IMPLEMENTATION OF ONLINE BANKING USING SOAP
DOI:
https://doi.org/10.61841/a2hk2874Keywords:
Online Banking, SOAP Protocol, Cyber Security, Online TransactionAbstract
This current scenario computing technology is used in various fields like data collection, data processing, data retrieval, data storage, etc. Computing power is also used in the banking field. The entire banking activity of modern banks is controlled by computers. Online banking allows the users to access their bank accounts and make any transactions without visiting the branches of the financial institutes. Online banking is also called internet banking or web banking. Online banking provides many favors to the users. This is an electronic payment system that allows customers of the bank or financial institutes to conduct transactions through the financial institute’s website. SOAP is a particular protocol for performing RPC. RPC refers to remote procedure calling. Soap is a messaging protocol specification for transferring structural data in the implementation on the web service in the computer. Soap refers to the simple object access protocol, which is an internet protocol Banking is full of stricts because of security reasons. Here Soap is implementation on the online banking for better security.
Downloads
References
1. Jun, B. H., Han, P. K., Choi, J. W., & Kang, B. G. (2008), "Adoption of Online Banking Service Considering the Moderate Effects of Online Banking Service Type," Second International Conference on Future Generation Communication and Networking Symposia, pp. 77-80.
2. Tsai, C.-L., Chen, C.-J., & Zhuang, D.J. (2012), "Secure OTP and Biometric Verification Scheme for Mobile Banking," Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, pp. 138-141.
3. Mockel, C., & Abdallah, A. E. (2010), "Threat modeling approaches and tools for securing architectural designs of an e-banking application," Sixth International Conference on Information Assurance and Security, pp. 149-154.
4. Panja, B., Fattaleh, D., Mercado, M., Robinson, A., & Meharia, P. (2013), "Cybersecurity in banking and financial sector: Security analysis of a mobile banking application," International Conference on Collaboration Technologies and Systems (CTS), pp. 397-403.
5. Anatoliy, P. N., Kristina, V. A., Elena, A. K., Vagiz, D. G., & Aleksandr, V. S. (2018), “Technologies of safety in the bank sphere from cyber attacks," IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 102-104.
6. Samir Pakojwar & . N. J. Uke (2014), “Security in Online Banking Services: A Comparative Study," International Journal of Innovative Research in Science, Engineering, and Technology, Vol. 3, Issue 10, 0 ISSN: 2319-8753, pp. 16850-16857.
7. Emeka Nwogu & McChester Odoh (2015), "Security Issues Analysis on Online Banking Implementations in Nigeria," International Journal of Computer Science and Telecommunications Vol. 6, No. 1, pp. 20-27.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.