Dual Authentication Using Mobile Application in Cloud Computing
DOI:
https://doi.org/10.51983/ajcst-2017.6.1.1773Keywords:
mTAN, 2 Layer Security, one-time-password, Transaction Authentication NumberAbstract
Internet is that the center of all style of social and monetary activities. It’s enabled organizations to supply their services on-line. Customers feel easier to avail on-line services like ebanking services rather than ancient banking services. They will gain these services twenty four hours each day from their homes. It saves their time and cash and conjointly provides them a lot of open marketplace for comparison. However at same time, security is that the biggest challenge in electronic atmosphere. In past few years, electronic banking has suffered from many malicious attacks like phishing scams, man within the middle attacks and malicious computer code attacks. To beat these issues the Mobile phones square measure ordinarily employed by net servers to validate user’s identification and authentication. It enhances user’s trust in on-line transactions and empowers him to use his mobile network as a further layer of security. This mechanism is understood as Mobile group action Authentication system of numeration (mTAN) that is employed by e-banks and social media sites. This technique has some weakness and users square measure still susceptible to serious security risks. Unauthorized people will notice their ways that to urge unauthorized access in ancient mTAN system. During this project, we’ve got explored weaknesses in current mTAN system and planned an answer for reliable and secure use of 2 layer security.
References
R. K. Singh and A. R. Pais, "Secure Web Based Single Sign-On (SSO) framework using Identity Based Encryption System," in International Conference on Advances in Recent Technologies in Communication and Computing, Kerala, 2010.
Y. Zhou, X. Zhu, and Y. Fang, "MABS: Multicast Authentication Based on Batch Signature," in IEEE transactions on mobile computing, vol. 9, no. 7, July 2010.
W. Jang, S. Cho, H. Lee, H. Ju, and J. Kim, "Rooting Attack Detection Method on the Android based Smart Phone," in International Conference on Computer Science and Network Technology, 2011.
P. Hisamatsu, D. Pishva, and G. G. D. Nishantha, "Online Banking and Modern Approaches toward its Enhanced Security," in The 12th International Conference on Advanced Communication Technology (ICACT), 2010.
F. Fatemi Moghaddam, "A scalable and efficient user authentication scheme for cloud computing Environments," in IEEE Region 10 Symposium, 2014, pp. 508-513.
S. Gupta, S. Sengupta, M. Bhattacharyya, S. Chattrejee, and B. S. Sharma, "Cellular Phone Based Web Authentication System Using 3-D Encryption Technique under Stochastic," in First Asian Himalayas International Conference on Internet, Kathmandu, 2009.
Thiyagarajan, P. Venkatesan, and G. Aghila, "Anti-Phishing Technique using Automated Challenge Response Method," in International Conference on Communication and Computational Intelligence (INCOCCI), Erode, 2010.
M. M. Avarzaman and A. Salahi, "Increasing performance of authentication in universal mobile telecommunication system," in International Conference on Application of Information and Communication Technologies, Baku, 2009.
T. Al-Dala'in, P. Summons, and S. Luo, "A Prototype Design for Enhancing Customer Trust in Online Payments," in Journal of Computer Science, vol. 5, no. 12, pp. 1037-1044, 2010.
J. Seto, "User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices," in IEEE Transactions on Emerging Topics in Computing, 2015.
N. A. B. A. Rahman, K. S. B. Harun, and Y. B. Yusof, "SMS Banking Transaction as an Alternative for Information, Transfer and Payment at Merchant Shops in Malaysia," in 3rd International Conference on Information Technology and e-Services (ICITeS), Sousse, 2013.
H. Christianson, X. B. Zhang, "A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment," in The 12th International Conference on Advanced Communication Technology (ICACT), 2010.
Z. Zhang, M. Yu, and M. Huang, "Based Mobile Agent Transaction Authentication Scheme," in International Conference on Computational Intelligence and Natural Computing (CINC), 2009.
D. Hartung and C. Busch, "Biometric Transaction Authentication Protocol," in Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010.
J. Xu, D. Zhang, L. Liu, and X. Li, "Dynamic Authentication for Cross-Realm SOA-Based Business Processes," in IEEE Transactions on Computing Services, vol. 5, no. 1, Jan.-March 2012.
R. Ribalda, G. Rivera, A. Castro, and J. Garrido, "A Mobile Biometric System-on-Token System for Signing Digital Transactions," in IEEE Security & Privacy, vol. 8, no. 2, 2010.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.