Srinivasa Rao Gundu,Panem Charan Arur,Thimmapuram Anuradha,




Cloud-Based Web Trade (CBWT),SWOT Analysis,Online Banking,Hacking,Security,Business,


In the present day scenario, maximum financial transactions are being carried out with the help of Cloud-Based Web Trade (CBWT). These Cloud Oriented Web-Based Financial Transactions provide numerous advantages to the end-users. The Commodities are available at a much cheaper rate and numerous choices are left over to the customers and they are also reducing the shopping time. Particularly the time like Pandemic Situation would provide a better way to purchase multiple goods at their fingertips. There are many numbers of reasons are leftover behind the success and the downfall of such Cloud Oriented Web-Based Financial Transactions. Some of these include financial conditions, technical feasibility, and geographical location, etc. However, nowadays there it is facing many Ethical, Service-oriented, and financial challenges in this area. There is needed to make a SWOT Analysis since it is going to be the major financial gateway for numerous people.


I. A. A. Abdulrazaq, M. B. Abdulrazaq, I. J. Umoh and E. A. Adedokun, “Fraud Detection in Credit Card and Application of VAT Clustering Algorithm: A Review,” 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf), Zaria,Nigeria, 2019, pp. 1-7, doi: 10.1109/NigeriaComputConf45974.2019.8949660.
II. A. Mitrokotsa, N. Komninos and C. Douligeris, “Intrusion Detection with Neural Networks and Watermarking Techniques for MANET,” IEEE International Conference on Pervasive Services, Istanbul, 2007, pp. 118- 127.
III. Anitha Vemulapalli, Nandula Anuradha, Geeta Mahadeo Ambildhuke. ‘RISK ASSESSMENT FOR BIG DATA IN CLOUD COMPUTING ENVIRONMENT FROM THE PERSPECTIVE OF SECURITY, PRIVACY AND TRUST’. J. Mech. Cont. & Math. Sci., Vol.-15, No.-8, August (2020) pp 391-402. DOI : 10.26782/jmcms.2020.08.00036
IV. B. Li and Y. Wang, “RZKPB: A Privacy-Preserving Block chain-Based Fair Transaction Method for Sharing Economy,” 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, 2018, pp. 1164-1169, doi:10.1109/TrustCom/BigDataSE.2018.00161.
V. B. Galloway and G. P. Hancke, “Introduction to industrial control networks,” IEEE Communications Surveys Tutorials, vol. 15, no. 2, pp. 860–880, Second 2013.
VI. C. Chang, J. Yang and K. Chang, “An Efficient and Flexible Mobile Payment Protocol,” 2012 Sixth International Conference on Genetic and Evolutionary Computing, Kitakushu, 2012, pp. 63-66, doi: 10.1109/ICGEC.2012.43.

VII. C. Piao, Y. Zuo and C. Zhang, “Research on Hybrid-Cloud-Based User Privacy Protection of O2O Platform,” 2016 IEEE 13th International Conference on e-Business Engineering (ICEBE), Macau, 2016, pp. 214- 219, doi: 10.1109/ICEBE.2016.044.
VIII. G. A. Lopes Ferreira et al., “Internet of Things and the Credit Card Market: How Companies Can Deal with the Exponential Increase of Transactions with Connected Devices and Can Also be Efficient to Prevent Frauds,” 2015 12th International Conference on Information Technology – New Generations, Las Vegas, NV, 2015, pp. 107-111, doi: 10.1109/ITNG.2015.23.
IX. G. Drakopoulos, E. Kafeza and H. Al Katheeri, “Proof Systems In Blockchains: A Survey,” 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Piraeus, Greece, 2019, pp. 1-6.
X. H. D. Thai, C. Lee, D. Niyato and P. Wang, “A Survey of mobile cloud computing: Architecture, applications, and approaches,” Wireless Communications and Mobile Computing, vol. 13, no. 18, 2013, pp. 1587– 1611.
XI. Hu Dongxing,et al. Information Network Security Situation Aware Technology Based on Artificial Intelligence [J]. Journal of Information Communication, 2012 (6):80-81.
XII. H. Elayan, O. Amin, R. M. Shubair, and M.-S. Alouini, “Terahertz communication: The opportunities of wireless technology beyond 5G,” in Proc. 2018 International Conference on Advanced Communication Technologies and Networking, Apr. 2018, pp. 1–5.
XIII. J. Ni, X. Lin, and X. S. Shen, “Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT,” IEEE JSAC, vol. 36, no. 3, Mar. 2018.
XIV. J. Zhu, “Capacity-power consumption and energy- efficiency evaluation of green wireless networks,” China Communications, vol. 9,no. 2, 2012, pp. 13–21.
XV. K. Kotobi and S. G. Bilen, “Secure blockchains for dynamic spectrum access: A decentralized database in moving cognitive radio networks enhances security and user access,” IEEE Veh. Technol. Mag., vol. 13, no. 1, pp. 32–39, Mar. 2018. doi:10.1109/MVT.2017.2740458.
XVI. M. H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita, “Network Anomaly Detection: Methods, Systems and Tools,” in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303-336, First Quarter 2014.
XVII. M. T. Hossan, M. Z. Chowdhury, M. Shahjalal, and Y. M. Jang, “Human bond communication with head-mounted displays: scope,challenges, solutions, and applications,” IEEE Communications Magazine, vol. 57, no. 2, pp. 26-32, February 2019.
XVIII. R. Henry, A. Herzberg, and A. Kate, “Blockchain access privacy: challenges and directions,” IEEE Security & Privacy, vol. 16, no. 4, pp. 38-45, Jul./Aug. 2018.
XIX. R. Li, “Towards a New Internet for the Year 2030 and Beyond,” in Third Annual ITU IMT-2020/5G Workshop and Demo Day, 2018.
XX. R. Tripathi, S. Vignesh, V. Tamarapalli and D. Medhi, “Cost Efficient Design of Fault Tolerant Geo-Distributed Data Centers,” inIEEE Transactions on Network and Service Management, vol. 14, no. 2, pp. 289-301, June 2017, doi: 10.1109/TNSM.2017.2691007.
XXI. S. Ali, N. Rajatheva, and W. Saad, “Fast uplink grant for machine type communications: Challenges and opportunities,” IEEE Comm. Mag., vol. 57, no. 3, Mar. 2019.
XXII. T. Aste, P. Tasca, and T. Di Matteo, “Blockchain technologies: the foreseeable impact on society and industry,” Computer, vol. 50, no. 9, pp. 18-28, 2017.
XXIII. Tallapally Sampath Kumar, B. Manjula. : ‘EFFICIENT MULTI-LEVEL ENCRYPTION PROCEDURE FOR CLOUD SECURITY’. J. Mech. Cont.& Math. Sci., Vol.-15, No.-6, June (2020) pp 402-410. DOI : 10.26782/jmcms.2020.06.00031.

View Download