Anda di halaman 1dari 9

Institute for Development and Research in Banking Technology

(Established by Reserve Bank of India)

Castle Hills, Road No. 1, Masab Tank, Hyderabad 500 057, India.
Ph: +91 40 2329 4000; Fax: +91 40 2353 5157
Visit us: www.idrbt.ac.in; e-mail: ipts2015@idrbt.ac.in

List of Projects offered for the IDRBT Project Trainee Scheme


during Summer 2015
RESEARCH AREA - 1 : FINANCIAL NETWORKS AND APPLICATIONS
Project 1: Fog Computing and its Applications to Banking
Guide: Dr. N. Raghu Kisore, Assistant Professor
Fog computing is a close cousin to cloud computing, a technology that takes advantage of the
distributed nature of todays virtualized IT resources. But instead of being out there
somewhere like the cloud, the fog is all around us, among the numerous smart objects we
interact with every day. Fog computing, like many IT developments, grew out of the need to
address a couple of growing concerns: being able to act in real time to incoming data and
working within the limits of available bandwidth.
Fog computing works in conjunction with cloud computing, optimizing the use of this
resource. Currently, most enterprise data is pushed up to the cloud, stored and analyzed,
after which a decision is made and action taken. But this system isnt efficient. Fog computing
allows computing, decision-making and action-taking to happen via IoT devices and only
pushes relevant data to the cloud. In this project we would like to explore the possible of
deploying fog computing in Indian Banks.

Project 2: Offline Certifying Authority Application


Guide: Dr. N. P. Dhavale, Deputy General Manager, Strategic Business Unit

Process Flow Design

Design and development of cryptographic modules (3 modules) using standard libraries

Audit and Application Security Testing

Live Pilot using actual requests from banks.

Page 1 of 9

RESEARCH AREA - 2: ELECTRONIC PAYMENTS AND SETTLEMENT


SYSTEMS
Project 3: Mobile Governance
Guide: Dr. V. N. Sastry, Professor
Enabling the government services of various types onto every citizens mobile phone is a challenge. The
project work involves study of framework of mobile governance as well as e-governance, technical
standards of m-governance, service categorization and development of a prototype mobile application
which can be used by people in multiple languages, over multiple mobile operating systems and offered
by multiple state governments.

Project 4: Detection of Frauds in Cheque Truncation System


Guide: Dr. Rajarshi Pal, Assistant Professor
Cheque Truncation System is an image based cheque clearing system. It is used to speedy
clearing of cheques. Recently, a huge number of cases related to cheque frauds have been
encountered by banks. Cheque frauds may be of different forms, such as forging signature,
altering payee name and amount, producing duplicate cheques. This project aims to detect
such kind of forgeries by analyzing the captured image of a cheque.
Prerequisite Knowledge: Image Processing, MATLAB.

Project 5: Prototyping the Concept of Digital Cheque and Demand Draft


Guide: Dr. Rajarshi Pal, Assistant Professor
Cheque and Demand Draft are commonly used payment instrument. Digital Cheque/ DD are
conceptualized as a digital image of a cheque/DD. Can banks, in future, issue a digital
cheque/DD, instead of, paper based cheque/DD? This project aims to seek a solution to this
question. This project will address how digital cheque/DD can be accommodated in the existing
banking system without causing significant change in the system. Moreover, this will reduce
operational cost (through reduction in printing of cheque/DD) and will enhance security of this
payment instrument (if properly designed). Frauds involving paper cheques also will reduce
with decreased usage of paper cheques.
Prerequisite Knowledge: Image Processing, Web Development in Java, Database connectivity.

Project 6: Issue of Electronic Bank Guarantees with e-Stamping for Payment


of Stamp Duty, through SFMS.
Guide: Shri Patrick Kishore, Chief Operating Officer, Strategic Business Unit
At present Banks issue Guarantees favoring various beneficiaries including Government
Authorities on non-Judicial stamp paper. In the light of many frauds which are taking place
Page 2 of 9

using counterfeit stamped paper, it is desirable to develop a system of issuing an electronic


Bank Guarantee which can be communicated by the issuing Bank to the beneficiary through the
beneficiarys bank. This will protect Banks against fraud and make the process more efficient.
The main issue to be considered is how stamp duty can be paid into State Treasury at the
issuing branch by integrating Banks SFMS system with e-stamping system, before an electronic
Bank Guarantee can be issued.

Project 7: Use of Time Stamping Services for Payment System Applications


Guide: Dr. N. P. Dhavale, Deputy General Manager, Strategic Business Unit

Banks are issuing bank guarantee to their customers and these are sent through SFMS.
The bank guarantees have specific requirement of, to be valid for a particular period and
the time at which the bank guarantee is issued can be of great business value depending
on the circumstances

On receipt of message containing bank guarantee, SFMS hub will send request for time
stamping of the same to the time stamping authority which is part of IDRBT CA. The
time stamping token will be generated and issued to the SFMS hub which can be
included as part of the message and stored / archived by the SFMS application.

RESEARCH AREA - 3: SECURITY TECHNOLOGIES FOR THE FINANCIAL


SECTOR
Project 8: Mobile Device Security Vulnerabilities and Prevention
Guide: Dr. V. N. Sastry, Professor
The project involves the study of vulnerabilities of mobile phones of different operating systems.
Identification of possible attacks on mobile phones at different levels including operating systems,
communication channels, data bases, mobile applications and devise interfaces. It is proposed to
develop a framework for automatic identification and prevention of vulnerabilities and do prototype
implementation.

Project 9: Digital Watermarking using Fractals


Guide: Dr. M. V. N. K. Prasad, Associate Professor
The introduction of world wide web has lead to the digital content sharing across the globe
enormously. Due to increase of Internet availability and digital image processing devices, the
digital image sharing and accessing has become simple and convenient. Thus protection of the
digital images has gained main focus of the active researchers. The Copy right is supposed to
occupy the front position in economical development among the rest of Intellectual Property
Rights. Digital Rights Management is a term generally refers to protect the copyrights of digital

Page 3 of 9

media files. The protection of the digital images can be enforced through encryption and
decryption, steganographic or digital watermarking.
Watermarking is a technique to insert copy right information within digital contents. A robust
watermarking method provides information that cannot be removed from the watermarked
content. Fractal image encoding theory is developed based on the concept of Iterated function
systems. The image is separated into complex and smooth regions based on fractal dimension
and then watermark is embedded. It is infeasible to identify watermark bits in cover image
through these techniques. The proposed work is to use fractal techniques and contourlet
transformation techniques for watermarking.

Project 10: Fingerprint Indexing


Guide: Dr. M. V. N. K. Prasad, Associate Professor
Biometric authentication refers to recognizing an individual based on his/her physiological or
behavioral characteristics, which has the capability to reliably distinguish between an
authorized person and an imposter. During the past few decades, many researchers have
carried out experiments on utilizing various biometrics for personal recognition. Among all
these biometrics (e.g., face, fingerprints, hand geometry, iris, retina, signature, voice print,
facial thermo gram, hand vein, gait, ear, odor, keystroke dynamics, etc.), fingerprint- based
recognition is one of the most mature, accurate and reliable technique.
A fingerprint is the pattern of ridges and valleys on the surface of the finger. The uniqueness of
a fingerprint can be determined by the overall pattern of ridges and valleys as well as the local
ridge anomalies a ridge bifurcation or a ridge ending, called minutiae points. Depending on the
application context, a fingerprint recognition system may be operated in one of the two modes:
verification or identification.

In verification, the user claim his identity along with the biometric data. Then, the
system verifies the persons identity by comparing the captured biometric with his own
biometric template pre-stored in the system. It conducts one-to-one comparison to
determine whether the identity claimed by the individual is true or not
In identification, the user does not claim any identity along with his biometric data.
Hence, the system in this mode recognizes an individual by sequentially searching the
entire template database for a match.

Note that, this sequential search process in an identification system works well for small
databases. But in reality the fingerprint databases contains large number of records (ex. India
AADHAR) and this process is expensive and unreliable. Therefore efficient indexing systems are
required that can search large databases in less time and without compromising system
performance. Unlike structured information such as text or numeric data that can be sorted,
fingerprint data does not have any natural sorting order. As the fingerprint data is unstructured,

Page 4 of 9

this type of database cannot be indexed into alphabetical or numerical order. Therefore
indexing these fingerprint databases represents a challenging problem.

Project 11: Biometric Cryptosystems


Guide: Dr. M. V. N. K. Prasad, Associate Professor
Abstract
In traditional Cryptosystems, user authentication is based on secret keys. If the keys are not
kept secret i.e. possessed by the attackers the system fails. Further the keys may be forgotten,
lost and stolen. Thus traditional cryptosystems cannot provide non-repudiation. Current
authentication systems using various biometric characteristics such as fingerprint, face, iris etc.
can be used in cryptosystems to resolve these problems of traditional cryptosystems. Biometric
Cryptosystems bind a cryptographic key with the biometric template stored in the database.
The key is not revealed until the successful biometric authentication.
Challenges :

Designing a method in way that if a biometric template is compromised , the


biometric itself is not lost forever and a new template can be issued
Designing a method such that different applications use different biometric
templates to ensure privacy preserving and cross matching is not possible by
tracking the applications
Designing a method to generate a cryptographic key from the biometric features
and the key management should be convenient and secure.

Project 12: Secure Cloud Storage


Guide: Dr. G. R. Gangadharan, Assistant Professor
Cloud storage is an increasingly popular class of online services for archiving, backup, sharing of
data, synchronization of multiple devices and it is also envisioned for future primary storage of
enterprise data. The cloud storage system introduces security concerns over protection of data
integrity and data access control. In this project, we will propose a secure storage verification
scheme with explicit dynamic data support to ensure the correctness and availability of users
data in the cloud.

Project 13: Application of Hidden Markov Model for Intrusion Detection


System
Guide: Dr. N. Raghu Kisore, Assistant Professor
Network intrusion detection systems NIDS are placed at a strategic point or points within the
network to monitor traffic to and from all devices on the network. It performs an analysis for a
passing traffic on the entire subnet, works in a promiscuous mode, and matches the traffic
Page 5 of 9

that is passed on the subnets to the library of known attacks. Once the attack is identified, or
abnormal behavior is sensed, the alert can be sent to the administrator. Example of the NIDS
would be installing it on the subnet where firewalls are located in order to see if someone is
trying to break into the firewall. Ideally one would scan all inbound and outbound traffic,
however doing so might create a bottleneck that would impair the overall speed of the
network.
Recent research work on Hidden Markov Model (HMM) analysis has shown that HMM is more
effective than other techniques like machine learning in detecting of computer viruses and
their classification. In this research, we propose to develop a Profile Hidden Markov Models
(PHMM) for developing Intrusion detection systems for Computer networks.

Project 14: Modeling and Analysis of Security Requirements of Indian Banking


Community Cloud.
Guide: Dr. N. Raghu Kisore, Assistant Professor
Security Requirements Engineering is an emerging field which lies at the crossroads of
Security and Software Engineering. Much research has focused on this field in recent years,
spurred by the realization that security must be dealt with in the earliest phases of the
software development process as these phases cover a broader organizational perspective.
Agent-oriented methodologies have proved to be especially useful in this setting as they
support the modeling of the social context in which the system-to-be will operate.
In the current project we would apply secure Trophos in order to model and analyze security
requirements alongside functional requirements of IBCC. The methodology provides a
requirements analysis process that drives system designers from the acquisition of
requirements up to their verification.

Project 15: Ensuring Data Storage Security in Cloud Computing


Guide: Dr. P. Syam Kumar, Assistant Professor
Data storage is an important application of cloud computing, where the users remotely store
their data into the cloud servers and access the data from cloud servers. Due to the data
outsourcing, however, this new paradigm of data storage service also introduces security
challenges, such as Confidentiality, Integrity and Availability of data. The protection of these
issues in cloud is a very challenging and potentially formidable task. The aim of this project is to
provide security protocols to ensure the Confidentiality, Integrity and Availability of data stored
in cloud.

Project 16: Privacy-Preserving of Outsourced Data in Cloud Computing


Guide: Dr. P. Syam Kumar, Assistant Professor

Page 6 of 9

With the growing popularity of cloud computing, the data owners are motivated to outsource
their data files from local sites to the commercial public cloud for great flexibility and economic
savings. Although public cloud offers many advantages, privacy of the outsourced data is a big
concern. To protect privacy, sensitive data have to be encrypted before outsourced to the
commercial public cloud, which makes effective data utilization service at very challenging task.
The aim of this project is develop an efficient privacy-preserving protocol for outsourced data in
cloud computing.

Project 17: Mitigating DDOS Attacks in Cloud Computing


Guide: Dr. P. Syam Kumar, Assistant Professor
Distributed Denial of Service (DDOS) attacks are a great threat to service availability in cloud
computing. In recent years, DDoS attacks have increased tremendously in bandwidth and
technique. Cloud security is one of most important issue that has attracted a lot of research and
development effort in past few years. Within the cloud system, especially the Infrastructure-asa-Service (IaaS) clouds, the detection DDOS attacks are extremely difficult. This is because cloud
users may install vulnerable applications on their virtual machines. The aim of this project is to
design a new approach to mitigate the DDOS attacks in cloud computing.

Project 18: Developing a System of Aadhar Based Biometric Authentication


for Internet Banking.
Guide: Shri Patrick Kishore, Chief Operating Officer, Strategic Business Unit
At present security in internet banking transactions depends only on user ID, password and
OTP. During the recent past many frauds have come to light where all these were
compromised resulting in customers losing money. In the State of Maharashtra many such
cases were ruled against the bank which has resulted in banks bearing the cost of the frauds. It
is proposed to develop a system whereby users biometric (fingerprint) is captured and verified
with the database of UIDAI for authentication. This will guard customers and the banks against
phishing and stealing of OTP.

Project 19: Authentication and Access to Web Based Application using


Biometric in Place of Password.
Guide: Dr. N. P. Dhavale, Deputy General Manager, Strategic Business Unit

Development of basic web based application for logging in using options of password
and finger print based biometric

Integration of various finger print biometric devices available in the market in the
application

Page 7 of 9

Integration with Aadhar for authentication in place of authentication from local


fingerprint database

integration with applications such as windows based log in, screen saver log, additional
security for password based log in, file / data encryption, internet banking etc.

RESEARCH AREA - 4: FINANCIAL INFORMATION SYSTEMS AND


ANALYTICS
Project 20: Mobile Website and Banks Intranet Services
Guide: Dr. V. N. Sastry, Professor
The project involves the design and development of a Banks Mobile Website and accessing the various
services of intranet though the mobile phone for day to day works of the employee. The secure coding
practices for such development across multiple mobile browsers and demonstration of key issues of
security would be highlighted.

Project 21: Big Data Analytics


Guide: Dr. V. Ravi, Professor
Big data analytics will be explored in finance domain with specific intent on implementing
spiking neural network architecture. It will be tested on a set of problems taken from literature.

Project 22: Development of Ontology in Financial Domain


Guide: Dr. V. Ravi, Professor
Ontology shall be developed using fuzzy formal concept analysis. We will also investigate its
relationship with fuzzy cognitive maps. The methodology shall be illustrated on few problems
taken from finance.

Project 23: Hierarchical Classification of Customer Reviews using Evolutionary


Computing
Guide: Dr. V. Ravi, Professor
Evolutionary computing algorithms shall be employed to classify the customer review in a given
domain hierarchically with respect to aspect of products.

Project 24: Web Service Composition Using Meta-heuristic Techniques


Guide: Dr. G. R. Gangadharan, Assistant Professor
Web service composition is a process by which existing web services can be integrated together
to create value added composite web services that satisfy the user's requirements. However,
due to the availability of large number of web services on the internet offering the same
functionality, finding suitable web services for composition that satisfies a particular users
Page 8 of 9

requirements is difficult and seen as multi objective optimization problem. In this project, we
propose a novel web service composition methodology using meta-heuristic techniques.

Project 25: Relative Effectiveness of QoS Attributes in Service Selection and


Composition
Guide: Dr. G. R. Gangadharan, Assistant Professor
With the growing demand for the services there are many service providers delivering many
services with varying Quality of service (QoS) attributes including different prices and
performances. It has now become a challenge for the users to select a service which will best
satisfy their requirements. Service selection is considered the most pivotal step of service
composition, as it determines the quality of the composite service. In this project, we will
evaluate the relative effectiveness of QoS attributes among individual services and possible
composition scenarios, using computational intelligence techniques.

Page 9 of 9

Anda mungkin juga menyukai