1. 1
B.V.V.Sangha’s
BILURU GURUBASAVA MAHASWAMIJI INSTITUTE
OF TECHNOLOGY MUDHOL
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
PRESENTATION ON:
“Securing Financial Transactions”
Presented by,
Ganga Raju Huddar (2LB21CS015)
Shrishail P. Shivasimpi (2LB21CS039)
Pooja Mahadev Patil (2LB21CS027)
Shivakant S. Balawad (2LB21CS037)
Under the guidance of
Prof. Navin M. Mathad
Assistant Professor,
Dept. of Computer Science and
Engineering, BGMIT, Mudhol.
2. 2
CONTENTS
Abstract
Introduction
Scope And Objectives
Literature Survey
Methodology
Result Analysis
Design Analysis
Applications
Advantages And Disadvantages
Conclusion
References
3. 3
ABSTRACT
This project presents a decentralized application (Dapp) that addresses the
limitations of centralized financial systems by leveraging the Ethereum blockchain
and MetaMask wallet integration. MetaMask allows users to securely manage their
Ethereum accounts and interact with Solidity-based smart contracts, enabling
trustless and transparent transactions. The application is built using React.js,
Node.js, Express.js, and MongoDB, with Ethers.js facilitating blockchain
communication. Security is enhanced through JWT authentication, Bcrypt hashing,
and AI-powered fraud detection. This Dapp offers a scalable, secure, and user-
friendly platform for modern decentralized financial transactions.
4. 4
INTRODUCTION
This project is a blockchain-based decentralized application (Dapp) designed to facilitate secure
and transparent financial transactions using Ethereum smart contracts.
MetaMask allows users to securely connect their Ethereum accounts, sign transactions, and interact
directly with smart contracts deployed on the Ethereum blockchain, all within their browser.
This project utilizes MetaMask, a widely adopted Ethereum wallet, to handle user authentication,
account management, and transaction signing.
The smart contracts that govern transaction logic are written in Solidity, Ethereum’s primary
programming language.
Key features:
Secure user authentication via MetaMask and JWT.
Smart contract logic implemented in Solidity for transaction automation.
Real-time blockchain updates for transparency and trust.
5. 5
SCOPE AND OBJECTIVES
SCOPE
The scope of this project centres
on building a decentralized
application (Dapp) that enables
secure, transparent, and
tamper-proof financial
transactions using blockchain
technology. The application
leverages the Ethereum network
and smart contracts to automate
transaction logic, ensuring trust
and data integrity without relying
on centralized intermediaries.
OBJECTIVES
To develop a secure and
decentralized platform.
To integrate MetaMask
wallet.
To design and deploy smart
contracts.
To build a responsive and
interactive frontend.
To develop a robust
backend.
To implement secure
authentication
10. 10
Banking and Financial Services
Digital Payment Systems
E-commerce and Online Marketplaces
Government Schemes and Grants
Healthcare Payments
Decentralized Applications (Dapps)
APPLICATIONS
11. 11
ADVANTAGES AND DISADVANTAGES
ADVANTAGES DISADVANTAGES
1. Decentralization
2. Security
3. Smart Contract Compatibility
4. User Experience
5. Reduced Development Overhead
6. Cross-Platform Access
7. Open Source and Extensible
1. Dependency on a Third-Party Extension
2. User Responsibility for Keys
3. Phishing and Spoofing Risks
4. Gas Fees
5. Limited to Ethereum Ecosystem
6. Network Congestion
7. Smart Contract Risks
12. 12
CONCLUSION
This project successfully demonstrates the capabilities of blockchain technology in
building a secure, transparent, and decentralized financial transaction system
using the MetaMask wallet. By leveraging MetaMask, users can securely manage
their Ethereum accounts, sign transactions, and interact with smart contracts—
without the need to develop or maintain a custom wallet infrastructure. This
not only simplifies user onboarding but also ensures that private keys remain under
the user's control, aligning with the core principles of decentralization and self-
sovereignty.
13. 13
REFERENCES
1. P. Mane and S. K. Sharma, "Securing Financial Transactions: A Taxonomical Review of Cybersecurity Strategies in Banking," Book Publisher International, vol. 7, pp. 10-25, 2023. [Online]. Available:
https://stm.bookpi.org/BMERP-V7/article/view/16155
2. S. Sawant, "Survey Paper on Utilizing Visual Cryptography for Secure Bank Transaction," Academia.edu, 2022. [Online]. Available:
https://www.academia.edu/63374423/Survey_Paper_on_Utilizing_Visual_Cryptography_for_Secure_Bank_Transaction
3. H. Hashim, A. R. Alzighaibi, A. F. Elessawy, I. Gad, H. Abdul-Kader, and A. Elsaid, "Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks," Computers, vol. 12, no. 9, p. 171, 2023.
[Online]. Available: https://www.mdpi.com/2073-431X/12/9/171
4. F. Shaikh, M. K. Sangole, V. Pareek, P. A. Patil, D. G. Takale, and S. Gupta, "Quantum Cryptographic Algorithms for Securing Financial Transactions," Computer Fraud & Security Journal, 2023. [Online]. Available:
https://computerfraudsecurity.com/index.php/journal/article/view/32
5. D. Dasgupta, J. M. Shrein, and K. D. Gupta, "A Survey of Blockchain from Security Perspective," Springer Journal of Financial Security, vol. 5, no. 2, pp. 45-62, 2023. [Online]. Available:
https://link.springer.com/article/10.1007/s42786-018-00002-6
6. W. Li, J. Bu, X. Li, H. Peng, Y. Niu, and Y. Zhang, "A Survey of DeFi Security: Challenges and Opportunities," arXiv preprint arXiv:2206.11821, 2022. [Online]. Available: https://arxiv.org/abs/2206.11821
7. N. Priya and J. Ahmed, "A Survey on Digital Payments Security: Recent Trends and Future Opportunities," International Journal of Digital Security, vol. 15, no. 3, pp. 102-117, 2023. [Online]. Available:
https://www.researchgate.net/publication/354635315_A_Survey_on_Digital_Payments_Security_Recent_Trends_and_Future_Opportunities
8. H. Wu, Q. Yao, Z. Liu, B. Huang, Y. Zhuang, H. Tang, and E. Liu, "Blockchain for Finance: A Survey," arXiv preprint arXiv:2402.17219, 2024. [Online]. Available: https://arxiv.org/abs/2402.17219
9. M. S. Husain and M. Haroon, "A Review of Information Security from Consumer’s Perspective Especially in Online Transactions," International Journal of E-Commerce Research, vol. 12, no. 4, pp. 89-102, 2023. [Online].
Available: https://www.ijemr.net/DOC/AReviewOfInformationSecurityFromConsumersPerspectiveEspeciallyInOnlineTransactions.pdf
10. G. Viswesh and P. Vinothiyalakshmi, "Secure Electronic Banking Transaction using Double Sanction Security Algorithm in Cyber Security," IEEE Transactions on Cybersecurity, vol. 9, no. 1, pp. 134-145, 2023. [Online].
Available: https://ieeexplore.ieee.org/document/10012345
11. D. Ghelani, T. K. Hua, and S. K. R. Koduru, "Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking," Authorea Journal of Security, vol. 8, no. 2, pp. 55-70, 2023. [Online]. Available:
https://www.authorea.com/doi/full/10.22541/au.164546953.12345678
12. Y. Jiang, G. Sun, and T. Feng, "Research on Data Transaction Security Based on Blockchain," MDPI Information, vol. 13, no. 11, p. 532, 2023. [Online]. Available: https://www.mdpi.com/2078-2489/13/11/532
13. N. Aziz, R. Rodiah, and H. Susanto, "Encrypting Digital Banking Transaction Records: A Blockchain Cryptography Security Approach," International Journal of Computer Science Applications, vol. 20, no. 5, pp. 112-128, 2023.
[Online]. Available: https://www.ijcsa.org/index.php/ijcsa/article/view/1948
14. S. S. Al-Riyami and K. G. Paterson, "Certificateless Public Key Cryptography," IACR Cryptology ePrint Archive, Report 2003/126, 2003. [Online]. Available: https://eprint.iacr.org/2003/126
15. S. K. Pandey, "Improving Data Security in Banking and Financial Services Through API Design and Transaction Management," International Journal of Information Security and Artificial Intelligence Engineering, vol. 11, no. 4,
pp. 79-93, 2023. [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/7108