Proposed Algorithm for Secured Transaction using 3-Tier Architecture
Priya Sharma1 , Pawan Kumar Chaurasia2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-6 , Page no. 316-321, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.316321
Online published on Jun 30, 2018
Copyright © Priya Sharma, Pawan Kumar Chaurasia . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Priya Sharma, Pawan Kumar Chaurasia, “Proposed Algorithm for Secured Transaction using 3-Tier Architecture,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.316-321, 2018.
MLA Style Citation: Priya Sharma, Pawan Kumar Chaurasia "Proposed Algorithm for Secured Transaction using 3-Tier Architecture." International Journal of Computer Sciences and Engineering 6.6 (2018): 316-321.
APA Style Citation: Priya Sharma, Pawan Kumar Chaurasia, (2018). Proposed Algorithm for Secured Transaction using 3-Tier Architecture. International Journal of Computer Sciences and Engineering, 6(6), 316-321.
BibTex Style Citation:
@article{Sharma_2018,
author = {Priya Sharma, Pawan Kumar Chaurasia},
title = {Proposed Algorithm for Secured Transaction using 3-Tier Architecture},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {316-321},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2182},
doi = {https://doi.org/10.26438/ijcse/v6i6.316321}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.316321}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2182
TI - Proposed Algorithm for Secured Transaction using 3-Tier Architecture
T2 - International Journal of Computer Sciences and Engineering
AU - Priya Sharma, Pawan Kumar Chaurasia
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 316-321
IS - 6
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
1043 | 484 downloads | 285 downloads |
Abstract
A Greater demands for fast and accurate user identification and authentication in electronic transaction increases day by day. Continuous development of technology, Security involvements are also increasing. ATM helps in a transaction of money any time & anywhere, faces the threat of attack, fraud, theft, etc., thus to deal with high security which provides safety to consumers, Authentication plays an important role. A new system approach for enhancing security and privacy in biometric applications like face detection, IRIS scan, fingerprint, voice, signature, etc. In this biometric system card-less operation done by biometric technology for operating ATMs. Proposed model provide high security in authentication which protects from illegal transactions. By this user required to authenticate him/her self with biometric identification and personal identification number. This proposed system is designed for illiterate, semi-literate and literate people. System decreases complexity with authentication as “you as Security” with high security. It reduces the problem of an excess number of plastic cards & saves environmental pollution. It saves time, cost, effort compared with a card-based system.
Key-Words / Index Term
Automatic Teller Machine, Biometric, Fingerprint, IRIS, Personal Identification Number, Smartcards
References
[1]. Sonakshi Bhagat et al, “ATM Security using Iris Recognition Technology and RFID”, International Journal of Engineering Science and Computing, Vol.7, No.5, pp.11486-11488, May, 2017
[2]. Mr C Raghavendra et al, “High protection human IRIS authentication in new ATM terminal design using biometrics mechanism”, Journal of Global Research in Computer Science, Vol-3, No.11, pp.16-20, November, 2012
[3]. P. Nagarajan, Dr. Ramesh S M, “IRIS Recognition Based Authentication System In ATM”, International journal for trends in engineering & technology, Vol-5, No.1, pp.126-131, May, 2015
[4]. Mr. Mahesh A. Patil et al, “ATM Transaction Using Biometric Fingerprint Technology”, International Journal of Electronics, Communication & Soft Computing Science and Engineering, Vol-2, No.6, pp.22-27
[5]. Ashish M. Jaiswal, Mahip Bartere, “Enhancing ATM security using fingerprint and GSM technology”, International Journal of Computer Science and Mobile Computing, Vol-3, No.4, pp.28-32, April, 2014
[6]. Prof. Selina Oko, Jane Oruh, “Enhanced ATM security system using biometrics”, International Journal of Computer Science Issues, Vol-9, No.5, pp.352-357, September, 2012
[7]. Namit Gupta, Anu Sharma, “Review of biometric technologies used for ATM security”, International Journal of Engineering and Innovative Technology, Vol-3, No.2, pp.460-465, August, 2013
[8]. R. Maheshwri et al, “Security ATM With Help Of Biometric Security”, International Journal of Electronics and Communication Engineering, pp.47-51, March, 2017
[9]. Moses Okechukwu Onyesolu, Ignatius majestry ezeani, “ATM Security Using Fingerprint Biometric Identifer: An Investigative Study”, International Journal of Advanced Computer Science and Applications, Vol-3, No.4, pp.68-72, 2012
[10]. N. Geetanjali, K.Thamaraiselvi, “Enhancing the Security of Biometrics in ATM”, International Journal of Scientific & Engineering Research, Vol-4, No.4, pp.1192-1198, April, 2013
[11]. Parvinder S. Sandhu et al, “Biometric Methods and Implementation of Algorithms”, International Journal of Computer and Information Engineering, Vol-3, No.4, pp.1033-1038, 2009
[12]. Ayushi Mathur, Mr. Rupal Gupta, “Analysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System”, International Conference on Advanced Computing, pp.398-403, 2016
[13]. Abinandhan Chandrasekaran, Dr.Bhavani Thuraisingham, “Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances”, International Conference on Availability, Reliability and Security, April, 2007
[14]. I. G. Damousis, S. Argyropoulos, “Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study”, Applied Computational Intelligence and Soft Computing, 2011
[15]. Roaya Salhalden A. Abdalrahman et. al., “A cascaded voice biometric system”, Procedia Computer Science, pp.1223–1228, 2018
[16]. Mithun Dutta et. al., “ATM Transaction Security Using Fingerprint Recognition”, American Journal of Engineering Research, Vol-6, No.8, pp.41-45, 2017
[17]. Nisha Bhanushali et. al., “Fingerprint based ATM system”, Journal for Research, Vol-2, No.12, pp.31-34, February, 2017
[18]. Sneha Ramrakhyani et. al, “Fingerprint Based ATM System: Survey”, International Journal of Innovative Research in Science, Engineering and Technology, Vol-6, No.11, pp.21515-21520, November, 2017
[19]. Paschal A. Ochang and Paulinus O. Ofem, “An Enhanced Automated Teller Machine Security Prototype using Fingerprint Biometric Authentication”, International Journal of Advanced Networking and Applications, Vol-8, No.4, pp-3110-3117, 2017
[20]. Reshma Begum et. al., “Security of ATM System Using Biometric and OTP”, International Journal of Innovative Research in Computer and Communication Engineering, Vol-5, No.4, pp.72-77, June, 2017
[21]. Aneesh Chandran et. al., “ATM for Visually Challenged People”, International Research Journal of Engineering and Technology, Vol-4, No.3, pp.370-375, March, 2017
[22]. Ankit Singla and Neetu Jain, “Fraud Reduction in ATM Machines using Voice Recognition- A Review”, International Journal of Innovative Research in Science, Engineering and Technology, Vol-6, No.5, pp.7525-7530, May, 2017
[23]. Fahreddin Sadikoglu and Selin Uzelaltinbulat, “Biometric Retina Identification Based on Neural Network”, Procedia Computer Science, Vol-102, pp.26-33, 2016
[24]. Reshmi K.C. et. al., “A Novel Approach to Brain Biometric User Recognition”, Procedia Technology, pp.240-247, 2016
[25]. Nana Kwame Gyamfi et. al., “Enhancing the Security Features of Automated Teller Machines (ATMs): A Ghanaian Perspective”, International Journal of Applied Science and Technology, Vol-6, No.1, pp.102-111, February, 2016
[26]. Ceren Tarkmen and Alper Deayerli, “Transformation of Consumption Perceptions: A Survey on Innovative Trends in Banking”, Procedia - Social and Behavioral Sciences, Vol-195, pp.376-382, July, 2015
[27]. Firas S. Assaad and Gursel Serpen, “Transformation based Score Fusion Algorithm for Multi-modal Biometric User Authentication through Ensemble Classification”, Procedia Computer Science, Vol-61, pp.410-415, 2015
[28]. Mohsin Karovaliya et. al., “Enhanced security for ATM machine with OTP and Facial recognition features”, Procedia Computer Science, pp.390-396, 2015
[29]. Michael Mireku Kwakye et. al., “Adoption of Biometric Fingerprint Identification as an Accessible, Secured form of ATM Transaction Authentication”, International Journal of Advanced Computer Science and Applications, Vol-6, No.10, pp.263-265, 2015
[30]. Rathishala Rajendran et. al., “ATM Security using Fingerprint Authentication and OTP”, International Journal of Current Engineering and Technology, Vol-5, No.2, pp.1157-1159, April, 2015
[31]. Zameer Afshan, Pawan Kumar Chaurasia, “A Review on Crypto-Currency”, International Journal Of Computer Science and Mobile Application, Vol-6, pp.95-100, 2018
[32]. V.K. Jain , N. Tripathi, “Speech Features Analysis and Biometric Person Identification in Multilingual Environment”, International Journal of Scientific Research in Network Security and Communication, Vol-6 , No.1 , pp.7-11, Feb, 2018
[33]. Namrata Ghuse et. al., “An Improved Approch For Fraud Detection In Health Insurance Using Data Mining Techniques”, International Journal of Scientific Research in Network Security and Communication, Vol-5, No.5, pp.28-32, June, 2017
[34]. Savitha G. et. al., “Selective Small Reconstruction Error Based LDRC Multimodal Biometric Authentication”, International Journal of Scientific Research in Computer Science and Engineering, Vol-6, No.1, pp.1-10, Feb, 2018
[35]. Oluwabunmi Ayankemi ONI, “A Framework for Verifying the Authenticity of Banknote on the Automated Teller Machine (ATM) Using Possibilistic C-Means Algorithm”, International Journal of Scientific Research in Computer Science and Engineering, Vol-6, No.2, pp.57-63, April, 2018