Skip to main content

Advanced Access Control Mechanism for Cloud Based E-wallet

  • Conference paper
  • First Online:
Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018) (ICCBI 2018)

Abstract

The need of cloud based wallet is increasing day by day. But there are several threats to this type of wallet system. There is a chance of unauthentic access in cloud based wallet system as the transactions are made in monetary terms. There is a need to provide security in order to prevent unauthentic access. This research proposes the novel access control mechanism in order to secure the cloud based wallet. In this research implementation of access control mechanism has been made in order to design secure electronic wallet based system. The major concerns regarding wallet security have been discussed. These mechanisms are generally utilized in case of financial sectors. Money of user is usually represented in digital wallet and security of such digital wallet is mandatory. To boost security of such digital Electronic wallets this research has introduced many security techniques that are Session based security, one time password, security from cookies, Capcha, Cryptography, IP authentication. This paper resolves the challenges to security in case of digital wallet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naushahi, U.M.A.: Profile based access control in case of cloud computing environments with applications in health care systems

    Google Scholar 

  2. Biswas, P., Sandhu(B), R., Krishnan, R.: Uni-Arbac: a unified administrative model for role-based access control

    Google Scholar 

  3. Khalid, R., Zukarnain, Z.A., Hanapi, Z.M., Mohamed, M.A.: Authentication mechanism in case of cloud network and its fitness with quantum key distribution protocol: a survey (2015)

    Google Scholar 

  4. Warang, S.: Role based access control model for cloud computing using RBE scheme (2016)

    Google Scholar 

  5. Alm, C., Drouineaud, M., Faltin, U., Sohr, K., Wolf, R.: A classification framework designed for advanced role-based access control models and mechanisms

    Google Scholar 

  6. Wang, H., Li, Q.: Distributed user access control in sensor networks

    Google Scholar 

  7. Soni, P., Sahoo, M.: Multi-factor authentication protection framework in cloud computing (2015)

    Google Scholar 

  8. Mill, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards & Technology, Gaitherbsburg, MD 20899-8930, NIST Special Publication 800-145 (2011)

    Google Scholar 

  9. Messmer, E.: New security demands arising for virtualization, cloud computing. security-demands-arising-for-virtualization—cloud computing.html (2011)

    Google Scholar 

  10. Kaushik, S., Singhal, A.: Network security using cryptographic techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(12), 105–107 (2012)

    Google Scholar 

  11. Miers, C., Redigolo, F., Simplicio, M.: A quantitative analysis of current security concerns & solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(1), 11 (2012)

    Article  Google Scholar 

  12. Padhay, R.P.: An enterprise cloud model for optimizing IT infrastructure. Int. J. Cloud Comput. Serv. Sci. (IJ-CLOSER) 1(3), 123 (2012)

    Google Scholar 

  13. Gonzalez, N., et al.: A quantitative analysis of current security concerns & solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(1), 11 (2012). https://doi.org/10.1186/2192-113x-1-11

    Article  Google Scholar 

  14. CSA: Security guidance for critical areas of focus in cloud computing. Technical report, Cloud Security Alliance (2009)

    Google Scholar 

  15. Rowstron, A., Druschel, P.: Pastry: scalable, distributed object location & routing for large-scale peer-to-peer systems. Accepted for Middleware (2001)

    Google Scholar 

  16. Zhao, B.Y., Kubiatowicz, J., Joseph, A.: Tapestry: an infrastructure for fault tolerant wide-area location & routing (2001)

    Google Scholar 

  17. Richa A.W., Plaxton, C.G., Rajaraman, R.: Accessing nearby copies of replicated objects in a distributed environment. In: Proceedings of ACM SPAA, pp 311–320 (1997)

    Google Scholar 

  18. Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to- peer file sharing systems (2001)

    Google Scholar 

  19. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a peer-to-peer lookup service for internet applications (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Ch. Ravi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ravi, N.C., Muppalaneni, N.B., Sridevi, R., Kamakshi Prasad, V., Govardhan, A., Padma, J. (2020). Advanced Access Control Mechanism for Cloud Based E-wallet. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24643-3_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24642-6

  • Online ISBN: 978-3-030-24643-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics