SlideShare a Scribd company logo
1
B.V.V.Sangha’s
BILURU GURUBASAVA MAHASWAMIJI INSTITUTE
OF TECHNOLOGY MUDHOL
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
PRESENTATION ON:
“Securing Financial Transactions”
Presented by,
Ganga Raju Huddar (2LB21CS015)
Shrishail P. Shivasimpi (2LB21CS039)
Pooja Mahadev Patil (2LB21CS027)
Shivakant S. Balawad (2LB21CS037)
Under the guidance of
Prof. Navin M. Mathad
Assistant Professor,
Dept. of Computer Science and
Engineering, BGMIT, Mudhol.
2
CONTENTS
 Abstract
 Introduction
 Scope And Objectives
 Literature Survey
 Methodology
 Result Analysis
 Design Analysis
 Applications
 Advantages And Disadvantages
 Conclusion
 References
3
ABSTRACT
This project presents a decentralized application (Dapp) that addresses the
limitations of centralized financial systems by leveraging the Ethereum blockchain
and MetaMask wallet integration. MetaMask allows users to securely manage their
Ethereum accounts and interact with Solidity-based smart contracts, enabling
trustless and transparent transactions. The application is built using React.js,
Node.js, Express.js, and MongoDB, with Ethers.js facilitating blockchain
communication. Security is enhanced through JWT authentication, Bcrypt hashing,
and AI-powered fraud detection. This Dapp offers a scalable, secure, and user-
friendly platform for modern decentralized financial transactions.
4
INTRODUCTION
 This project is a blockchain-based decentralized application (Dapp) designed to facilitate secure
and transparent financial transactions using Ethereum smart contracts.
 MetaMask allows users to securely connect their Ethereum accounts, sign transactions, and interact
directly with smart contracts deployed on the Ethereum blockchain, all within their browser.
 This project utilizes MetaMask, a widely adopted Ethereum wallet, to handle user authentication,
account management, and transaction signing.
 The smart contracts that govern transaction logic are written in Solidity, Ethereum’s primary
programming language.
 Key features:
 Secure user authentication via MetaMask and JWT.
 Smart contract logic implemented in Solidity for transaction automation.
 Real-time blockchain updates for transparency and trust.
5
SCOPE AND OBJECTIVES
SCOPE
The scope of this project centres
on building a decentralized
application (Dapp) that enables
secure, transparent, and
tamper-proof financial
transactions using blockchain
technology. The application
leverages the Ethereum network
and smart contracts to automate
transaction logic, ensuring trust
and data integrity without relying
on centralized intermediaries.
OBJECTIVES
 To develop a secure and
decentralized platform.
 To integrate MetaMask
wallet.
 To design and deploy smart
contracts.
 To build a responsive and
interactive frontend.
 To develop a robust
backend.
 To implement secure
authentication
6
LITERATURE SURVEY
7
METHODOLOGY
8
RESULT ANALYSIS
9
DESIGN ANALYSIS
10
Banking and Financial Services
Digital Payment Systems
E-commerce and Online Marketplaces
Government Schemes and Grants
Healthcare Payments
Decentralized Applications (Dapps)
APPLICATIONS
11
ADVANTAGES AND DISADVANTAGES
ADVANTAGES DISADVANTAGES
1. Decentralization
2. Security
3. Smart Contract Compatibility
4. User Experience
5. Reduced Development Overhead
6. Cross-Platform Access
7. Open Source and Extensible
1. Dependency on a Third-Party Extension
2. User Responsibility for Keys
3. Phishing and Spoofing Risks
4. Gas Fees
5. Limited to Ethereum Ecosystem
6. Network Congestion
7. Smart Contract Risks
12
CONCLUSION
This project successfully demonstrates the capabilities of blockchain technology in
building a secure, transparent, and decentralized financial transaction system
using the MetaMask wallet. By leveraging MetaMask, users can securely manage
their Ethereum accounts, sign transactions, and interact with smart contracts—
without the need to develop or maintain a custom wallet infrastructure. This
not only simplifies user onboarding but also ensures that private keys remain under
the user's control, aligning with the core principles of decentralization and self-
sovereignty.
13
REFERENCES
1. P. Mane and S. K. Sharma, "Securing Financial Transactions: A Taxonomical Review of Cybersecurity Strategies in Banking," Book Publisher International, vol. 7, pp. 10-25, 2023. [Online]. Available:
https://stm.bookpi.org/BMERP-V7/article/view/16155
2. S. Sawant, "Survey Paper on Utilizing Visual Cryptography for Secure Bank Transaction," Academia.edu, 2022. [Online]. Available:
https://www.academia.edu/63374423/Survey_Paper_on_Utilizing_Visual_Cryptography_for_Secure_Bank_Transaction
3. H. Hashim, A. R. Alzighaibi, A. F. Elessawy, I. Gad, H. Abdul-Kader, and A. Elsaid, "Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks," Computers, vol. 12, no. 9, p. 171, 2023.
[Online]. Available: https://www.mdpi.com/2073-431X/12/9/171
4. F. Shaikh, M. K. Sangole, V. Pareek, P. A. Patil, D. G. Takale, and S. Gupta, "Quantum Cryptographic Algorithms for Securing Financial Transactions," Computer Fraud & Security Journal, 2023. [Online]. Available:
https://computerfraudsecurity.com/index.php/journal/article/view/32
5. D. Dasgupta, J. M. Shrein, and K. D. Gupta, "A Survey of Blockchain from Security Perspective," Springer Journal of Financial Security, vol. 5, no. 2, pp. 45-62, 2023. [Online]. Available:
https://link.springer.com/article/10.1007/s42786-018-00002-6
6. W. Li, J. Bu, X. Li, H. Peng, Y. Niu, and Y. Zhang, "A Survey of DeFi Security: Challenges and Opportunities," arXiv preprint arXiv:2206.11821, 2022. [Online]. Available: https://arxiv.org/abs/2206.11821
7. N. Priya and J. Ahmed, "A Survey on Digital Payments Security: Recent Trends and Future Opportunities," International Journal of Digital Security, vol. 15, no. 3, pp. 102-117, 2023. [Online]. Available:
https://www.researchgate.net/publication/354635315_A_Survey_on_Digital_Payments_Security_Recent_Trends_and_Future_Opportunities
8. H. Wu, Q. Yao, Z. Liu, B. Huang, Y. Zhuang, H. Tang, and E. Liu, "Blockchain for Finance: A Survey," arXiv preprint arXiv:2402.17219, 2024. [Online]. Available: https://arxiv.org/abs/2402.17219
9. M. S. Husain and M. Haroon, "A Review of Information Security from Consumer’s Perspective Especially in Online Transactions," International Journal of E-Commerce Research, vol. 12, no. 4, pp. 89-102, 2023. [Online].
Available: https://www.ijemr.net/DOC/AReviewOfInformationSecurityFromConsumersPerspectiveEspeciallyInOnlineTransactions.pdf
10. G. Viswesh and P. Vinothiyalakshmi, "Secure Electronic Banking Transaction using Double Sanction Security Algorithm in Cyber Security," IEEE Transactions on Cybersecurity, vol. 9, no. 1, pp. 134-145, 2023. [Online].
Available: https://ieeexplore.ieee.org/document/10012345
11. D. Ghelani, T. K. Hua, and S. K. R. Koduru, "Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking," Authorea Journal of Security, vol. 8, no. 2, pp. 55-70, 2023. [Online]. Available:
https://www.authorea.com/doi/full/10.22541/au.164546953.12345678
12. Y. Jiang, G. Sun, and T. Feng, "Research on Data Transaction Security Based on Blockchain," MDPI Information, vol. 13, no. 11, p. 532, 2023. [Online]. Available: https://www.mdpi.com/2078-2489/13/11/532
13. N. Aziz, R. Rodiah, and H. Susanto, "Encrypting Digital Banking Transaction Records: A Blockchain Cryptography Security Approach," International Journal of Computer Science Applications, vol. 20, no. 5, pp. 112-128, 2023.
[Online]. Available: https://www.ijcsa.org/index.php/ijcsa/article/view/1948
14. S. S. Al-Riyami and K. G. Paterson, "Certificateless Public Key Cryptography," IACR Cryptology ePrint Archive, Report 2003/126, 2003. [Online]. Available: https://eprint.iacr.org/2003/126
15. S. K. Pandey, "Improving Data Security in Banking and Financial Services Through API Design and Transaction Management," International Journal of Information Security and Artificial Intelligence Engineering, vol. 11, no. 4,
pp. 79-93, 2023. [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/7108
14
THANK YOU

More Related Content

DOCX
Use case of block chain unit 4 AKTU
PDF
REDACTABLE BLOCKCHAIN .How to change the immutable and the consequences of do...
PDF
Harnessing Blockchain to Combat Financial Fraud through Distributed Ledger Te...
PPTX
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
PPT
Blockchain SEMINAR PPT Graduate.ppt
PPTX
A Technological Perspective of Blockchain Security
PDF
slides-NPTEL-BlockchainTechnologyApplications.pdf
PDF
Blockchain Technology and Applications 1st Edition Ahmed Banafa
Use case of block chain unit 4 AKTU
REDACTABLE BLOCKCHAIN .How to change the immutable and the consequences of do...
Harnessing Blockchain to Combat Financial Fraud through Distributed Ledger Te...
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
Blockchain SEMINAR PPT Graduate.ppt
A Technological Perspective of Blockchain Security
slides-NPTEL-BlockchainTechnologyApplications.pdf
Blockchain Technology and Applications 1st Edition Ahmed Banafa

Similar to Document_from_.pptx dhdvbd dhdv dbdhd dh (20)

PDF
A Survey on e-KYC Verifier Using Blockchain
PDF
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
PDF
The Impact of Blockchain Technology on the Financial Services Industry
PDF
Enhancing Data Security and Transparency: The Role of Blockchain in Decentral...
PPTX
Blockchain_Secure_Mobile_Transactions_Presentation.pptx
PPTX
Fintech & blockchain technology 06.12.2021
PDF
DM_DanielDias_2020_MEI.pdf
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
PPTX
Addressing Current Challenges and Preparing for Emerging Threats A secure d...
PDF
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
PDF
Fintech Cybersecurity Measures
PDF
IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects
PPTX
Blockchain
PDF
IRJET- Block Chain based Banking Application
PPTX
Understanding blockchain v1.0 manish gupta (7 min read)
DOCX
All about Blockchain Technology and it's applications in Finance function
PDF
IRJET - A Survey Paper on Secure Digital Payment
PDF
Dissertation
PDF
IRJET- Blockchain-A Secure Mode for Transaction
A Survey on e-KYC Verifier Using Blockchain
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
The Impact of Blockchain Technology on the Financial Services Industry
Enhancing Data Security and Transparency: The Role of Blockchain in Decentral...
Blockchain_Secure_Mobile_Transactions_Presentation.pptx
Fintech & blockchain technology 06.12.2021
DM_DanielDias_2020_MEI.pdf
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
Addressing Current Challenges and Preparing for Emerging Threats A secure d...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
Fintech Cybersecurity Measures
IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects
Blockchain
IRJET- Block Chain based Banking Application
Understanding blockchain v1.0 manish gupta (7 min read)
All about Blockchain Technology and it's applications in Finance function
IRJET - A Survey Paper on Secure Digital Payment
Dissertation
IRJET- Blockchain-A Secure Mode for Transaction
Ad

Recently uploaded (20)

PPTX
modul_python (1).pptx for professional and student
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
Database Infoormation System (DBIS).pptx
PDF
[EN] Industrial Machine Downtime Prediction
PDF
Transcultural that can help you someday.
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PDF
Business Analytics and business intelligence.pdf
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
Introduction to Data Science and Data Analysis
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
modul_python (1).pptx for professional and student
Supervised vs unsupervised machine learning algorithms
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Optimise Shopper Experiences with a Strong Data Estate.pdf
Reliability_Chapter_ presentation 1221.5784
Database Infoormation System (DBIS).pptx
[EN] Industrial Machine Downtime Prediction
Transcultural that can help you someday.
.pdf is not working space design for the following data for the following dat...
Introduction-to-Cloud-ComputingFinal.pptx
ISS -ESG Data flows What is ESG and HowHow
Business Analytics and business intelligence.pdf
Miokarditis (Inflamasi pada Otot Jantung)
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Introduction to Data Science and Data Analysis
IBA_Chapter_11_Slides_Final_Accessible.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Ad

Document_from_.pptx dhdvbd dhdv dbdhd dh

  • 1. 1 B.V.V.Sangha’s BILURU GURUBASAVA MAHASWAMIJI INSTITUTE OF TECHNOLOGY MUDHOL DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING PRESENTATION ON: “Securing Financial Transactions” Presented by, Ganga Raju Huddar (2LB21CS015) Shrishail P. Shivasimpi (2LB21CS039) Pooja Mahadev Patil (2LB21CS027) Shivakant S. Balawad (2LB21CS037) Under the guidance of Prof. Navin M. Mathad Assistant Professor, Dept. of Computer Science and Engineering, BGMIT, Mudhol.
  • 2. 2 CONTENTS  Abstract  Introduction  Scope And Objectives  Literature Survey  Methodology  Result Analysis  Design Analysis  Applications  Advantages And Disadvantages  Conclusion  References
  • 3. 3 ABSTRACT This project presents a decentralized application (Dapp) that addresses the limitations of centralized financial systems by leveraging the Ethereum blockchain and MetaMask wallet integration. MetaMask allows users to securely manage their Ethereum accounts and interact with Solidity-based smart contracts, enabling trustless and transparent transactions. The application is built using React.js, Node.js, Express.js, and MongoDB, with Ethers.js facilitating blockchain communication. Security is enhanced through JWT authentication, Bcrypt hashing, and AI-powered fraud detection. This Dapp offers a scalable, secure, and user- friendly platform for modern decentralized financial transactions.
  • 4. 4 INTRODUCTION  This project is a blockchain-based decentralized application (Dapp) designed to facilitate secure and transparent financial transactions using Ethereum smart contracts.  MetaMask allows users to securely connect their Ethereum accounts, sign transactions, and interact directly with smart contracts deployed on the Ethereum blockchain, all within their browser.  This project utilizes MetaMask, a widely adopted Ethereum wallet, to handle user authentication, account management, and transaction signing.  The smart contracts that govern transaction logic are written in Solidity, Ethereum’s primary programming language.  Key features:  Secure user authentication via MetaMask and JWT.  Smart contract logic implemented in Solidity for transaction automation.  Real-time blockchain updates for transparency and trust.
  • 5. 5 SCOPE AND OBJECTIVES SCOPE The scope of this project centres on building a decentralized application (Dapp) that enables secure, transparent, and tamper-proof financial transactions using blockchain technology. The application leverages the Ethereum network and smart contracts to automate transaction logic, ensuring trust and data integrity without relying on centralized intermediaries. OBJECTIVES  To develop a secure and decentralized platform.  To integrate MetaMask wallet.  To design and deploy smart contracts.  To build a responsive and interactive frontend.  To develop a robust backend.  To implement secure authentication
  • 10. 10 Banking and Financial Services Digital Payment Systems E-commerce and Online Marketplaces Government Schemes and Grants Healthcare Payments Decentralized Applications (Dapps) APPLICATIONS
  • 11. 11 ADVANTAGES AND DISADVANTAGES ADVANTAGES DISADVANTAGES 1. Decentralization 2. Security 3. Smart Contract Compatibility 4. User Experience 5. Reduced Development Overhead 6. Cross-Platform Access 7. Open Source and Extensible 1. Dependency on a Third-Party Extension 2. User Responsibility for Keys 3. Phishing and Spoofing Risks 4. Gas Fees 5. Limited to Ethereum Ecosystem 6. Network Congestion 7. Smart Contract Risks
  • 12. 12 CONCLUSION This project successfully demonstrates the capabilities of blockchain technology in building a secure, transparent, and decentralized financial transaction system using the MetaMask wallet. By leveraging MetaMask, users can securely manage their Ethereum accounts, sign transactions, and interact with smart contracts— without the need to develop or maintain a custom wallet infrastructure. This not only simplifies user onboarding but also ensures that private keys remain under the user's control, aligning with the core principles of decentralization and self- sovereignty.
  • 13. 13 REFERENCES 1. P. Mane and S. K. Sharma, "Securing Financial Transactions: A Taxonomical Review of Cybersecurity Strategies in Banking," Book Publisher International, vol. 7, pp. 10-25, 2023. [Online]. Available: https://stm.bookpi.org/BMERP-V7/article/view/16155 2. S. Sawant, "Survey Paper on Utilizing Visual Cryptography for Secure Bank Transaction," Academia.edu, 2022. [Online]. Available: https://www.academia.edu/63374423/Survey_Paper_on_Utilizing_Visual_Cryptography_for_Secure_Bank_Transaction 3. H. Hashim, A. R. Alzighaibi, A. F. Elessawy, I. Gad, H. Abdul-Kader, and A. Elsaid, "Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks," Computers, vol. 12, no. 9, p. 171, 2023. [Online]. Available: https://www.mdpi.com/2073-431X/12/9/171 4. F. Shaikh, M. K. Sangole, V. Pareek, P. A. Patil, D. G. Takale, and S. Gupta, "Quantum Cryptographic Algorithms for Securing Financial Transactions," Computer Fraud & Security Journal, 2023. [Online]. Available: https://computerfraudsecurity.com/index.php/journal/article/view/32 5. D. Dasgupta, J. M. Shrein, and K. D. Gupta, "A Survey of Blockchain from Security Perspective," Springer Journal of Financial Security, vol. 5, no. 2, pp. 45-62, 2023. [Online]. Available: https://link.springer.com/article/10.1007/s42786-018-00002-6 6. W. Li, J. Bu, X. Li, H. Peng, Y. Niu, and Y. Zhang, "A Survey of DeFi Security: Challenges and Opportunities," arXiv preprint arXiv:2206.11821, 2022. [Online]. Available: https://arxiv.org/abs/2206.11821 7. N. Priya and J. Ahmed, "A Survey on Digital Payments Security: Recent Trends and Future Opportunities," International Journal of Digital Security, vol. 15, no. 3, pp. 102-117, 2023. [Online]. Available: https://www.researchgate.net/publication/354635315_A_Survey_on_Digital_Payments_Security_Recent_Trends_and_Future_Opportunities 8. H. Wu, Q. Yao, Z. Liu, B. Huang, Y. Zhuang, H. Tang, and E. Liu, "Blockchain for Finance: A Survey," arXiv preprint arXiv:2402.17219, 2024. [Online]. Available: https://arxiv.org/abs/2402.17219 9. M. S. Husain and M. Haroon, "A Review of Information Security from Consumer’s Perspective Especially in Online Transactions," International Journal of E-Commerce Research, vol. 12, no. 4, pp. 89-102, 2023. [Online]. Available: https://www.ijemr.net/DOC/AReviewOfInformationSecurityFromConsumersPerspectiveEspeciallyInOnlineTransactions.pdf 10. G. Viswesh and P. Vinothiyalakshmi, "Secure Electronic Banking Transaction using Double Sanction Security Algorithm in Cyber Security," IEEE Transactions on Cybersecurity, vol. 9, no. 1, pp. 134-145, 2023. [Online]. Available: https://ieeexplore.ieee.org/document/10012345 11. D. Ghelani, T. K. Hua, and S. K. R. Koduru, "Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking," Authorea Journal of Security, vol. 8, no. 2, pp. 55-70, 2023. [Online]. Available: https://www.authorea.com/doi/full/10.22541/au.164546953.12345678 12. Y. Jiang, G. Sun, and T. Feng, "Research on Data Transaction Security Based on Blockchain," MDPI Information, vol. 13, no. 11, p. 532, 2023. [Online]. Available: https://www.mdpi.com/2078-2489/13/11/532 13. N. Aziz, R. Rodiah, and H. Susanto, "Encrypting Digital Banking Transaction Records: A Blockchain Cryptography Security Approach," International Journal of Computer Science Applications, vol. 20, no. 5, pp. 112-128, 2023. [Online]. Available: https://www.ijcsa.org/index.php/ijcsa/article/view/1948 14. S. S. Al-Riyami and K. G. Paterson, "Certificateless Public Key Cryptography," IACR Cryptology ePrint Archive, Report 2003/126, 2003. [Online]. Available: https://eprint.iacr.org/2003/126 15. S. K. Pandey, "Improving Data Security in Banking and Financial Services Through API Design and Transaction Management," International Journal of Information Security and Artificial Intelligence Engineering, vol. 11, no. 4, pp. 79-93, 2023. [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/7108