OTP on GPS: An Enhancement to OTP Security Model for Securing On-Line Transactions
نویسندگان
چکیده
منابع مشابه
Mobile Security (OTP) by Cloud Computing
Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There is a big security concern when using cloud services. Security is very important in cloud computing since people and companies store confidential data in the cloud. It must also be easy to use the services...
متن کاملAn Approach towards Security in Private Cloud Using OTP
Although cloud has got a great recognition in today’s world still security is one of the key constraints to be resolved. Since data and applications are moved into cloud data centers, which run on virtual computing in the form of virtual machine, there are a number of security challenges which are yet to be met. With that development, the security to access the cloud also need to be tightened, ...
متن کاملRe-otp Key Management Mechanism for the Cloud Data Security
Cloud storage is one of the most popular services techniques in cloud computing environment. A crucial problem to be addressed in the cloud storage system concerns the security mechanism of protecting the private data and sharing data with other users. Cloud storage services are inherently insecure as the management technique of the data in the cloud storage is controlled by third parties beyon...
متن کاملSecurity Analysis of Mobile Phones Used as OTP Generators
The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the protocols reveals minor security flaws. System-level testing of an online bank utilizing Encap’s solution then shows that several attacks allow a malicious individual to turn his own mobile phone into an OTP generator for another i...
متن کاملA Secure Mobile OTP Token
Implementing a mobile One-time Password (OTP) Token on a cellular phone is a hot topic since the past few years. The proposed solutions had made certain improvements on network security. But none of them can fully prevent the OTP seed (K) tracing from MIMT OTP code interception or Shoulder-surfing security attacks while also meet the following criteria – fully compliant with existing authentica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2018
ISSN: 2321-9653
DOI: 10.22214/ijraset.2018.7129