Wednesday, May 6, 2020

Prevention Of Online Transaction Frauds Using Otp...

Prevention of Online Transaction Frauds Using OTP Generation Based on Dual Layer Security Mechanism Amit Kulat1, Raghav Kulkarni2, Nagesh Bhagwat3, Kartik Desai4 1234 BE IT, Department of Information Technology, RMD Sinhgad School of Engineering, Pune, Maharashtra, India. Mrs. Prajakta Kulkarni5 5Assistant Professor, Department of Information Technology, RMD Sinhgad School of Engineering, Pune, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – With the developing technology online shopping of goods and various other products has increased to a great extent. With this service people tend to use their debit cards and credit cards for the online payment and this has been a common practice. Fraudsters take good advantage of this situation to commit frauds by making an identity theft. To avoid this many technologies emerged lately but they had some disadvantages which was not very comfortable for the end user. This project aims at implementing the web application for preventing online transaction frauds considering user comfort while making transactions from regular or different machine and from same or various other locations. Security is provided by the generation of OTP (One Time Password) providing a dual layer security mechanism which includes cookie based OTP generation and location based OTP generation. The key points of OTP generation, cookies,Show MoreRelatedCloud Computing Security67046 Words   |  269 PagesSECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING V3.0 SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING V3.0 INTRODUCTION The guidance provided herein is the third version of the Cloud Security Alliance document, â€Å"Security Guidance for Critical Areas of Focus in Cloud Computing,† which was originally released in April 2009. The permanent archive locations for these documents are: http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf (this document)

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.