2022
DOI: 10.32604/cmc.2022.019591
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment

Abstract: The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 18 publications
0
17
0
Order By: Relevance
“…The simulation results of this privacy-preserving scheme are identified to minimize robustness of fault tolerance, communication cost, and computational complexity compared to the baseline approaches used for exploration. A Blinding factors-based Paillier Homomorphic Encryption (BF-PHE) scheme was proposed for ensuring privacy preservation in fog computing during the process of data aggregation [22][23].…”
Section: Drawbacks Of the Existing Methodologiesmentioning
confidence: 99%
“…The simulation results of this privacy-preserving scheme are identified to minimize robustness of fault tolerance, communication cost, and computational complexity compared to the baseline approaches used for exploration. A Blinding factors-based Paillier Homomorphic Encryption (BF-PHE) scheme was proposed for ensuring privacy preservation in fog computing during the process of data aggregation [22][23].…”
Section: Drawbacks Of the Existing Methodologiesmentioning
confidence: 99%
“…A healthcare system is composed of numerous organisations, individuals, and actions with the primary objective of monitoring [36], promoting, and sustaining people's health. Examples include private clinics, pharmaceutical firms, hospitals, healthcare companies, workplace health and safety standards, and the ministry of health.…”
Section: System Model and Problem Statementmentioning
confidence: 99%
“…Prabakaran and et al ( 2022) had introduced Multi-Factor Authentication (MFA) [18] mechanism using Elliptical Curve Cryptography (ECC) and secured the session key using the individual's voice print feature. The proposed framework exhibits a high level of security against network vulnerabilities.…”
Section: Variousmentioning
confidence: 99%
“…The decryption process is a reverse process of encryption in which the diffusion process is followed by the confusion process with "n" and "m" number of rotational rounds respectively. The algorithm for the chaotic map encryption and decryption process is illustrated in Table This framework provides a high level of security during the third party transactions [24] in cloud computing, with reduced transaction duration when compared to the previous works [18].…”
Section: Figure 4: Chaotic Map Confusion and Diffusion Processmentioning
confidence: 99%
See 1 more Smart Citation