Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Credit And Debit Card Transaction Survey Using Map Reduce In Hdfs And Implementing Syferlock To Prevent Fraudulent

Author : R.Anbuvizhi 1 V.Balakumar 2

Date of Publication :7th January 2016

Abstract: Big Data” is a term that has jumped overnight from its roots. It can be described as an innovative technique and technology to save, distribute, manage, visualize and analyze larger-sized data with extreme velocity and methods to manage unstructured and structure incapable amount of data. Nowadays fraud transactions in real time are increasing, so identifying large-scale patterns across many transactions or detecting anomalous behavior from an individual user can change the fraudulent in online transaction. Thus banks are turning to analytics to predict and prevent fraud in real times. In this project, proposed system deals with Credit and Debit card management to improve its scalability and efficiency in big data environment, it is implemented on (HDFS) Hadoop distributed file system. On the other hand, nowadays fraudulent and web attacker are increased to steel the password. In order to overcome those, proposed system implements SyferLock concept to add more security to Credit card transaction. The changes include a stronger user authentication tool, SyferLock that will require associates to follow a few new steps when logging into the network remotely. SyferLock patented, random number generation authentication solutions provide next generation One-Time Passwords/PINs (OTPs) for secure access to computers, networks and the Internet. SyferLock has engineered an enhanced authentication methodology and system using device-less OTPs that provides users with a simple, more secure way to access information leveraging their existing passwords. It uses a one-time password that expired once used. This added security strengthens the ability to protect the applications and systems.

Reference :

    1. Big Data and IT-Enabled Services Ecosystem and Coevolution
    2. C. Lynch, ―Big Data: How Do Your Data Grow?‖ Nature, vol. 455, no. 7209, pp. 28-29, 2008.
    3. F. Chang, J. Dean, S. Ghemawat, and W.C. Hsieh, ―Bigtable: A Distributed Storage System for Structured Data,‖ ACM Trans.Computer Systems, vol. 26, no. 2, article 4, 2008.
    4. G. Linden, B. Smith, and J. York, ―Amazon.com Recommendations
    5. https://azure.microsoft.com/enus/documentation/articles/storage-monitor-storageaccount/
    6. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnum ber=4597240&url=http%3A%2F%2Fieeexplore.ieee.o rg%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4597240
    7. Item-to-Item Collaborative Filtering,‖ IEEE Internet Computing,vol. 7, no. 1, pp. 76-80, Jan. 2003.
    8. i2MapReduce: Incremental Map Reduce for Mining Evolving Big Data
    9. Internet of Things and the Credit Card Market
    10. J. Manyika et al., ―Big Data: The Next Frontier for Innovation, Competition, and Productivity,‖ 2011.
    11. KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications
    12. "The Internet of Things", ITU Internet Reports, 2005
    13. Towards a Restful,‖Plug and Play Experience in the Web of Things‖.
    14. W. Hill, L. Stead, M. Rosenstein, and G. Furnas, ―Recommending and Evaluating Choices in a Virtual Community of Use,‖ Proc.SIGCHI Conf. Human Factors in Computing System (CHI ’95),
    15. W. Dou, X. Zhang, J. Liu, and J. Chen, ―HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications,‖ IEEE Trans. Parallel and Distributed Systems, 2013.
    16. Y. Chen, A. Cheng, and W. Hsu, ―Travel Recommendation byMining People Attributes and Travel Group Types from Community-Contributed Photos,‖ IEEE Trans. Multimedia, vol. 25, no. 6,pp. 1283-1295, Oct. 2013.
    17. Z. Zheng, X. Wu, Y. Zhang, M. Lyu, and J. Wang, ―QoS Ranking Prediction for Cloud Services,‖ IEEE Trans. Parallel and DistributedSystems, vol. 24, no. 6, pp. 1213-1222, June 2013.

Recent Article