effective tracking of fraudulent action from multi fund transaction using big data and machine learning

T.A.Vinayagam ,Sathish Kiran V ,Mutharasan.R,Venkatesh Reddy.V

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 22 April,2024         Pages:1844-1851

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

In scenarios involving cloud services, a key challenge arises from the potential differences in how cloud vendors isolate and connect virtual machines across various cloud networks. Our approach addresses this challenge by prioritizing the tenant's needs, allowing them to dictate their preferred connectivity methods. We integrate Blockchain technology into this project, enabling secure and transparent data management. Our implementation encompasses both Public and Private cloud data storage, with Private storage reserved for sensitive data while Public storage caters to regular data needs. Specifically tailored for the banking sector, our system aims to analyze user behavior while safeguarding personal information. It achieves this by aggregating and monitoring all user transactions, including banking activities, land registrations, gold purchases, and any cash transactions exceeding Rs. 20,000.

Kewords

Cloud services, virtual machines, cloud networks, tenant-driven approach, Block chain technology, banking system, user behavior, personal identification, transactions, integration, sensitive data, transparency.

Reference

[1] "History of Anti-Money Laundering Laws". United States Department of the Treasury. 30 June 2015. Retrieved 30 June 2015. https://www.fincen.gov/history-anti-money-laundering-laws [2] "Money Laundering Act 2012 amended". Resource Portal of OGR Legal. OGR Legal. Retrieved in month 2 November 2015. https://resource.ogrlegal.com/money-laundering-act-2012-amended/ [3] "OPSI: Proceeds of Crime Act". Retrieved 14February2009. http://www.opsi.gov.uk/acts/acts2002/ukpga_20020029_en_1 [4] "Suspicious Money Laundering Transaction: Q&A". Anti-Money Laundering Division, Investigation Bureau, Ministry of Justice, Taiwan. Retrieved 20 November 2017. https://goo.gl/jbu6Ln [5] "Money Laundering". Wikipedia. Retrieved 18January2018. https://en.wikipedia.org/wiki/Money_laundering [6] "Suspicious Money Laundering or Terrorist Trading" Anti-Money Laundering Division, Investigation Bureau, Ministry of Justice, Taiwan. Retrieved 30 January 2018. https://goo.gl/SfDrvC [7] "Don't Trust Your Instincts-Benford’s law" PanSci. Retrieved 25 December 2017. https://pansci.asia/archives/54264 [8] "Money Laundering Control Act". Wikipedia. Retrieved 25 May 2019. https://en.wikipedia.org/wiki/Money_Laundering_Control_Act [9] Zhou, Y., Liu, Y., Zhao, D., & Yu, Y. (2019). A Review of Big Data Analytics for Fraud Detection in E-Commerce. IEEE Access, 7,Money Laundering 167459-167476. doi:10.1109/ACCESS.2019.2950072 [10] Zhang, X., Jiang, S., & Wang, B. (2019). A survey on big data-driven fraud detection in finance service industry. Electronic Commerce Research,19(2), 283-305. doi:10.1007/s10660-018-9302-3 [11] Hassan, M. M., Chowdhury, M. A., Nasser, M., & Alelaiwi, A. (2019). Big Data Analytics for Financial Fraud Detection: A Review. IEEE Access, 7, 18496-18516. doi:10.1109/ACCESS.2019.2893693 [12] Wu, D., Wang, Z., & Li, J. (2018). An Overview of Big Data Analytics in Finance. IEEE Access, 6, 18491-18509. doi:10.1109/ACCESS.2018.2803059 [13] Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144. doi:10.1016/j.ijinfomgt.2014.10.007 [16] Zheng, M., Cai, Y., Xu, H., & Ye, N. (2019). A Survey of Big Data Technologies for Cybersecurity. IEEE Access, 7, 115137 115157. doi:10.1109/ACCESS.2019.2935457 [17] Sari, D. K., & Supriyanto, A. (2020). Big Data for Financial Fraud Detection: A Systematic Literature Review. Journal of Theoretical and Applied Information Technology, 98(1), 150-164. [18] Yue, X., Wang, F., Jin, D., & Ma, J. (2016). Application and development. Frontiers of Computer Science, 10(4), 691-702. doi:10.1007/s11704-016-5314-z