Security Scheme for Online Banking Based on Secret Key Encryption

Author(s):  
Xiangyi Hu ◽  
Guifen Zhao ◽  
Guanning Xu
Author(s):  
M.P.Karthikeyan Et.al

E-banking is a safe, fast, easy and efficient electronic service that enables you access to bank account and to carry out online banking services, 24 hours a day, and 7 days a week.Through web, clients can get to their record from anyplace on the planet. Acknowledgment of substantial customer is a significant issue in E-banking. The security issue emerges because of unavoidable hacking of banking web. Duplicate sites are a sort of online information deception that hopes to take secret information, similar to e-money passwords and money exchange information from clients. Hence a structure having figure pixel appraisal for purchaser approval principally based barring chain strategy. In the proposed framework, for each money given up by the customer, we produce an ID for every cash, when any aggregate of sum is moved, the ID of the monetary forms may be moved, so we can follow the method for the money going around.Thus, the graphical secret key has been proposed with the guide of numerous scientists as a chance to content based secret key. Usage of hyperlink chain graphical secret key which utilizes round resilience makes the framework more made sure about than current.


2021 ◽  
pp. 1-22
Author(s):  
Md Whaiduzzaman ◽  
Nishat Farjana ◽  
Alistair Barros ◽  
Md. Julkar Nayeen Mahi ◽  
Md. Shahriare Satu ◽  
...  

Fog computing complemented cloud computing integration services in the Internet of Things (IoT) and the web of real-time interactivity. Fog offers faster computing and other services facilities sitting close to user applications. However, secure data transfer in the fog is still a challenging issue requiring attention and efficient deployment of a secure data security scheme. We present an Identity Based Encryption (IBE) scheme to secure data security and transmission in fog clouds and IoT ecosystems. We devise and develop a four-level Hierarchical Identity Based Architecture for Fog Computing (HIBAF) data security scheme to enhance data security. We also analyze the system’s performance regarding response time, CPU utilization, run-time encryption-decryption, and key generation time in the fog computing paradigm to an increasing number of users data-loads. Moreover, we evaluate our scheme and compare the outcomes with different cryptography structures to discern our scheme’s effectiveness. Furthermore, we also evaluate secret key updating time, re-encrypted key updating time, and file revoking time by launching DDoS attacks both in the cloud and fog computing environment to compare improvements of HIBAF in the fog computing paradigm. Finally, through this overall evaluation, we have found that the developed HIBAF scheme provides a 33% performance enhancement in a fog environment in terms of data processing, provision, and management compared to the cloud environment.


2008 ◽  
Vol 2008 ◽  
pp. 1-6 ◽  
Author(s):  
H. E. Michail ◽  
G. Selimis ◽  
M. Galanis ◽  
D. Schinianakis ◽  
C. E. Goutis

A new algorithm for producing message authenticating codes (MACs) was recently proposed by NIST. The MAC protects both a message's integrity—by ensuring that a different MAC will be produced if the message has changed—as well as its authenticity because only someone who knows the secret key could have generated a valid MAC. The proposed security scheme incorporates an FIPS approved and secure block cipher algorithm and was standardized by NIST in May, 2005. In this paper is presented the first efficient hardware implementation of the CMAC standard.


Cryptography involved in offering of secure data by generation of secret key through encryption process. At present, almost every applications require security scheme due to increased threats. Low power applications are limited to power sources where incorporation of attacks leads to certain challenges in terms of reduced throughput, data loss and increased power consumption hence it is necessary to adopt effective security scheme for low power application. Generally, in power circuits advanced encryption standard (AES) is incorporated which is defined as S-box. This substitution box is designed by 2 transformations (i.e) inversing the multiplication part in Galois field directed with modified affine transformation. The limitation of S-Box is more time and power consumption. In this paper, proposed a kernel based AES scheme for improving the performance of low power application. The proposed Kernal approach uses logic gate design with cipher text operation. The Kernel -AES technique is implemented in CMOS devices with 45nm standard cell technology. Results obtained for proposed Kernel-AES approach provides reduced power consumption rate of 28.5A which is comparatively less than conventional AES technique.


2017 ◽  
Vol 3 (2) ◽  
pp. 29
Author(s):  
NURHAZIRAH HASHIM ◽  
MOHAMMAD ZAIM MOHD SALLEH ◽  
NOR SARA NADIA MUHAMAD YUNUS ◽  
INTAN SYAFINAZ MAT SHAFIE

The recent development in the ecommerce services has shown a variety of established companies participating in the web business environment including Islamic banks. Business with the mostexperience and success in using ecommerce are beginning to realize that the indicator of success or failure of the ecommerce environment was included in the online services. Nowadays, the trend ofa business is to serve the customer with best quality of services to enhance the consumer satisfaction and compete with the global competitors as online services enabled registered user to make productspurchase transaction only through website such as check and manage financial standing, transfer funds, bill payment, prepaid reload and so forth. However, in recent times, Islamic banking users faced problems with the online system such as cannot log in to the system, payment failure and  mostly security and privacy hindrance. Therefore, this study aimed to investigate the relationship between electronic service quality (e-SERVQUAL) and customer satisfaction towards IslamicOnline Banking Services users. Based on the sample size, only 76 respondents were selected to participate in this study by using a convenience sampling. Further, Pearson correlation and multipleregression were reported to analyze the mentioned relationship. The findings have shown that there is a positive relationship between e-SERVQUAL and customer satisfaction in using Islamic onlinebanking services. Based on the findings, Islamic online banking developer is recommended to improve more on their responsiveness in order to provide quick response to their customer’s requirements.  Moreover, they also should be more reliable in providing accurate information in performing the promised services. They must assure that all of their customers can quickly get responds and true feedback regarding their problems to ensure customer satisfy with service provided. Besides, the safety of the website and the protection of customer information alsoconsidered a vital action that should be concerned in order to increase the customers’ satisfaction.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2020 ◽  
Author(s):  
Samina Rahman ◽  
Victoria Kordovski ◽  
Savanna Tierney ◽  
Steven Paul Woods

Objective: Online banking is becoming increasingly common among older adults, whomay experience difficulties effectively navigating this instrumental technology. Thisstudy examined age effects on a performance-based Internet banking task and itsassociation with neurocognitive ability and functional capacity in older and youngeradults. Method: Thirty-five older adults and 50 younger adults completed anexperimenter-controlled online banking measure in which they independentlyperformed a series of naturalistic financial tasks (e.g., account transfers, bill paying).Participants also completed a standardized battery of neuropsychological tests andmeasures of functional capacity. Results: Older adults were markedly slower and lessaccurate in completing the Internet-based banking task, which was not confounded byother demographic, mood, or computer use factors. Higher scores on measures ofneurocognition and financial functional capacity were both strongly associated withhigher Internet-based banking task accuracy scores and quicker completion times inthe older, but not the younger adults. Conclusions: Findings suggest that older adultsexperience difficultly quickly and accurately navigating online banking platforms, whichmay be partly related to age-related declines in neurocognitive functions and basicfinancial capacity. Future studies might examine whether neurocognitive approaches toremediation and compensation can be used to improve online banking capacity inolder adults.


Sign in / Sign up

Export Citation Format

Share Document