Volume 20 No 9 (2022)
Download PDF
Barcode Authentication using big data and Cloud Computing
Dr. A. Jyothi Babu, Professor, Prof. (Dr.) Reena Singh, Prof. (Dr.) B.K. Sarkar
Abstract
Client confirmation and the check of online exchanges that are performed on an untrusted PC or gadget
is a significant and testing issue. This paper presents a way to deal with validation and exchange check
utilizing a confided in cell phone, furnished with a camera, related to QR codes. The cell phone doesn't
need a functioning association (e.g., Web or cell organization), as the necessary data is gotten by the
cell phone through its camera, for example exclusively through the visual channel. The proposed
approach comprises of an underlying client confirmation stage, which is trailed by an exchange check
stage. The exchange check stage gives a system by which significant exchanges must be confirmed by
both the client and the server. We depict the ill-disposed model to catch the potential assaults to the
framework. Moreover, this paper breaks down the security of the propose plot, and examines the
reasonable issues and systems by which the plan can evade an assortment of safety dangers including
secret key taking, man-in-the-center and man-in-the-program assaults. We note that our method is
pertinent to numerous functional applications going from standard client confirmation executions to
safeguarding web based financial exchanges
Keywords
Authentication; Mobile Device; One-Time-Password (OTP); QR Code; TransactionAuthentication-Number (TAN); Transaction Integrity; Transaction Verification
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.