INTEGRATION OF ACCESS CONTROL MECHANISM IN CLOUD BASED EWALLET

Authors

  • N.Ch. Ravi Associate Professor,Dept of CSE,SIET, Hyderabaad

Keywords:

ECOMMERCE, DIGITAL WALLET, IP Authentication, Capcha

Abstract

In this paper we have implemented access control mechanism to develop an electronic wallet based system where security is the major concern. This system is widely used in banking and financial institutions. The funds of people are stored in digital wallet and its security is must. In order to enhance the security of digital Electronic wallets system we have introduced several security mechanisms such as one time password, Session based security, Cookies based security, Capcha, IP authentication, Cryptography. Here we have discussed the threats to security of digital wallet.

References

Umair Mukhtar Ahmed Naushahi “Profile Based Access Control in case of Cloud Computing Environments with applications in Health Care Systems”

Prosunjit Biswas, Ravi Sandhu(B), And Ram Krishnan “Uni-Arbac: A Unified Administrative Model For Role-Based Access Control”

Roszelinda Khalid, Zuriati Ahmad Zukarnain, zurina Mohd Hanapi, Mohamad Afendee Mohamed, “Authentication Mechanism in case of Cloud Network And Its Fitness With Quantum Key Distribution Protocol: A Survey” , 2015.

Sneha Warang, “Role Based Access Control Model For Cloud Computing Using Rbe Scheme” ,2016

Christopher Alm, Michael Drouineaud, Ute Faltin, Karsten Sohr, And Ruben Wolf “A Classification Framework Designed For Advanced Role-Based Access Control Models And Mechanisms”

Haodong wang & qun, “Distributed user access control in sensor networks”

Multi-factor authentication protection framework in cloud computing by prachi soni, (asst. Prof.) Monali sahoo 2015

Peter mill & Tim grance, “The NIST Definition of Cloud Computing”, 2011, National Institute of Standards & Technology ,Gaitherbsburg,MD 20899-8930, NIST Special Publication 800-145.

Ellen Messmer, “New security demands arising for virtualization, cloud computing”, 2011, security-demands-arising-for-virtualization—cloud computing.html

.Sumedha Kaushik & Ankur Singhal, “Network Security Using Cryptographic Techniques” 2012, volume 2, Issue 12.

Charles Miers, Fernando Redigolo & Marcos Simplicio, “A quantitative analysis of current security concerns & solutions for cloud computing ”, 2012, Journal of Cloud Computing: Advances, Systems & Applications electronic version of this article is

Rabi Prasad Padhay, “An Enterprise Cloud Model for Optimizing IT Infrastructure”, 2012, International Journal of Cloud Computing & Services Science (IJ-CLOSER) Vol.1,

Nelson Gonzalez, et. al. , “A quantitative analysis of current security concerns & solutions for cloud computing ”, 2012, Journal of Cloud Computing: Advances, Systems & Applications doi:10.1186/2192-113X-1-11The electronic version of this article is complete one & could be found online

Downloads

Published

2019-06-30

How to Cite

N.Ch. Ravi. (2019). INTEGRATION OF ACCESS CONTROL MECHANISM IN CLOUD BASED EWALLET. Innovative Research Thoughts, 5(2), 26–31. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/990

Issue

Section

Articles