A Novel Way of Localizing and Providing Secure Transaction to ATM over Cloud

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-35 Number-3
Year of Publication : 2016
Authors : Syeda Misba, Rajesh P V, Bi Bi Ayesha, Mallikarjuna B, Dhanyashree H P
  10.14445/22312803/IJCTT-V35P121

MLA

Syeda Misba, Rajesh P V, Bi Bi Ayesha, Mallikarjuna B, Dhanyashree H P "A Novel Way of Localizing and Providing Secure Transaction to ATM over Cloud". International Journal of Computer Trends and Technology (IJCTT) V35(3):118-121, May 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The use of mobile phone devices is expanding rapidly and they become essential tools that offer competitive business advantages in today’s growing world of global computing environments. A Mobile phone device is a suitable tool for authentication that could provide powerful and easy to use device to access any service securely such as an ATM terminal as well as would increase the level of protection for critical and sensitive information. Here we present a application that provides more secure ATM authentication using pin on a mobile phone device under the restriction that no changes can be made to the existing physical infrastructure, which eliminates the tradition of carrying ATM Card while accessing ATM machines and also reduces the time by localizing nearest working ATM machine available as per the user’s request using cloud.

References
[1] Aloul F, Zahidi S, El-Hajj W, “Two factor authentication using mobile phones”, IEEE International Conference on Computer Systems and Applications (AICCSA2009), Morocco, Rabat, May 2009, pp. 1 – 4.
[2] Arabo A, Shi Q, Merabti M, “Secure cash withdrawal through mobile phone/device”, IEEE International Conference on Computer and Communication Engineering (ICCCE), Malaysia, Kuala Lumpur, May 2008, pp. 818 – 822.
[3] Chavan R, Sabnees M, “Secured mobile messaging”, IEEE International Conference on Computing, Electronics and Electrical Technologies (ICCEET), Kumaracoil, India, March 2012, pp. 1036 – 1043.
[4] Curran K, King D, “Investigating the human computer interaction problems with automated teller machine (ATM) navigation menus”, Interactive Technology and Smart Education, Vol. 5, Issue 1, 2008, pp. 59 – 79.
[5] B. Olaleye, . “HEARTACHES OF ATM” Daily Sun, Tuesday 2/3/2010, pp. 45.
[6] UgochukwuOnwudebelu, OlumideLonge, SanjoFasola, Ndidi C. Obi and Olumuyiwa B. Alaba Real Time SMS-Based Hashing Scheme for Securing Financial Transactions on ATM Systems, 3rd IEEE International Conference on Adaptive Science and Technology (ICAST 2011)
[7] MarcPous, Circe Serra-Vallmitjana, David Boix “Enhancing accessibility: mobile to ATM case study” 2nd IEEE International Workshop on Consumer eHealth Platforms, Services and Applications, 2012.
[8] Michelle L.F. CHEONG, P.S. KOO, and B. CHANDRA BABU “Ad-Hoc Automated Teller Machine Failure Forecast and FieldService Optimization” 2015 IEEE International Conference onAutomation Science and Engineering (CASE)Aug 24-28, 2015. Gothenburg, Sweden
[9] Mengxing Zhang, Feng Wang*, Hui Deng, Jibin Yin “A Survey on Human-computer Interaction Technology for Financial Terminals” 2012 Fifth International Conference on Intelligent Networks and Intelligent Systems
[10] Y. Ekinci, J-C Lu, and E. Duman, “Optimization of ATM cash replenishment with group-demand forecast”, Expert System withApplications, 42, 2015, pp. 3480-3490.

Keywords
Authentication, Security, OTP, Localization.