INTEGRATION OF ACCESS CONTROL MECHANISM IN CLOUD BASED EWALLET

Authors

  • Ravi Associate Professor,Dept of CSE,SIET, Hyderabaad
  • Dr. M. Naresh Babu Associate Professor of CSSE, Sree Vidyanikethan Engg College, Tirupati, A.P.
  • Dr. R. Sridevi Professor in CSE, JNTUH CEH,T.S
  • Dr. V. KamakshiPrasad Professor in CSE, JNTUH CEH,T.S
  • Dr. A. Govardhan Professor in CSE, JNTUH CEH,T.S

Keywords:

ECOMMERCE, DIGITAL WALLET, electronic wallet

Abstract

In this paper we have implemented access control mechanism to develop an electronic wallet based system where security is the major concern. This system is widely used in banking and financial institutions. The funds of people are stored in digital wallet and its security is must. In order to enhance the security of digital Electronic wallets system we have introduced several security mechanisms such as one time password, Session based security, Cookies based security, Capcha, IP authentication, Cryptography. Here we have discussed the threats to security of digital wallet.

References

Umair Mukhtar Ahmed Naushahi “Profile Based Access Control in case of Cloud Computing Environments with applications in Health Care Systems”

Prosunjit Biswas, Ravi Sandhu(B), And Ram Krishnan “Uni-Arbac: A Unified Administrative Model For Role-Based Access Control”

Roszelinda Khalid, Zuriati Ahmad Zukarnain, zurina Mohd Hanapi, Mohamad Afendee Mohamed, “Authentication Mechanism in case of Cloud Network And Its Fitness With Quantum Key Distribution Protocol: A Survey” , 2015.

Sneha Warang, “Role Based Access Control Model For Cloud Computing Using Rbe Scheme” ,2016

Christopher Alm, Michael Drouineaud, Ute Faltin, Karsten Sohr, And Ruben Wolf “A Classification Framework Designed For Advanced Role-Based Access Control Models And Mechanisms”

Haodong wang & qun, “Distributed user access control in sensor networks”

Multi-factor authentication protection framework in cloud computing by prachi soni, (asst. Prof.) Monali sahoo 2015

Peter mill & Tim grance, “The NIST Definition of Cloud Computing”, 2011, National Institute of Standards & Technology ,Gaitherbsburg,MD 20899-8930, NIST Special Publication 800-145.

Ellen Messmer, “New security demands arising for virtualization, cloud computing”, 2011, security-demands-arising-for-virtualization—cloud computing.html

Downloads

Published

2017-03-30

How to Cite

N.Ch. Ravi, Dr. M. Naresh Babu, Dr. R. Sridevi, Dr. V. KamakshiPrasad, & Dr. A. Govardhan. (2017). INTEGRATION OF ACCESS CONTROL MECHANISM IN CLOUD BASED EWALLET. Universal Research Reports, 4(1), 121–127. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/35

Issue

Section

Original Research Article