Location Based Authentication For E-Banking
Rohit Joshi
Department of Information Technology
MET’s IOE Bhujbal Knowledge City, Nashik, Maharashtra,India
Prince Gupta
Department of Information Technology
MET’s IOE Bhujbal Knowledge City, Nashik, Maharashtra,India
Mahendra Hinde
Department of Information Technology
MET’s IOE Bhujbal Knowledge City, Nashik, Maharashtra,India
Abstract- This paper reviews techniques that use location as an authentication factor, and make recommendations how
location can be used for enhancing the security of banking using smartphone applications which require robust client
authentication, and lastly how a secret key using algorithms will ensure in securing fund transaction. Authentication is
one of the three main processes Authentication, Authorization , Accounting.
Keywords – Dataprivacy,authentication,mobile,authorization,location.
I. INTRODUCTION
The smart phones are becoming a major part in everybody’s daily life. And all kinds of activities, including banking
or financial mCommerce transactions (e.g. online shopping), nowadays are performing online via Smartphone
applications whilst at the move. Approximately 50% of all Smartphone owners in the U.S. are using their
Smartphone for banking transactions during the first quarter of 2011. There is an increase of nearly 100% compared
to the year before now . However, many of the techniques used to authenticate the authorized client towards the
remote authenticator (i.e. the bank is offering a financial services) in these mCommerce applications still based upon
classic (i.e. static) authentication factors like passwords, biometrics, or tokens,etc. The fact is that the client while
on the move, whilst using these mCommerce applications is not considered or used to enhance the authentication
security. Reliable client authentication and the data protection are still major concerns for mCommerce application
providers because a classical authentication factors are open for hackers. As a result, mCommerce application
providers restrict access, on average, to 30% of possible services to their clients via the Smartphone applications.
Any financial institutions engaging in any form of Internet banking using smart phones necessarily have effective
and reliable methods for authenticating customers. An effective authentication system is required for compliance
with requirements for safeguarding customer information, for preventing money laundering and terrorist financing,
and to reduce fraud, for inhibiting identity theft, and promote the legal enforceability of all electronic agreements
and transactions. The risks of doing businesses with unauthorized or incorrectly an identified persons in an Internet
banking environment have result in financial loss and also reputation damage through fraud, disclosure of customers
information, corruption of data, or an unenforceable agreements. There are variety of technologies and methodology
financial institution can use to authenticate customers. This project reviews techniques that use location as authenti-
cation factor, and makes recommendation that how location can be use to enhance the security of a banking using
smart phone application requiring robust client authentication and lastly how secret key using an AES algorithm
ensure securing fund transaction. This shall encourage financial or ecommerce application providers to offer more
services via Smartphone application to their clients.
II. TERMS AND DEFINITION
Authentication is the act conforming the truth of an attribute of a single piece of data or entity. In contrast with iden-
tification which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing’s
identity, authentication is the process of actually conforming that identity of a person by validating their identity
document and verifying the validity of website with a digital certificate, tracing the age of the artifact by carbon dat-
International Journal of Latest Trends in Engineering and Technology (IJLTET)
Vol. 5 Issue 2 March 2015 90 ISSN: 2278-621X
ing or ensuring that product is what is packaging and labeling claim to be. In other words, authentication often in-
volve verifying the validity of at last one form of identification
Authorization or authorisation is the function of specifying access rights to resources related to the information
security and computer security in general. More formally, "to authorize" is to define an access policy. For exam-
ple, human resources staff is normally authorize to access employee records and this policy is usually formalized as
an access control rules in the computer system. During the operation, a system uses the access control rules to decide
whether access requests from (authenticated) consumers shall be approved or disapproved . Resources include indi-
vidual files or item's data, computer programs, computer devices and functionality provided by computer applica-
tions. Examples of consumers are computer users, computer programs and other devices on the computer.
The International Mobile Station Equipments Identity or IMEI is a number, usually unique, to iden-
tify 3GPP (i.e., GSM, UMTS and LTE) and iDEN mobile phones, and also some satellite phones. It is an usually
found printed inside the battery compartment of the phones, but can also be displayed on-screen on most of the
phones by entering *#06#on the display, or alongside other system information in the settings menu
on Smartphone operating systems.The IMEI number is use by a GSM network to identify valid devices and there-
fore can be used for stopping a stolen phone from accessing that network. For example, if a mobile phone is stolen,
the owner can call his network provider and instruct them to "blacklist" the phone using its IMEI number. This ren-
ders the phone useless on that network and sometime other networks too, whether or not the phone's SIM is
changed. The IMEI is only used for identifying the device and has no permanent or semi-permanent relation to the
subscriber. Instead, the subscriber is identified by transmission of anIMSI number, which is stored on a SIM
card that can (in theory) be transferred to any handset. However, many network and security features are enabled by
knowing the current device being used by a subscriber.
The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time
information in an all weather conditions, anywhere on or near to the Earth where there is unobstructed line of sight
to four or more GPS satellites .The system provides critical capabilities to military, civil, and commercial users
which are around the world. The United States government has created the system, which maintains it, and makes it
freely accessible to anyone with the GPS receiver.
In the cryptography, encryption is a process of encoding the messages or information in such a way that only the
authorized parties can read it[1]. Encryption does not of itself prevent the interception, but denies the message con-
tent to interceptor[2]. In encryption scheme, the message or the information, referred to as plaintext, is encrypted
using encryption algorithm, generates cipher text that can only be read if decrypted[3].
For the technical reasons,
encryption scheme usually uses a pseudo-random encryption key generated by the algorithm. It is in principle possi-
ble to decrypt message without possessing the key, but for well-designed encryption scheme, large computational
resources and skill are required. An authorized recipient can easily decrypt the message with a key provided by the
originator to recipients, but not to unauthorized interceptors.
A. LITERATURE SURVEY
B. NEED
Today’s information systems requires an explicit identification between communicating entities (often the entities
are users). Process of entity identification is in general called the authentication. The authentication is defined as
affirmation of an identity of certain object in centralized system. Authentication techniques are commonly classified
into three groups as [4]
o User has something - techniques uses RFID (Radio Frequency Identification Device), hardware keys, etc.;
o User knows something - this group is based on knowledge of the confidential information, for example
password authentication;
o User is someone - biometric techniques that are limited to the human authentication
Nowadays, many projects which discuss using of user’s location as a new factor of authentication. The Location
based authentication can be useful in many cases. The advantages of location-based authentication are present. The
first place of a usage can be found in the hospital sector. A doctor shouldn’t handle with patients’ privacy
information out of the hospital’s border. Another example of location-based authentication we can find in the
financial branch. If the user (account owner) would like to operate on his account, it should prove his location at the
first. If a user is at home or in the bank office, he will get the access. If he is on another position, he won’t get the
access to his bank account. In general, the location-based authentication techniques can be used also for SSO
(Single Sign On) [5], but the techniques proposed in this system principally assumes simply authentication (one
identity per user).
Here in this system, we propose a new location-based authentication technique.Our system provides
high level security by adding GPS location along with the user credentials i.e. username and password whereas other
International Journal of Latest Trends in Engineering and Technology (IJLTET)
Vol. 5 Issue 2 March 2015 91 ISSN: 2278-621X
systems only provide user credentials i.e. username and password. Our system checks GPS location on timely basis
to secure data from unauthorized access and it uses self destructing keys, which expires after some time make this
system more secure. Personal data were stored in the private cloud may containing account numbers, passwords,
notes, and also other important information that could be used and misused by any competitor. These data are being
cached, or copied, and archived by the Cloud Service Providers (CSPs), more often without users’ authorization and
control.The Self-destructing data mainly aims to protect the user data’s privacy. All the data and their copies
become destructive or unreadable after any user-specified time, without any user intervention. Morever, the
decryption key is being destructed after the user-specified time. In our system, we present SeDas, a system that
meets our challenge through a novel integration of cryptographic techniques with a active storage techniques based
on T10 OSD standard (i.e. Object-based storage devices standard). According to the statistics, around 80 percent of
the population of India uses cell phones and now a days maximum of them use smart phones . It would be very
handy if people can carry on their thinking being able to perform banking on their cell phone is not sufficient. The
transaction need to be secure our project specifically dealing with securing the online mobile transactions by using
the self destructing key which implies in some time and then thereby providing stronger encryption and further using
location as a major factor for generating the key.
C. EXISTING SYSTEM
Existing system do not provide high level security.They are only providing user credentials i.e. username and
password.Existing systems do not have any GPS location priviledges.They do not secure the data from unauthorized
access, and easily cracked by any hackers.They do not have uses self destructing keys.On the other hand,Our
system provides high level security by adding GPS location along with user credentials, i.e. username and password.
Our system checks GPS location on timely basis to secure the data from unauthorized access, and it uses self
destructing keys, which expires after some time making this system more secure.
II. SYSTEM ARCHITECTURE
Smart phones are increasingly used, to perform the Mobile Banking applications whilst on the move. Current
techniques are used to remotely authenticate the client to the service provider in an Mobile Banking application
which is based on ”static” authentication factors like passwords or tokens. The fact that the client is on the move,
while using these M-Commerce applications is not considered or used for enhancing the authentication security.
This system is concerned with including client’s geographical location, is an important authentication factor to
enhance security of the M-Commerce applications, especially those requiring robust client authentication. Further
more the system secure the Banking Funds transaction online using the Self Destructive Data Crypto system. The
SeDas system mainly uses shamir’s algorithm to provide a strong security for transfer funds online with a self
destruct key mechanism that destroys that key after a specific time interval to avoid misuse of the private data over
the server. Location-based authentication is the new direction for the development of authentication techniques.
Authentication and authorization are two of the most important security features for mobile transaction systems. We
Uses space Time Authentication Technique that uses GPS system for a position determination of the person.
Most commonly, these schemes depend on basic three factors: what you know (secret), what you have (token), and
what you are (biometrics). Here, we use SeDas System with the basis of Shamir’s Algorithm for Secure Fund
Transaction. It describes the architecture of our proposed system protocol including three parts: location registration,
authentication and authorization and location verification etc.
International Journal of Latest Trends in Engineering and Technology (IJLTET)
Vol. 5 Issue 2 March 2015 92 ISSN: 2278-621X
Fig 1: Overall architecture of the system.
IV. INTERFACES
A. Hardwaer Interface
Mobile Device:- The external hardware interface will support the mobile devices, such as smart phones. Any devive
that support GPS
External Storages:- The product will support the transparent connections with an external hard drives in order to
support automatic archiving capability.
B. Software Interface
Operating System:- The product will work with mainly Android 2.1 and above.
V. CONCLUSION
The system described in this paper which uses location as an authentication factor will be next step in securing
banking transactions.The next secutiry level can be achieved by using IMEI no as a factor along with the location.
So the online banking is a rapid growing field and the no of internet users are increasing rapidly.Thew number of
attacks on current system is increasing day by day and this system will be helpful in reducing those threats in future.
REFERENCES
[1] Dax, J. "Publikationen." To appear in Distributed User Interfaces: Collaboration and Usability. Springer 2014 (2013).
[2] Kuseler, Torben, and Ihsan Alshahib Lami. "Using geographical location as an authentication factor to enhance mCommerce applications on
smartphones."International Journal of Computer Science and Security (IJCSS) 6.4 (2012): 277-287.
[3] Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612-613.
[4] D. Qiu, “Security Analysis of Geoencryption: A Case Study using Loran”,Proceeding of ION GNSS 2007.
[5] Denning, D. and Macdoran, P., “ Location-based Authentication: Grounding Cyberspace for better Security”, Computer Fraud Security,
1996(2), pp.12-16.
[6] Jansen, W. Korolev, V, “ A Location-Based Mechanism for Mobile Device Security”, in WRI World Congress on Computer Science and
Information Engineering, Los Angeles, California USA, pp. 99-104, 2009. http://csrc.nist.gov/publications/articles/articles_2009.html
[7] D. Denning and P. MacDoran, “ Location-Based Authentication: Grounding Cyperspace for Better Security.” In Computer Fraud and
Security Bulletin, Feb. 1996.
[8] I.G.T. Ferreres, B.R. Alvarez, and A.R. Garnacho, “ Guaranteeing the authenticity of location information.” In IEEE Pervasive Computing,
pp. 72-80, 2008. https://scholar.google.co.in/citations?user=ZyAk4EoAAAAJ&hl=en
[9] G. Yan and S. Olariu, “ An efficient geographic location-based security mechanism for vehicular adhoc networks.” In IEEE 6th International
Conference on Mobile Adhoc and Sensor Systems, MASS’09, 2009, pp. 804-809.
[10] Hsieh, Wen-Bin, and Jenq-Shiou Leu. "Design of a time and location based One-Time Password authentication scheme.". Wireless
Communications and Mobile Computing Conference (IWCMC), 2011 7th International. IEEE, 2011.
International Journal of Latest Trends in Engineering and Technology (IJLTET)
Vol. 5 Issue 2 March 2015 93 ISSN: 2278-621X

More Related Content

PDF
Two aspect authentication system using secure
PDF
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
PDF
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
PDF
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
PDF
A011140104
PDF
Two aspect authentication system using secure mobile
PDF
A secure communication in smart phones using two factor authentications
PDF
120 i143
Two aspect authentication system using secure
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
A011140104
Two aspect authentication system using secure mobile
A secure communication in smart phones using two factor authentications
120 i143

What's hot (16)

PDF
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
PDF
Authentication Systems in Internet of Things
PDF
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
PDF
Secure Code Generation for Multi-level Mutual Authentication
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
ipas implicit password authentication system ieee 2011
PDF
Sms based otp
PDF
An Overview on Authentication Approaches and Their Usability in Conjunction w...
PDF
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
PDF
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
PPTX
Ssp fraud risk vulnerablity in ebanking
PDF
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
PDF
Managing & Securing the Online and Mobile banking - Chew Chee Seng
PDF
Two Factor Authentication Using Smartphone Generated One Time Password
PDF
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
PDF
A Cancelable Biometric Based Security Protocol for Online Banking System
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Authentication Systems in Internet of Things
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
Secure Code Generation for Multi-level Mutual Authentication
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
ipas implicit password authentication system ieee 2011
Sms based otp
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
Ssp fraud risk vulnerablity in ebanking
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Two Factor Authentication Using Smartphone Generated One Time Password
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
A Cancelable Biometric Based Security Protocol for Online Banking System
Ad

Viewers also liked (15)

PDF
Rsmart Corporate Overview_LinkedIn
DOC
Sunshine consulting mopuru babu cv_java_j2_ee_spring_bigdata_scala_Spark
PPTX
дом а. п. чехова
PPT
Video surveillance
RTF
Vita actualized March 10th 2015 GPC
PPTX
Jhon mauricio santacruz
PDF
SD5001_1516_15117003G
PPTX
Arterias
DOC
Sunshine consulting Mopuru Babu CV_Java_J2ee_Spring_Bigdata_Scala_Spark
DOCX
Online assignment anjana rk
PPTX
Perfil biográfico de jean piaget
PPTX
Starbucks Buyer Persona
PPTX
A review of Best Practices in Vascular Access and Infusion Therapy presentati...
DOCX
Innovative lessonplan
DOCX
Sunshine consulting mopuru babu cv_java_j2ee_spring_bigdata_scala
Rsmart Corporate Overview_LinkedIn
Sunshine consulting mopuru babu cv_java_j2_ee_spring_bigdata_scala_Spark
дом а. п. чехова
Video surveillance
Vita actualized March 10th 2015 GPC
Jhon mauricio santacruz
SD5001_1516_15117003G
Arterias
Sunshine consulting Mopuru Babu CV_Java_J2ee_Spring_Bigdata_Scala_Spark
Online assignment anjana rk
Perfil biográfico de jean piaget
Starbucks Buyer Persona
A review of Best Practices in Vascular Access and Infusion Therapy presentati...
Innovative lessonplan
Sunshine consulting mopuru babu cv_java_j2ee_spring_bigdata_scala
Ad

Similar to 13_2 (20)

PDF
Strong Authentication (Michal Sobiegraj)
PPTX
Jan Keil - Identity and access management Facts. Challenges. Solution
PDF
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
PDF
5.[25 33]survey on 2-step security for authentication in m-banking
PPTX
Authentifusion: Clarifying the Future of Customer Authentication
PDF
Location based authentication new words approch secuirity
PPT
Authentication Technologies
PPT
Authentication technologies
PDF
SmartCard Forum 2011 - Evolution of authentication market
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
Wisekey italia presentation 2012
DOCX
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
PPT
Authenticationtechnologies 120711134100-phpapp01
PDF
CISSP Domain 05 Identity and Access Management (IAM).pdf
PPT
1 security goals
PDF
Australian Payments Network - Digital Identity
PDF
UNIT 2 Information Security Sharad Institute
PPT
Electronic authentication more than just a password
Strong Authentication (Michal Sobiegraj)
Jan Keil - Identity and access management Facts. Challenges. Solution
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
5.[25 33]survey on 2-step security for authentication in m-banking
Authentifusion: Clarifying the Future of Customer Authentication
Location based authentication new words approch secuirity
Authentication Technologies
Authentication technologies
SmartCard Forum 2011 - Evolution of authentication market
Stronger/Multi-factor Authentication for Enterprise Applications
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Wisekey italia presentation 2012
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Authenticationtechnologies 120711134100-phpapp01
CISSP Domain 05 Identity and Access Management (IAM).pdf
1 security goals
Australian Payments Network - Digital Identity
UNIT 2 Information Security Sharad Institute
Electronic authentication more than just a password

13_2

  • 1. Location Based Authentication For E-Banking Rohit Joshi Department of Information Technology MET’s IOE Bhujbal Knowledge City, Nashik, Maharashtra,India Prince Gupta Department of Information Technology MET’s IOE Bhujbal Knowledge City, Nashik, Maharashtra,India Mahendra Hinde Department of Information Technology MET’s IOE Bhujbal Knowledge City, Nashik, Maharashtra,India Abstract- This paper reviews techniques that use location as an authentication factor, and make recommendations how location can be used for enhancing the security of banking using smartphone applications which require robust client authentication, and lastly how a secret key using algorithms will ensure in securing fund transaction. Authentication is one of the three main processes Authentication, Authorization , Accounting. Keywords – Dataprivacy,authentication,mobile,authorization,location. I. INTRODUCTION The smart phones are becoming a major part in everybody’s daily life. And all kinds of activities, including banking or financial mCommerce transactions (e.g. online shopping), nowadays are performing online via Smartphone applications whilst at the move. Approximately 50% of all Smartphone owners in the U.S. are using their Smartphone for banking transactions during the first quarter of 2011. There is an increase of nearly 100% compared to the year before now . However, many of the techniques used to authenticate the authorized client towards the remote authenticator (i.e. the bank is offering a financial services) in these mCommerce applications still based upon classic (i.e. static) authentication factors like passwords, biometrics, or tokens,etc. The fact is that the client while on the move, whilst using these mCommerce applications is not considered or used to enhance the authentication security. Reliable client authentication and the data protection are still major concerns for mCommerce application providers because a classical authentication factors are open for hackers. As a result, mCommerce application providers restrict access, on average, to 30% of possible services to their clients via the Smartphone applications. Any financial institutions engaging in any form of Internet banking using smart phones necessarily have effective and reliable methods for authenticating customers. An effective authentication system is required for compliance with requirements for safeguarding customer information, for preventing money laundering and terrorist financing, and to reduce fraud, for inhibiting identity theft, and promote the legal enforceability of all electronic agreements and transactions. The risks of doing businesses with unauthorized or incorrectly an identified persons in an Internet banking environment have result in financial loss and also reputation damage through fraud, disclosure of customers information, corruption of data, or an unenforceable agreements. There are variety of technologies and methodology financial institution can use to authenticate customers. This project reviews techniques that use location as authenti- cation factor, and makes recommendation that how location can be use to enhance the security of a banking using smart phone application requiring robust client authentication and lastly how secret key using an AES algorithm ensure securing fund transaction. This shall encourage financial or ecommerce application providers to offer more services via Smartphone application to their clients. II. TERMS AND DEFINITION Authentication is the act conforming the truth of an attribute of a single piece of data or entity. In contrast with iden- tification which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing’s identity, authentication is the process of actually conforming that identity of a person by validating their identity document and verifying the validity of website with a digital certificate, tracing the age of the artifact by carbon dat- International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 5 Issue 2 March 2015 90 ISSN: 2278-621X
  • 2. ing or ensuring that product is what is packaging and labeling claim to be. In other words, authentication often in- volve verifying the validity of at last one form of identification Authorization or authorisation is the function of specifying access rights to resources related to the information security and computer security in general. More formally, "to authorize" is to define an access policy. For exam- ple, human resources staff is normally authorize to access employee records and this policy is usually formalized as an access control rules in the computer system. During the operation, a system uses the access control rules to decide whether access requests from (authenticated) consumers shall be approved or disapproved . Resources include indi- vidual files or item's data, computer programs, computer devices and functionality provided by computer applica- tions. Examples of consumers are computer users, computer programs and other devices on the computer. The International Mobile Station Equipments Identity or IMEI is a number, usually unique, to iden- tify 3GPP (i.e., GSM, UMTS and LTE) and iDEN mobile phones, and also some satellite phones. It is an usually found printed inside the battery compartment of the phones, but can also be displayed on-screen on most of the phones by entering *#06#on the display, or alongside other system information in the settings menu on Smartphone operating systems.The IMEI number is use by a GSM network to identify valid devices and there- fore can be used for stopping a stolen phone from accessing that network. For example, if a mobile phone is stolen, the owner can call his network provider and instruct them to "blacklist" the phone using its IMEI number. This ren- ders the phone useless on that network and sometime other networks too, whether or not the phone's SIM is changed. The IMEI is only used for identifying the device and has no permanent or semi-permanent relation to the subscriber. Instead, the subscriber is identified by transmission of anIMSI number, which is stored on a SIM card that can (in theory) be transferred to any handset. However, many network and security features are enabled by knowing the current device being used by a subscriber. The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in an all weather conditions, anywhere on or near to the Earth where there is unobstructed line of sight to four or more GPS satellites .The system provides critical capabilities to military, civil, and commercial users which are around the world. The United States government has created the system, which maintains it, and makes it freely accessible to anyone with the GPS receiver. In the cryptography, encryption is a process of encoding the messages or information in such a way that only the authorized parties can read it[1]. Encryption does not of itself prevent the interception, but denies the message con- tent to interceptor[2]. In encryption scheme, the message or the information, referred to as plaintext, is encrypted using encryption algorithm, generates cipher text that can only be read if decrypted[3]. For the technical reasons, encryption scheme usually uses a pseudo-random encryption key generated by the algorithm. It is in principle possi- ble to decrypt message without possessing the key, but for well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with a key provided by the originator to recipients, but not to unauthorized interceptors. A. LITERATURE SURVEY B. NEED Today’s information systems requires an explicit identification between communicating entities (often the entities are users). Process of entity identification is in general called the authentication. The authentication is defined as affirmation of an identity of certain object in centralized system. Authentication techniques are commonly classified into three groups as [4] o User has something - techniques uses RFID (Radio Frequency Identification Device), hardware keys, etc.; o User knows something - this group is based on knowledge of the confidential information, for example password authentication; o User is someone - biometric techniques that are limited to the human authentication Nowadays, many projects which discuss using of user’s location as a new factor of authentication. The Location based authentication can be useful in many cases. The advantages of location-based authentication are present. The first place of a usage can be found in the hospital sector. A doctor shouldn’t handle with patients’ privacy information out of the hospital’s border. Another example of location-based authentication we can find in the financial branch. If the user (account owner) would like to operate on his account, it should prove his location at the first. If a user is at home or in the bank office, he will get the access. If he is on another position, he won’t get the access to his bank account. In general, the location-based authentication techniques can be used also for SSO (Single Sign On) [5], but the techniques proposed in this system principally assumes simply authentication (one identity per user). Here in this system, we propose a new location-based authentication technique.Our system provides high level security by adding GPS location along with the user credentials i.e. username and password whereas other International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 5 Issue 2 March 2015 91 ISSN: 2278-621X
  • 3. systems only provide user credentials i.e. username and password. Our system checks GPS location on timely basis to secure data from unauthorized access and it uses self destructing keys, which expires after some time make this system more secure. Personal data were stored in the private cloud may containing account numbers, passwords, notes, and also other important information that could be used and misused by any competitor. These data are being cached, or copied, and archived by the Cloud Service Providers (CSPs), more often without users’ authorization and control.The Self-destructing data mainly aims to protect the user data’s privacy. All the data and their copies become destructive or unreadable after any user-specified time, without any user intervention. Morever, the decryption key is being destructed after the user-specified time. In our system, we present SeDas, a system that meets our challenge through a novel integration of cryptographic techniques with a active storage techniques based on T10 OSD standard (i.e. Object-based storage devices standard). According to the statistics, around 80 percent of the population of India uses cell phones and now a days maximum of them use smart phones . It would be very handy if people can carry on their thinking being able to perform banking on their cell phone is not sufficient. The transaction need to be secure our project specifically dealing with securing the online mobile transactions by using the self destructing key which implies in some time and then thereby providing stronger encryption and further using location as a major factor for generating the key. C. EXISTING SYSTEM Existing system do not provide high level security.They are only providing user credentials i.e. username and password.Existing systems do not have any GPS location priviledges.They do not secure the data from unauthorized access, and easily cracked by any hackers.They do not have uses self destructing keys.On the other hand,Our system provides high level security by adding GPS location along with user credentials, i.e. username and password. Our system checks GPS location on timely basis to secure the data from unauthorized access, and it uses self destructing keys, which expires after some time making this system more secure. II. SYSTEM ARCHITECTURE Smart phones are increasingly used, to perform the Mobile Banking applications whilst on the move. Current techniques are used to remotely authenticate the client to the service provider in an Mobile Banking application which is based on ”static” authentication factors like passwords or tokens. The fact that the client is on the move, while using these M-Commerce applications is not considered or used for enhancing the authentication security. This system is concerned with including client’s geographical location, is an important authentication factor to enhance security of the M-Commerce applications, especially those requiring robust client authentication. Further more the system secure the Banking Funds transaction online using the Self Destructive Data Crypto system. The SeDas system mainly uses shamir’s algorithm to provide a strong security for transfer funds online with a self destruct key mechanism that destroys that key after a specific time interval to avoid misuse of the private data over the server. Location-based authentication is the new direction for the development of authentication techniques. Authentication and authorization are two of the most important security features for mobile transaction systems. We Uses space Time Authentication Technique that uses GPS system for a position determination of the person. Most commonly, these schemes depend on basic three factors: what you know (secret), what you have (token), and what you are (biometrics). Here, we use SeDas System with the basis of Shamir’s Algorithm for Secure Fund Transaction. It describes the architecture of our proposed system protocol including three parts: location registration, authentication and authorization and location verification etc. International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 5 Issue 2 March 2015 92 ISSN: 2278-621X
  • 4. Fig 1: Overall architecture of the system. IV. INTERFACES A. Hardwaer Interface Mobile Device:- The external hardware interface will support the mobile devices, such as smart phones. Any devive that support GPS External Storages:- The product will support the transparent connections with an external hard drives in order to support automatic archiving capability. B. Software Interface Operating System:- The product will work with mainly Android 2.1 and above. V. CONCLUSION The system described in this paper which uses location as an authentication factor will be next step in securing banking transactions.The next secutiry level can be achieved by using IMEI no as a factor along with the location. So the online banking is a rapid growing field and the no of internet users are increasing rapidly.Thew number of attacks on current system is increasing day by day and this system will be helpful in reducing those threats in future. REFERENCES [1] Dax, J. "Publikationen." To appear in Distributed User Interfaces: Collaboration and Usability. Springer 2014 (2013). [2] Kuseler, Torben, and Ihsan Alshahib Lami. "Using geographical location as an authentication factor to enhance mCommerce applications on smartphones."International Journal of Computer Science and Security (IJCSS) 6.4 (2012): 277-287. [3] Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612-613. [4] D. Qiu, “Security Analysis of Geoencryption: A Case Study using Loran”,Proceeding of ION GNSS 2007. [5] Denning, D. and Macdoran, P., “ Location-based Authentication: Grounding Cyberspace for better Security”, Computer Fraud Security, 1996(2), pp.12-16. [6] Jansen, W. Korolev, V, “ A Location-Based Mechanism for Mobile Device Security”, in WRI World Congress on Computer Science and Information Engineering, Los Angeles, California USA, pp. 99-104, 2009. http://csrc.nist.gov/publications/articles/articles_2009.html [7] D. Denning and P. MacDoran, “ Location-Based Authentication: Grounding Cyperspace for Better Security.” In Computer Fraud and Security Bulletin, Feb. 1996. [8] I.G.T. Ferreres, B.R. Alvarez, and A.R. Garnacho, “ Guaranteeing the authenticity of location information.” In IEEE Pervasive Computing, pp. 72-80, 2008. https://scholar.google.co.in/citations?user=ZyAk4EoAAAAJ&hl=en [9] G. Yan and S. Olariu, “ An efficient geographic location-based security mechanism for vehicular adhoc networks.” In IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS’09, 2009, pp. 804-809. [10] Hsieh, Wen-Bin, and Jenq-Shiou Leu. "Design of a time and location based One-Time Password authentication scheme.". Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International. IEEE, 2011. International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 5 Issue 2 March 2015 93 ISSN: 2278-621X