A Review of Information Security from Consumer’s Perspective Especially in Online Transactions

  • Mohammad Salman Husain
  • Dr. Mohammad Haroon
Keywords: Online Transaction, Blowfish Algorithm, AES Algorithm, Dual OTP, Banking System

Abstract

In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net banking and lot of other payable apps. So, every online transaction is prone to vulnerable attacks by the fraudulent websites and intruders in the network. As there are many security measures incorporated against security vulnerabilities, network thieves are smart enough to retrieve the passwords and break other security mechanisms. At present situation of digital world, we need to design a secured online transaction system for banking using multilevel encryption of blowfish and AES algorithms incorporated with dual OTP technique. The performance of the proposed methodology is analyzed with respect to number of bytes encrypted per unit time and we conclude that the multilevel encryption provides better security system with faster encryption standards than the ones that are currently in use.

Downloads

Download data is not yet available.

References

F. Gao, P. L. P. Rau, & Y. Zhang. (2018). Perceived mobile information security and adoption of mobile payment services in China. Mobile Commerce: Concepts Methodologies Tools and Applications, 1179-1198.

Dr. A.L.N Rao, Silky Puri, & Shalini Rana. (2013). Review: Location based authentication to mitigate intruder attack. International Journal of Engineering and Innovative Technology (IJEIT), 2(9), 336-339.

V. L. Johnson, A. Kiser, R. Washington, & R. Torres. (2018). Limitations to the rapid adoption of M-payment services: Understanding the impact of privacy risk on M-Payment services. Computers in Human Behavior, 79, 111-122.

Soonduck Yoo, Seung-jung Shin, & Dae-hyunRyu. (2013). An innovative two factor authentication method: The QR login system. International Journal of Security and Its Applications, 7(3), 293-302.

S. Mittal, V. Kumar. (2018). Adoption of mobile wallets in india: an analysis. IUP Journal of Information Technology, 14(1), 42-57.

M. Suresh, B. Domathoti, & N. Putta. (2015). Online secure e-pay fraud detection in e-commerce system using visual cryptographic methods. International Journal of Innovative Research in Computer and Communication Engineering, 3(8), 7519-7525.

B. Jeffus, S. Zeltmann, K. Griffin, & A. Chen. (2017). The future of mobile electronic payments. Journal of Competitiveness Studies, 25(3-4), 216-223.

R. Purohit & D. Bhargava. (2017). An illustration to secured way of data mining using privacy preserving data mining. Journal of Statistics and Management Systems, 20(4), 637-645.

N. Shrivastaval & T. Verma. (2015). A survey on various techniques for generating image steganography with improved efficiency. International Journal of Advanced Research in Computer Engineering & Technology, 4(3), 1005-1009.

S. Roy & P. Venkateswaran. (2014). Online payment system using steganography and visual cryptography. In: Proceedings of the IEEE Conference on Electrical Electronics and Computer Science, pp. 88-93.

G. Kanimozhi & K. S. Kamatchi. (2017). Security aspects of mobile based e wallet. International Journal on Recent and Innovation Trends in Computing and Communication, 5(6), 1223-1228.

Mr. Shakir Shaik & Dr. S.A. Sameera. (2014). Security issues in e-banking services in Indian scenario. Asian Journal of Management Sciences, 02(03), 28-30.

Published
2020-08-31
How to Cite
Mohammad Salman Husain, & Dr. Mohammad Haroon. (2020). A Review of Information Security from Consumer’s Perspective Especially in Online Transactions. International Journal of Engineering and Management Research, 10(4), 11-14. https://doi.org/10.31033/ijemr.10.4.2