INTERNATIONAL JOURNAL OF NOVEL RESEARCH AND DEVELOPMENT International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2456-4184 | Impact factor: 8.76 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.76 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
ABSTRACT
The use of online banking has significantly increased because of the rapid progress of electronic commerce technologies. Virtual and physical cards are used in online banking to make purchases of goods and services Virtual cards are used for online transactions and actual cards being used for offline transactions. Cashless shopping is made possible through net banking, which is quickly becoming the most common method of payment for both regular and online purchases. It will be the most practical way to do internet business, pay bills, etc. Attackers simply require a small amount of information to conduct fraudulent transactions in the online payment mode (secure code, card number, expiration date etc.). Most transactions in this buying technique will take place over the phone or the Internet. A fraudster only needs to be aware of the card information to make these types of purchases fraudulently. Much of the time, the legitimate cardholder is unaware that his card information has been viewed or stolen. Consequently, there are also rising dangers of fraud transactions using banking information. Fraudulent transactions will be identified in the current cyber security system after the transaction has been completed. It is challenging to identify fraud because the issuing agencies will not allow losses. Therefore, we can use a vertical level server architecture in this project to divide the intermediary gateway and boost security. Transaction details are divided and kept in primary and secondary servers as sensitive attributes. In order to defeat conventional cryptography techniques, you should also design a data suppression scheme that transforms string and number characters into special symbols.
Keywords:
Big data,Data anonymization techniques, Radio frequency identification
Cite Article:
"Enhanced data privacy using vertical fragmentation and data anonymization techniques", International Journal of Novel Research and Development (www.ijnrd.org), ISSN:2456-4184, Vol.8, Issue 2, page no.a195-a198, February-2023, Available :http://www.ijnrd.org/papers/IJNRD2302023.pdf
Downloads:
000118754
ISSN:
2456-4184 | IMPACT FACTOR: 8.76 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.76 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Facebook Twitter Instagram LinkedIn