generates unique account identifiers.
This sub-module allows users to log into the system securely using their
credentials, such as username and password. It verifies the user's identity and
grants access to their account.
This sub-module allows users to update their PIN (Personal Identification Number)
for added security. It ensures that only the authorized user can access the account.
Deposits Money:
This sub-module allows users to deposit money into their account. It verifies the
transaction, updates the account balance, and generates a receipt for confirmation.
Withdraw Money:
This sub-module enables users to withdraw money from their account. It validates
the transaction, deducts the requested amount from the account balance, and
generates a receipt for record-keeping.
Transfer Money:
This sub-module facilitates money transfers between user accounts. It verifies the
sender's account balance, deducts the transferred amount, updates the recipient's
account balance, and generates transaction records.
28
AES Algorithm Module:
This module is responsible for encrypting and decrypting transaction data using
robust encryption algorithms such as AES. It ensures that sensitive information
remains confidential during transmission and storage, protecting it from
unauthorized access.
Encryption:
Decryption:
This sub-module performs the decryption process using the AES algorithm. It takes
the encrypted ciphertext and the decryption key as input and produces the original
plaintext data, allowing authorized users to access and interpret the information
securely.
29
SYSTEM TESTING
TYPES OF TESTS
(a). Unit testing :Unit testing involves the design of test cases that validate that the
internal program logic is functioning properly, and that program inputs produce
valid outputs. All decision branches and internal code flow should be validated. It is
the testing of individual software units of the application .it is done after the
completion of an individual unit before integration. This is a structural testing, that
relies on knowledge of its construction and is invasive. Unit tests perform basic tests
at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process
performs accurately to the documented specifications and contains clearly defined
inputs and expected results.
(b). Integration testing :Integration tests are designed to test integrated software
components to determine if they actually run as one program. Testing is event
driven and is more concerned with the basic outcome of screens or fields.
30
Integration tests demonstrate that although the components were individually
satisfaction, as shown by successfully unit testing, the combination of components
is correct and consistent. Integration testing is specifically aimed at exposing the
problems that arise from the combination of components.
(d). System testing :System testing ensures that the entire integrated software
system meets requirements. It tests a configuration to ensure known and
31
predictable results. An example of system testing is the configuration oriented
system integration test. System testing is based on process descriptions and flows,
emphasizing pre-driven process links and integration points
(e). White Box Testing :White Box Testing is a testing in which in which the
software tester has knowledge of the inner workings, structure and language of the
software, or at least its purpose. It is purpose. It is used to test areas that cannot be
reached from a black box level.
(f). Black Box Testing :Black Box Testing is testing the software without any
knowledge of the inner workings, structure or language of the module being tested.
Black box tests, as most other kinds of tests, must be written from a definitive
source document, such as specification or requirements document, such as
specification or requirements document. It is a testing in which the software under
test is treated, as a black box
. You cannot “see” into it. The test provides inputs and responds to outputs without
considering how the software works.
(g). Unit Testing :Unit testing is usually conducted as part of a combined code and
unit test phase of the software lifecycle, although it is not uncommon for coding
and unit testing to be conducted as two distinct phases.
Field testing will be performed manually and functional tests will be written in
detail.
1. Test objectives
32
• All field entries must work properly.
2. Features to be tested
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
(i). Acceptance Testing :User Acceptance Testing is a critical phase of any project
and requires significant participation by the end user. It also ensures that the system
meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
33
CONCLUSION
The Secure Online Transaction System with Cryptography project has successfully
addressed the limitations of existing online transaction systems by introducing
enhanced security measures and leveraging cryptography techniques. The project's
objectives were to ensure the confidentiality, integrity, and authenticity of online
transactions, safeguard sensitive data, and mitigate the risks associated with
unauthorized access and fraudulent activities. Through the implementation of
robust encryption mechanisms, such as the AES algorithm, the project has
significantly enhanced the data confidentiality of online transactions. By encrypting
transaction data during transmission and storage, the system provides a secure
environment, reducing the risk of data breaches and protecting sensitive
information. Furthermore, the integration with the MySQL database management
system provides efficient storage and retrieval of transaction-related information
while maintaining data integrity and security. Secure practices are implemented to
protect against SQL injection attacks and unauthorized access to the database.
Overall, the Secure Online Transaction System with Cryptography project has
successfully developed a secure environment for online transactions. The project's
outcomes contribute to the field of online transaction security by showcasing the
effective implementation of cryptography techniques and advanced security
measures. The proposed system provides users with enhanced data confidentiality,
integrity, and authentication, promoting trust and confidence in online
transactions. In conclusion, the Secure Online Transaction System with
Cryptography project has successfully addressed the security challenges in online
transactions, providing a robust and secure platform for users to conduct
transactions with confidence.
34
Future Work:
The Secure Online Transaction System with Cryptography project lays a solid
foundation for secure online transactions, but there are several areas for future
work and improvement to enhance its capabilities. The following are potential
avenues for future research and development:
Advanced Cryptographic Algorithms: While the project has implemented the AES
algorithm for encryption, exploring and integrating other advanced
cryptographic algorithms can provide additional security options. Researching
and evaluating algorithms such as RSA, Elliptic Curve Cryptography (ECC), or post-
quantum cryptography can strengthen the system's cryptographic capabilities.
Blockchain Integration: Investigating the integration of blockchain technology
into the online transaction system can provide decentralized and tamper-
resistant transaction records. Exploring blockchain frameworks and smart
contracts can enhance the system's transparency, traceability, and resistance to
fraud.
Biometric Identification: Expanding the authentication mechanisms to include
biometric identification, such as fingerprint or facial recognition, can further
strengthen user authentication. Researching biometric technologies, ensuring
their accuracy and reliability, and integrating them into the system can enhance
security and user experience.
Continuous Security Monitoring: Implementing real-time security monitoring
and anomaly detection techniques can provide proactive defense against
potential threats. Utilizing machine learning and artificial intelligence algorithms
35
can help identify patterns and detect abnormal behavior, allowing for immediate
response and mitigation of security incidents.
Compliance with Emerging Regulations: Staying up to date with evolving
regulatory frameworks, such as the General Data Protection Regulation (GDPR)
or Payment Card Industry Data Security Standard (PCI DSS), is crucial. Continually
updating the system to meet compliance requirements ensures the protection of
user data and reduces legal and reputational risks.
Enhanced User Education and Awareness: Improving user education initiatives to
promote secure online transaction practices is essential. Providing user-friendly
guides, tutorials, and resources on identifying and avoiding scams, phishing
attacks, and other online threats can empower users to make informed decisions
and protect themselves.
Usability and User Experience Enhancements: Conducting user studies and
feedback sessions to gather insights on the system's usability and user
experience can lead to iterative improvements. Incorporating user-centric design
principles and conducting usability testing can result in a more intuitive and
efficient system interface.
Penetration Testing and Vulnerability Assessments: Conducting regular
penetration testing and vulnerability assessments to identify and address
potential security weaknesses is critical. Engaging security experts to evaluate
the system's resilience against various attack vectors can enhance its overall
security posture.
Integration with Emerging Technologies: Exploring the integration of emerging
technologies, such as Internet of Things (IoT) devices or artificial intelligence, into
the online transaction system can open up new possibilities for secure and
36
efficient transactions. Evaluating the security implications and ensuring
compatibility with the existing system architecture are vital considerations.
Collaboration and Industry Standards: Collaborating with industry experts,
researchers, and organizations to exchange knowledge, share best practices, and
contribute to industry standards can drive the advancement of secure online
transaction systems. Participating in relevant forums, conferences, and
communities can foster innovation and facilitate the exchange of ideas.
Continued research, development, and innovation in these areas will enable the
Secure Online Transaction System with Cryptography project to stay at the
forefront of online transaction security, providing users with robust and
trustworthy platforms for conducting secure transactions.
37
REFERENCES
38
7. C. Hadnagy and P. Wilson, Social engineering: the art of human hacking.
Hoboken, N.J: Wiley, 2011.
Bhusari, V., and S. Patil. "Study of Hidden Markov Model in Credit Card
Fraudulent Detection." International Journal of Computer Applications, (0975
–8887), Volume 20–No.5, April 2011.
39