Fraud Detection System for Identity Crime using Blockchain Technology and Data Mining Algorithms
Keywords:
Immutability, proactive approach, early detection, financial losses, suspicious behaviorAbstract
Identity crime continues to pose a significant threat in today's digital landscape, necessitating the development of highly effective fraud detection systems. This paper presents a novel and innovative approach that combines the power of blockchain technology with advanced data mining techniques to create a robust fraud detection system specifically designed to combat identity crime. By seamlessly integrating blockchain and data mining, the proposed system demonstrates exceptional capabilities in detecting and preventing fraudulent activities in real-time.The integration of blockchain technology ensures the utmost security and immutability of data by leveraging its decentralized nature. This formidable security feature makes it exceedingly challenging for malicious individuals to manipulate or tamper with personal information. Leveraging blockchain's inherent strengths, the system efficiently verifies user identities and continuously tracks any alterations made to the data, thereby significantly enhancing the accuracy and reliability of identity verification processes.Data mining techniques play a pivotal role in detecting and combating fraud by enabling the analysis of vast volumes of data. Through the implementation of sophisticated data mining algorithms, the system effectively identifies patterns and anomalies associated with fraudulent behavior. This proactive approach empowers the system to swiftly detect suspicious activities and accurately predict potential fraud attempts. By doing so, the system effectively prevents identity crimes at their early stages, effectively reducing financial losses and providing vital protection for individuals' identities.
The proposed fraud detection system operates seamlessly in real-time, constantly monitoring user transactions and activities. Any indication of suspicious behavior immediately triggers alerts, facilitating prompt actions to mitigate the impact of fraudulent activities. Furthermore, the system harnesses the power of data mining techniques to analyze comprehensive historical data, thereby enabling the identification of intricate trends and patterns that serve as strong indicators of fraudulent activity. This refined analytical capability significantly enhances the system's overall accuracy and effectiveness.
Downloads
References
WENBO WANG, DINH THAI HOANG, PEIZHAO HU, “A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks.” , IEEE Access ( Volume: 7) [ 2169-3536] ,2019.
E.M.S.W Balagolla, W.P.C Fernando; R.M.N.S Rathnayake,M.J.M.R.P Wijesekera, A. N. Senarathne, K.Y. Abeywardhana ,“Credit Card Fraud Prevention Using Blockchain”, IEEE Transaction, [20593574 ],2021.
Aditya Asgaonkar , Bhaskar Krishnamachari ,” Solving the Buyer and Seller’s Dilemma: A Dual-Deposit Escrow Smart Contract for Provably Cheat-Proof Delivery and Payment for a Digital Good without a Trusted Mediator”, IEEE Transaction , [978-1-7281-1328-9],2019.
John O. Awoyemi, Adebayo O. Adetunmbi ,Samuel A. Oluwadare , “Credit card fraud detection using Machine Learning Techniques: A Comparative Analysis ” , IEEE , [978-1-5090-4642-3],2017.
K. Vidhya , P. Dinesh Kumar , ,” Multi-Secure Approach for Credit Card Application Validation ”, International Journal of Computer Trends and Technology,volume4Issue2-,[2231-2803 ] ,2013 .
Alka Herenj, Susmita Mishra ,” Secure Mechanism for Credit Card Transaction Fraud Detection System”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 2, February ISSN (Print) : 2319-5940 ISSN (Online) : 2278-1021 ,2013 .
Clifton Phua, Kate Smith-Miles, Vincent Cheng-Siong Lee and Ross Gayler, “Resilient Identity Crime Detection”, IEEE Transactions on Knowledge and Data Engineering, vol.2, no. 3,pp.533-546, 2012.
Alka Herenj, Susmita Mishra "Secure Mechanism for Credit Card Transaction Fraud Detection System", International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 2, February 2013.
Namrata Shukla, Shweta Pandey, "Document Fraud Detection with the help of Data Mining and Secure Substitution Method with Frequency Analysis", International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume 2 Number 2 June 2012.
K. Vidhya, P. Dinesh Kumar,"Multi-Secure Approach for Credit Card Application Validation",International Journal of Computer Trends and Technology- volume 4 Issue 2- 2013.
M.Swathi, K.Kalpana, "Spirit of Identity Fraud And Counterfeit Detection", International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 6–June 2013.
Clifton Phua, Kate Smith-Miles, Vincent Lee and Ross Gayler- Adaptive Spike Detection for Resilient Data Stream Mining, 2010.
T.P.Latchoumi, V.M.Vijay Kannan, "Synthetic Identity of Crime Detection", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013.
M.Swathi, K.Kalpana, "Spirit of Identity Fraud And Counterfeit Detection", International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 6–June 2013.
Clifton Phua, Kate Smith-Miles, Vincent Lee and Ross Gayler- Adaptive Spike Detection for Resilient Data Stream Mining, 2007.
IBM Case study on block chain: https://www.ibm.com/blogs/blockchain/2017/07/blockchain-for-fraud-prevention-industry-use-cases/
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.