Time Variant Password Okamoto–Uchiyama Cryptography based Three Layer Authentication for Secured Financial Transaction

Authors

  • N. Ruba Research Scholar, Dept of Computer Science, KhadirMohideen College, Adirampattinam, Thanjavur Affiliated to Bharathidasan University, Tiruchirappalli, Tamil Nadu, India
  • A. Shaik Abdul Khadir Associate Professor and Head, Dept of Computer Science, KhadirMohideen College, Adirampattinam,Thanjavur Affiliated to Bharathidasan University, Tiruchirappalli, Tamil Nadu, India

Keywords:

Internet of Things, Financial Transaction, Authentication, Okamoto–Uchiyama Cryptography, Fingerprint

Abstract

                Cloud computing enabled customers to save data on a cloud server for scalable services. The Internet of Things (IoT) provides a virtual representation for physical objects in order to share data and adapt to environmental changes with efficient resource utilization. IoT include distributed sensor nodes to gather cloud user information from different location through wireless medium. A financial transaction represents the exchange of goods, services, or assets for payment and serves as a form of communication between the buyer and seller. Different authentication methods are introduced by existing researchers for performing efficient secured financial transaction. However, there was no enhancement in authentication accuracy, and the authentication time remained unimproved. In order to address these issues, an IoT framework with three layer authentication called Time Variant Password Okamoto–Uchiyama Cryptography based Three Layer Authentication (TVPOUC-TLA) Method is introduced. The main aim of TVPOUC-TLA Method is to perform IoT based efficient financial transaction with higher confidentiality rate. TVPOUC-TLA Method covers four steps, which are crucial generation, encryption, authentication and decryption for taming the safety level performance in cloud environment. In the TVPOUC-TLA Method, a cloud user located in a different location (acting as the buyer) initiates the registration process with the cloud server (acting as the seller) to facilitate authentication. During the strategic key generation phase, the Cloud Server (CS) generates both the public and private keys for the registered cloud user. Whenever a cloud user needs to perform any financial transaction, cloud user gets logged in with help of key pair and transmits the demand note to the CS. Later getting request, CS confirms the cloud manipulator authenticity through sending the time variant password and fingerprint. When the cloud user pass in password and fingerprint acquires matched with CS sent password, cloud manipulator has said to be an authorized user and accomplish financial transaction. Otherwise, the transaction between cloud server and cloud user gets declined. This approach enables the efficient and secure execution of financial transactions through the TVPOUC-TLA Method. An experimental assessment is conducted, focusing on factors including authentication accuracy, data confidentiality rates, and data integrity, taking into account variations in the number of financial data entries and cloud users.

Downloads

Download data is not yet available.

References

Uma Narayanan, Varghese Paul, Shelbi Joseph, “A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment”, Journal of King Saud University – Computer and Information Sciences, Elsevier, 2020, Pages 1-20

ShejiNishoni and A. Aldo Tenis, “Secure Communication with Data Analysis and Auditing Using Bilinear Key Aggregate Cryptosystem in Cloud Computing”, Materials Today: Proceedings, Elsevier, Volume 24, Part 4, 2020, Pages 2358-2365

NabeilEltayieb, Rashad Elhabob, Alzubair Hassan and Fagen Li, “A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud”, Journal of Systems Architecture, Elsevier, Volume 102, January 2020, Pages 1-28

Xiaodong Yang, Ting Li, Wanting Xi, Aijia Chen, Caifen Wang, “A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud”, IEEE Access, Volume 8, 2020, Pages 170713 – 170731

DorababuSudarsa, Nagaraja Rao A and Sivakumar A.P., “An effective and secured authentication and sharing of data with dynamic groups in cloud”, Data & Knowledge Engineering, Elsevier, Volume 145, May 2023, Pages 1-15

GayathriNagasubramanian, Rakesh kumarSakthivel and Fadi Al-Turjman, “Secure and Consistent Job Administration Using Encrypted Data Access Policies in Cloud Systems”, Computers & Electrical Engineering, Elsevier, Volume 96, Part A, December 2021, Pages 1-15

Qin Liu, ZhengzhengHao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang and Shaobo Zhang, “SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems”, Journal of Systems Architecture, Elsevier, Volume 120, November 2021, Pages 1-14

VikasChouhan, Sateesh K. Peddoju and RajkumarBuyya, “dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key”, Journal of Information Security and Applications, Elsevier, Volume 69, September 2022, Pages 1-15

Shaopeng Guan, Conghui Zhang, Yilin Wang and Wenqing Liu, “Hadoop-based secure storage solution for big data in cloud computing environment”, Digital Communications and Networks, Elsevier, January 2023, Pages 1-15

Anichur Rahman, Md Jahidul Islam, Shahab S. Band, Ghulam Muhammad, Kamrul Hasan and Prayag Tiwari, “Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT”, Digital Communications and Networks, Elsevier, November 2022, Pages 1-18

SuyelNamasudra, Debashree Devi, SeifedineKadry, RevathiSundarasekar, A. Shanthini, “Towards DNA based data security in the cloud computing environment”, Computer Communications, Volume 151, 1 February 2020, Pages 539-547

Divyansh Agrawal and SachinMinocha, “Securing confidential data in the cloud environment by using DNA computing”, Advances in Computers, Elsevier, December 2022, Pages 1-15

Xufeng Jiang, Lu Li and Ge Gao, “Efficient secure and verifiable KNN set similarity search over outsourced clouds”, High-Confidence Computing, Elsevier, December 2022, Pages 1-15

Hui Xie, Zhengyuan Zhang, Qi Zhang, Shengjun Wei and Changzhen Hu, “HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments”, Computer Communications, Elsevier, Volume 174, 1 June 2021, Pages 1-12

YutingZuo, Zhaozhe Kang, Jian Xu and Zhide Chen, “BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing”, International Journal of Distributed Sensor Networks, 2021, Pages 1-16

K. S. Saraswathy and S. S. Sujatha, “Secure data storage and access for fish monitoring in cloud environment”, Measurement: Sensors, Elsevier, February 2023, Pages 1-17

PengCheng Wei, Dahu Wang, Yu Zhao, Sumarga Kumar SahTyagi, Neeraj Kumar, “Blockchain data-based cloud data integrity protection mechanism”, Future Generation Computer Systems, Elsevier, Volume 102, 2020, Pages 902-911

S. Rajasoundaran, A.V. Prabu, SidheswarRoutray, S.V.N. Santhosh Kumar, Prince PriyaMalla, SumanMaloji, Amrit Mukherjee and Uttam Ghosh, “Machine learning based deep job exploration and secure transactions in virtual private cloud systems”,Computers & Security, Elsevier, Volume 109, October 2021, Pages 1-15

NureniAyofeAzeez and Charles Van der Vyver, “Security and privacy issues in e-health cloud-based system: A comprehensive content analysis”, Egyptian Informatics Journal, Elsevier, Volume 20, Issue 2, July 2019, Pages 97-108

AntoViji A, J. Jasper and T. Latha, “Efficient Secure Aware Scheduling Model for Enhancing Security and Workflow Model in Cloud Computing”,Optik, Elsevier, December 2022, Pages 1-12

Downloads

Published

13.12.2023

How to Cite

Ruba, N. ., & Khadir, A. S. A. . (2023). Time Variant Password Okamoto–Uchiyama Cryptography based Three Layer Authentication for Secured Financial Transaction. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 404–413. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4131

Issue

Section

Research Article