Time Variant Password Okamoto–Uchiyama Cryptography based Three Layer Authentication for Secured Financial Transaction
Keywords:
Internet of Things, Financial Transaction, Authentication, Okamoto–Uchiyama Cryptography, FingerprintAbstract
Cloud computing enabled customers to save data on a cloud server for scalable services. The Internet of Things (IoT) provides a virtual representation for physical objects in order to share data and adapt to environmental changes with efficient resource utilization. IoT include distributed sensor nodes to gather cloud user information from different location through wireless medium. A financial transaction represents the exchange of goods, services, or assets for payment and serves as a form of communication between the buyer and seller. Different authentication methods are introduced by existing researchers for performing efficient secured financial transaction. However, there was no enhancement in authentication accuracy, and the authentication time remained unimproved. In order to address these issues, an IoT framework with three layer authentication called Time Variant Password Okamoto–Uchiyama Cryptography based Three Layer Authentication (TVPOUC-TLA) Method is introduced. The main aim of TVPOUC-TLA Method is to perform IoT based efficient financial transaction with higher confidentiality rate. TVPOUC-TLA Method covers four steps, which are crucial generation, encryption, authentication and decryption for taming the safety level performance in cloud environment. In the TVPOUC-TLA Method, a cloud user located in a different location (acting as the buyer) initiates the registration process with the cloud server (acting as the seller) to facilitate authentication. During the strategic key generation phase, the Cloud Server (CS) generates both the public and private keys for the registered cloud user. Whenever a cloud user needs to perform any financial transaction, cloud user gets logged in with help of key pair and transmits the demand note to the CS. Later getting request, CS confirms the cloud manipulator authenticity through sending the time variant password and fingerprint. When the cloud user pass in password and fingerprint acquires matched with CS sent password, cloud manipulator has said to be an authorized user and accomplish financial transaction. Otherwise, the transaction between cloud server and cloud user gets declined. This approach enables the efficient and secure execution of financial transactions through the TVPOUC-TLA Method. An experimental assessment is conducted, focusing on factors including authentication accuracy, data confidentiality rates, and data integrity, taking into account variations in the number of financial data entries and cloud users.
Downloads
References
Uma Narayanan, Varghese Paul, Shelbi Joseph, “A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment”, Journal of King Saud University – Computer and Information Sciences, Elsevier, 2020, Pages 1-20
ShejiNishoni and A. Aldo Tenis, “Secure Communication with Data Analysis and Auditing Using Bilinear Key Aggregate Cryptosystem in Cloud Computing”, Materials Today: Proceedings, Elsevier, Volume 24, Part 4, 2020, Pages 2358-2365
NabeilEltayieb, Rashad Elhabob, Alzubair Hassan and Fagen Li, “A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud”, Journal of Systems Architecture, Elsevier, Volume 102, January 2020, Pages 1-28
Xiaodong Yang, Ting Li, Wanting Xi, Aijia Chen, Caifen Wang, “A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud”, IEEE Access, Volume 8, 2020, Pages 170713 – 170731
DorababuSudarsa, Nagaraja Rao A and Sivakumar A.P., “An effective and secured authentication and sharing of data with dynamic groups in cloud”, Data & Knowledge Engineering, Elsevier, Volume 145, May 2023, Pages 1-15
GayathriNagasubramanian, Rakesh kumarSakthivel and Fadi Al-Turjman, “Secure and Consistent Job Administration Using Encrypted Data Access Policies in Cloud Systems”, Computers & Electrical Engineering, Elsevier, Volume 96, Part A, December 2021, Pages 1-15
Qin Liu, ZhengzhengHao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang and Shaobo Zhang, “SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems”, Journal of Systems Architecture, Elsevier, Volume 120, November 2021, Pages 1-14
VikasChouhan, Sateesh K. Peddoju and RajkumarBuyya, “dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key”, Journal of Information Security and Applications, Elsevier, Volume 69, September 2022, Pages 1-15
Shaopeng Guan, Conghui Zhang, Yilin Wang and Wenqing Liu, “Hadoop-based secure storage solution for big data in cloud computing environment”, Digital Communications and Networks, Elsevier, January 2023, Pages 1-15
Anichur Rahman, Md Jahidul Islam, Shahab S. Band, Ghulam Muhammad, Kamrul Hasan and Prayag Tiwari, “Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT”, Digital Communications and Networks, Elsevier, November 2022, Pages 1-18
SuyelNamasudra, Debashree Devi, SeifedineKadry, RevathiSundarasekar, A. Shanthini, “Towards DNA based data security in the cloud computing environment”, Computer Communications, Volume 151, 1 February 2020, Pages 539-547
Divyansh Agrawal and SachinMinocha, “Securing confidential data in the cloud environment by using DNA computing”, Advances in Computers, Elsevier, December 2022, Pages 1-15
Xufeng Jiang, Lu Li and Ge Gao, “Efficient secure and verifiable KNN set similarity search over outsourced clouds”, High-Confidence Computing, Elsevier, December 2022, Pages 1-15
Hui Xie, Zhengyuan Zhang, Qi Zhang, Shengjun Wei and Changzhen Hu, “HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments”, Computer Communications, Elsevier, Volume 174, 1 June 2021, Pages 1-12
YutingZuo, Zhaozhe Kang, Jian Xu and Zhide Chen, “BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing”, International Journal of Distributed Sensor Networks, 2021, Pages 1-16
K. S. Saraswathy and S. S. Sujatha, “Secure data storage and access for fish monitoring in cloud environment”, Measurement: Sensors, Elsevier, February 2023, Pages 1-17
PengCheng Wei, Dahu Wang, Yu Zhao, Sumarga Kumar SahTyagi, Neeraj Kumar, “Blockchain data-based cloud data integrity protection mechanism”, Future Generation Computer Systems, Elsevier, Volume 102, 2020, Pages 902-911
S. Rajasoundaran, A.V. Prabu, SidheswarRoutray, S.V.N. Santhosh Kumar, Prince PriyaMalla, SumanMaloji, Amrit Mukherjee and Uttam Ghosh, “Machine learning based deep job exploration and secure transactions in virtual private cloud systems”,Computers & Security, Elsevier, Volume 109, October 2021, Pages 1-15
NureniAyofeAzeez and Charles Van der Vyver, “Security and privacy issues in e-health cloud-based system: A comprehensive content analysis”, Egyptian Informatics Journal, Elsevier, Volume 20, Issue 2, July 2019, Pages 97-108
AntoViji A, J. Jasper and T. Latha, “Efficient Secure Aware Scheduling Model for Enhancing Security and Workflow Model in Cloud Computing”,Optik, Elsevier, December 2022, Pages 1-12
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.