Survey on Integration of Multi-Cloud Deployment with Multi Bank & User Smart Card
Keywords:
RFID, Cloud Servers, HMM, Formula Based Authentication, QR CodeAbstract
In the EXISTING SYSTEM, Big data is really opportunity based environment. Big data analytics would definitely lead to valuable knowledge for many organizations. Big data challenges include capturing data, data storage, data analysis, search, sharing, transfer, visualization, querying, updating and information privacy. In the PROPOSED SYSTEM, Integration of Big Data, Business analytical and RFID like technology are supposed to be recent trends in IT. It is most challenge oriented activity. The MODIFICATION, which is our implementation, we are proposing an integrated application for Banking, Hospital, Passport & Ration. RFID is used as User Identification number for all these four applications. In banking application, User can add his / her multiple Bank accounts in a single card. User can also add Multi user accounts also. On multi user accounts transaction, parent user can set the withdrawal Limit. On every transaction OTP will be verified. Formula authentication is verified for withdrawal of money above the limit. User can use that multi card in hospital to get their report. Multi card can also be used in passport to register the travel details. All the data are stored in multiple Cloud Servers.
References
- N. Manwani and P. S. Sastry, “Noise tolerance under risk minimization,” IEEE Trans. Cybern., vol. 43, no. 3, pp. 1146–1151, Jun. 2013.
- Kuiran Shi and Tiaojun Xiao “Coordination of a supply chain with a loss-averse retailer under two types of contracts”, International Journal of Information and Decision Sciences, Vol. 1, No. 1, 2008
- S.Nageswara Rao and B.R.M.Reddy, “Developing Data Cloud Services in Various Environments”, IEEE 2014
- Vishakha More and Prof. Raghib Nasri, “Application Framework and Data Processing in IoT based Email System”, IJARCCE Vol. 5, Issue 6, June 2016
- Olatunde A. Durowoju, Hing Kai Chan and Xiaojun Wang, “The Impact Of Security And Scalability Of Cloud Service On Supply Chain Performance”, Journal of Electronic Commerce Research, VOL 12, NO 4, 2011
- M.Kameshwara Rao and P. Bhavya Sree, “A Novel Approach of Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes”, IJSR, 2012
- Te-Shun Chou, “Security threats on cloud computing vulnerabilities”, IJCSIT, Volume 5, No 3, June 2013.
- Leonid Kalinichenko, Ivan Shanin and Ilia Taraban, “Methods for Anomaly Detection: a Survey”, RCDL, 2014
- Abhinav S. Raut and Kavita R. Singh, “Anomaly Based Intrusion Detection-A Review”, International Journal on Network Security, Vol. 5, 2014
- Ryohei Fujimaki, Takehisa Yairi and Kazuo Machida, “An Approach to Spacecraft Anomaly Detection Problem Using Kernel Feature Space”, KDD’05, August 21–24, 2005
- Arthur Gretto and Fredric Desobry, “On-Line One-Class Support Vector Machines. An Application To Signal Segmentation”, IEEE, 2003
- Fredrik Gustafson, “The marginalized likelihood ratio test for Detecting abrupt changes”, IEEE, 2001
- J. Cohen, B. Dolan, M. Dunlap, J. M. Hellerstein, and C. Welton, “MAD skills: New analysis practices for big data,” in Proc. VLDB Endowment, 2009, vol. 2. no. 2, pp. 1481–1492.
- T. Yong, “Framework of comprehensive defense architecture for power system security and stability,” Power Syst. Technol., vol. 36, no. 8, pp. 1–5, 2012
- D. Boyd and K. Crawford, “Six provocations for big data,” Working paper, MIT, Cambridge, MA, USA, 2012.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.