Now showing 1 - 7 of 7
  • Placeholder Image
    Publication
    Security management in mobile cloud computing: Security and privacy issues and solutions in mobile cloud computing
    (2018)
    Singh B
    ;
    Mobile cloud computing is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. In Mobile Cloud computing we can store information regarding sender, data and receiver on cloud through mobile application. As we store more and more information on cloud by client, security issue will arise. This chapter presents a review on the mobile cloud computing concepts as well as security issues and vulnerabilities affecting Cloud Systems and the possible solutions available to such issues within the context of cloud computing. It also describes the pros and cons of the existing security strategy and also introduces the existing issues in cloud computing such as data integrity, data segregation, and security. � 2018 by IGI Global. All rights reserved.
    Scopus© Citations 1
  • Placeholder Image
    Publication
    Business transformation though cloud computing in sustainable business
    (2014) ;
    Sudha M.
    The changing market trends make it mandatory for businesses to constantly innovate and improve while keeping the expenditures at lowest. For any business, irrespective of size, information technology is playing a major role. Cloud computing is emerging as a driving factor for all types of businesses. Although cloud computing is widely recognized as a technology transformer, its potential for driving business innovation is not exploited to the fullest. Cloud computing promises to decrease capital expenditures and offer higher utilization rates on existing hardware. To exploit the cloud computing capability to enable organizations to enhance their revenue streams and improved customer relationships while increasing business agility, organizations need to determine how best to employ cloud enabled business models that promote sustainable competitive advantage, as this chapter discusses. By completely leveraging cloud computing opportunities, organizations can focus on process improvement by driving inefficiencies out of repeatable processes and providing agility to reuse elements of business logic. � 2015 by IGI Global. All rights reserved.
    Scopus© Citations 4
  • Placeholder Image
    Publication
    Secure end-to-end authentication for mobile banking
    (2015)
    Singh B
    ;
    The advancement in technology makes Mobile Banking transaction more sophisticated. The OTP SMS is generated by the bank server and is handed over to the client�s mobile subscriber. To avoid any possible attacks like phishing and other attacks, the OTP must be secured. In order to provide reliable and secure mobile transactions without any compromise to convenience, a reliable m-banking authentication scheme that combines the secret PIN with encryption of the one-time password (OTP) has been developed in this paper. The secured OTP while using eZeeMPay salt algorithm seek to give the more secured m-banking transaction. After the encrypted OTP SMS reaches the client�s mobile, the OTP is used again used for decrypting. The plain OTP text should be sent back to the bank will verified at the server to complete the transaction initiated. The combination of OTP with secured OTP provides authentication and security. � Springer International Publishing Switzerland 2015.
    Scopus© Citations 1
  • Placeholder Image
    Publication
    A new architecture of mobile payment system through social media network
    (2014)
    Singh B
    ;
    The financial services industry is changing rapidly as a result of advances in information technology, telecommunications and the Internet. Technological innovations and increasing customer demand have led to the emergence of new services and new organizational forms for financial services firms. The gait of innovation in the Social media, the payment system is staggering. The biggest social media sites are Facebook, massive and used by almost everyone, Twitter, the micro-blogging, and LinkedIn, the online professional networking site. By using the social media connections as a method to exchange the funds, we can integrate our use of mobile wallets, PayPal, etc. to our social media sites. Believing on daily deal platforms, none of the current daily deal platforms can compete with the granularity and relevance with which banks could target a deal to a specific subscriber, having access to their extensive spending history and preferences. A feedback loop extending from the Bank to the merchants enabling the creation of accurate list of customers who consistently spend in specific retail categories can help merchants in delivering targeted offers to attract new customers. � 2014, IGI Global.
    Scopus© Citations 1
  • Placeholder Image
    Publication
    Comparative study on various methods and types of mobile payment system
    (2012)
    Singh B
    ;
    The mobile payment is the one of the most promising future applications in the domain of mCommerce. Different approaches come to the market and try to address existing needs, but up to day no global solution exists. The proposed system would enhance the P2P (SMS Based) mobile Payment system, which will try to ease the money transfer between two individual. This solution the key difference is the time needed to inform the beneficiary about the completion of the payment. The advantage of such a system is that only the mobile phone number, not the bank account number or credit card details, are transmitted. Moreover, consumers can even request a proposed system's phone number if they do not feel comfortable giving their mobile phone number to merchants. Therefore, proposed system tries to improve the customer's trust and payment security. � 2012 IEEE.
    Scopus© Citations 11
  • Placeholder Image
    Publication
    Security management in Mobile Cloud Computing: Security and privacy issues and solutions in Mobile Cloud Computing
    (2016)
    Singh B
    ;
    Mobile cloud computing is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. In Mobile Cloud computing we can store information regarding sender, data and receiver on cloud through mobile application. As we store more and more information on cloud by client, security issue will arise. This chapter presents a review on the mobile cloud computing concepts as well as security issues and vulnerabilities affecting Cloud Systems and the possible solutions available to such issues within the context of cloud computing. It also describes the pros and cons of the existing security strategy and also introduces the existing issues in cloud computing such as data integrity, data segregation, and security. Copyright � 2017 by IGI Global. All rights reserved.
    Scopus© Citations 4