Volume 20 No 9 (2022)
 Download PDF
Barcode Authentication using big data and Cloud Computing
Dr. A. Jyothi Babu, Professor, Prof. (Dr.) Reena Singh, Prof. (Dr.) B.K. Sarkar
Abstract
Client confirmation and the check of online exchanges that are performed on an untrusted PC or gadget is a significant and testing issue. This paper presents a way to deal with validation and exchange check utilizing a confided in cell phone, furnished with a camera, related to QR codes. The cell phone doesn't need a functioning association (e.g., Web or cell organization), as the necessary data is gotten by the cell phone through its camera, for example exclusively through the visual channel. The proposed approach comprises of an underlying client confirmation stage, which is trailed by an exchange check stage. The exchange check stage gives a system by which significant exchanges must be confirmed by both the client and the server. We depict the ill-disposed model to catch the potential assaults to the framework. Moreover, this paper breaks down the security of the propose plot, and examines the reasonable issues and systems by which the plan can evade an assortment of safety dangers including secret key taking, man-in-the-center and man-in-the-program assaults. We note that our method is pertinent to numerous functional applications going from standard client confirmation executions to safeguarding web based financial exchanges
Keywords
Authentication; Mobile Device; One-Time-Password (OTP); QR Code; TransactionAuthentication-Number (TAN); Transaction Integrity; Transaction Verification
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.