Abstract
The need of cloud based wallet is increasing day by day. But there are several threats to this type of wallet system. There is a chance of unauthentic access in cloud based wallet system as the transactions are made in monetary terms. There is a need to provide security in order to prevent unauthentic access. This research proposes the novel access control mechanism in order to secure the cloud based wallet. In this research implementation of access control mechanism has been made in order to design secure electronic wallet based system. The major concerns regarding wallet security have been discussed. These mechanisms are generally utilized in case of financial sectors. Money of user is usually represented in digital wallet and security of such digital wallet is mandatory. To boost security of such digital Electronic wallets this research has introduced many security techniques that are Session based security, one time password, security from cookies, Capcha, Cryptography, IP authentication. This paper resolves the challenges to security in case of digital wallet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naushahi, U.M.A.: Profile based access control in case of cloud computing environments with applications in health care systems
Biswas, P., Sandhu(B), R., Krishnan, R.: Uni-Arbac: a unified administrative model for role-based access control
Khalid, R., Zukarnain, Z.A., Hanapi, Z.M., Mohamed, M.A.: Authentication mechanism in case of cloud network and its fitness with quantum key distribution protocol: a survey (2015)
Warang, S.: Role based access control model for cloud computing using RBE scheme (2016)
Alm, C., Drouineaud, M., Faltin, U., Sohr, K., Wolf, R.: A classification framework designed for advanced role-based access control models and mechanisms
Wang, H., Li, Q.: Distributed user access control in sensor networks
Soni, P., Sahoo, M.: Multi-factor authentication protection framework in cloud computing (2015)
Mill, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards & Technology, Gaitherbsburg, MD 20899-8930, NIST Special Publication 800-145 (2011)
Messmer, E.: New security demands arising for virtualization, cloud computing. security-demands-arising-for-virtualization—cloud computing.html (2011)
Kaushik, S., Singhal, A.: Network security using cryptographic techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(12), 105–107 (2012)
Miers, C., Redigolo, F., Simplicio, M.: A quantitative analysis of current security concerns & solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(1), 11 (2012)
Padhay, R.P.: An enterprise cloud model for optimizing IT infrastructure. Int. J. Cloud Comput. Serv. Sci. (IJ-CLOSER) 1(3), 123 (2012)
Gonzalez, N., et al.: A quantitative analysis of current security concerns & solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(1), 11 (2012). https://doi.org/10.1186/2192-113x-1-11
CSA: Security guidance for critical areas of focus in cloud computing. Technical report, Cloud Security Alliance (2009)
Rowstron, A., Druschel, P.: Pastry: scalable, distributed object location & routing for large-scale peer-to-peer systems. Accepted for Middleware (2001)
Zhao, B.Y., Kubiatowicz, J., Joseph, A.: Tapestry: an infrastructure for fault tolerant wide-area location & routing (2001)
Richa A.W., Plaxton, C.G., Rajaraman, R.: Accessing nearby copies of replicated objects in a distributed environment. In: Proceedings of ACM SPAA, pp 311–320 (1997)
Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to- peer file sharing systems (2001)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a peer-to-peer lookup service for internet applications (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ravi, N.C., Muppalaneni, N.B., Sridevi, R., Kamakshi Prasad, V., Govardhan, A., Padma, J. (2020). Advanced Access Control Mechanism for Cloud Based E-wallet. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-24643-3_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24642-6
Online ISBN: 978-3-030-24643-3
eBook Packages: EngineeringEngineering (R0)