Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review

A Bodepudi, M Reddy - International Journal of Information …, 2020 - publications.dlpress.org
methods has become paramount. Cloud-based biometric authentication techniques have …
This research explores common cloud-based biometric authentication techniques, including …

Simplified and efficient framework for managing roles in cloud-based transaction processing systems using attribute-based encryption

B Balusamy, PV Krishna - International Journal of …, 2017 - inderscienceonline.com
… SARBAC, this work presents an UARBAC model for cloud-based systems that has comparative
advantages over the existing RBAC techniques. In ‘Policy analysis for administrative role …

[PDF][PDF] Transaction management techniques and practices in current cloud computing environments: A survey

A Waqas, AW Mahessar, N Mahmood… - … Management Systems, 2015 - academia.edu
… important research literature of the current cloud based systems and TM in DDBMSs. Our …
various TM techniques used in current cloud based systems along with the techniques and …

Auditing cloud-based blockchain accounting systems

D Appelbaum, RA Nehmer - Journal of information systems, 2020 - publications.aaahq.org
transactions that have these characteristics in systems that reside in the cloud. We consider
how cloud-based … We also consider how such systems would affect confirmations. By doing …

An identity-based data integrity auditing scheme for cloud-based maritime transportation systems

X Li, S Shang, S Liu, K Gu, MA Jan… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
… Maritime Transportation Systems (MTS), massive data generated in the system not only …
The Cloud-based Maritime Transportation Systems (CMTS) allow users to upload the data …

Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms

A Alhchaimi - Wasit Journal of Computer and Mathematics …, 2024 - wjcm.uowasit.edu.iq
… to identify the most effective approach or combination of approaches for this specific …
various ML algorithms for detecting transaction fraud within cloud-based systems. The study …

Cloud based security on outsourcing using blockchain in E-health systems

T Benil, J Jasper - Computer Networks, 2020 - Elsevier
… The main components of the transaction procedure used in the blockchain are based on
the address. Each of the blocks in the blockchain carries the data and address of the next …

CloudID: Trustworthy cloud-based and cross-enterprise biometric identification

M Haghighat, S Zonouz, M Abdel-Mottaleb - Expert Systems with …, 2015 - Elsevier
… a cloud-based system to store and process the data. The work presented in this paper is a key
step towards a cloud-based unified storage system for … -preserving cloud-based database. …

An opportunistic approach for cloud service-based IoT routing framework administering data, transaction, and identity security

DK Sharma, KK Bhardwaj, S Banyal… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… nessing cloud-based technologies as the world focuses on … In this work, mobile cloud-based
infrastructure is considered … for secure data delivery in the cloud-based IoT network. The …

A cloud based dual-root trust model for secure mobile online transactions

L Li, D Huang, Z Shen… - 2013 IEEE Wireless …, 2013 - ieeexplore.ieee.org
… To solve the problem, we propose a mobile transaction system model as shown in Fig. 1.
Mobile users delegate data and credentials to the mobile cloud but make device-specific …