Authenticated E- Bank System Based on RBAC Model

Abstract

Electronic banking services have become increasingly popular in line with the development of information and communications technology because of the benefits and ease it provides for both financial institutions and consumers. It facilitates access to customers' bank accounts and carries out financial operations quickly and easily without the need to visit traditional banking branches. This reduces both time and effort for the customer. However, protection and security problems are considered one of the main issues facing electronic banking services. Hacking and online fraud have put these services' security at risk. For guarantee the security of electronic financial transactions and the preservation of customer data, this calls for strengthening security and implementing security measures. However, securing reliable identity verification for the customers is one of the main problems facing e-banks.

Country : Iraq

1 Alaa J. Mohammed2 Saja J. Mohammed

  1. Department of Computer Science, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq
  2. Department of Computer Science, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq

IRJIET, Volume 8, Issue 5, May 2024 pp. 150-155

doi.org/10.47001/IRJIET/2024.805023

References

  1. Kiljan, Sven, Harald Vranken, and Marko van Eekelen. "Evaluation of transaction authentication methods for online banking." Future Generation Computer Systems 80 (2018): 430-447.
  2. Mohammed, Saja J., and Dujan B. Taha. "From cloud computing security towards homomorphic encryption: A comprehensive review." TELKOMNIKA (Telecommunication Computing Electronics and Control) 19.4 (2021): 11521161.
  3. Barkadehi, Mohammadreza Hazhirpasand, et al. "Authentication systems: A literature review and classification." Telematics and Informatics 35.5 (2018): 1491-1511.
  4. Wang, Xuerui, et al. "Attacks and defenses in user authentication systems: A survey." Journal of Network and Computer Applications 188 (2021): 103080.
  5. Alsaadi, Israa M. "Physiological biometric authentication systems, advantages, disadvantages and future development: A review." International Journal of Scientific & Technology Research 4.12 (2015): 285-289.
  6. Baig, Ahmed Fraz, and Sigurd Eskeland. "Security, privacy, and usability in continuous authentication: A survey." Sensors 21.17 (2021): 5967.
  7. Sharma, Uttam, et al. "Optimized authentication system with high security and privacy." Electronics 10.4 (2021): 458.
  8. Mathias, Craig. "Why mobile user authentication is more important than ever." (2014).
  9. Shah, Syed W., and Salil S. Kanhere. "Recent trends in user authentication–a survey." IEEE Access 7 (2019): 112505112519.
  10. Dasgupta, Dipankar, Arunava Roy, and Abhijit Nag. Advances in user authentication. Cham, Switzerland: Springer International Publishing, 2017.
  11. Mohammed, Saja J. "Using biometric watermarking for video file protection based on chaotic principle." International Journal of Computer Science and Information Security (IJCSIS) 15.12 (2017): 201-206.
  12. MOSTAFA, Ehab Younis, and Saja J. MOHAMMED. "THE LANDSCAPE OF AUTHENTICATION SYSTEMS: A COMPREHENSIVE SURVEY.", MINAR International Journal of Applied Sciences and Technology, 5 (4), 1-16.
  13. Bošnjak, Leon, J. Sreš, and Bosnjak Brumen. "Brute-force and dictionary attack on hashed real-world passwords." 2018 41st international convention on information and communication technology, electronics and microelectronics (mipro). IEEE, 2018.‏
  14. Karim, Nader Abdel, et al. "Online Banking User Authentication Methods: A Systematic Literature Review." IEEE Access (2023).‏
  15. Chaimaa, Belbergui, Elkamoun Najib, and Hilal Rachid. "E-banking overview: concepts, challenges and solutions." Wireless Personal Communications 117 (2021): 1059-1078.
  16. P. A. Aidonojie, O. O. Ikubanni, and N. Okuonghae, "The prospects, challenges, and legal issues of digital banking in Nigeria," Cogito: Multidisciplinary Res. J., vol. 14, p. 186, 2022.
  17. K. Matthews, J. Thompson, and T. Zhang, "Economics of Banking, The," World Scientific, 2023.
  18. N. Agrawal and S. Tapaswi, "A trustworthy agent-based encrypted access control method for mobile cloud computing environment," Pervasive Mobile Comput., vol. 52, pp. 13-28, Jan. 2019.
  19. R. El Sibai, et al., "A survey on access control mechanisms for cloud computing," Transactions on Emerging Telecommunications Technologies, vol. 31, no. 2, p. e3720, 2020.
  20. J. Yang, et al., "A model study on collaborative learning and exploration of RBAC roles," Wireless Communications and Mobile Computing, vol. 2021, pp. 1-9, 2021.
  21. J. Xu, et al., "Role-based access control model for cloud storage using identity-based cryptosystem," Mobile Networks and Applications, vol. 26, pp. 1475-1492, 2021.
  22. Mohammed, A. J., & Mohammed, S. J. (2024). Securing Cloud Computing Using Access Control Systems: A Comprehensive Review. ", Book series: Lecture Notes in Networks and Systems, Springer”.
  23. R. Ghazal, et al., "Intelligent role-based access control model and framework using semantic business roles in multi-domain environments," IEEE Access, vol. 8, pp. 12253-12267, 2020.
  24. A.S. Alshamsi, Z. Maamar, and M.-A. Kuhail, "Towards an approach for weaving Open Digital Rights Language into Role-Based Access Control," in Proc. 2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD), IEEE, 2023.
  25. L. Dongdong, et al., "Role-based access control in educational administration system," in MATEC Web of Conferences, vol. 139, EDP Sciences, 2017.
  26. F. Li, et al., "Customer satisfaction with bank services: The role of cloud services, security, e-learning and service quality," Technology in Society, vol. 64, p. 101487, 2021.
  27. A.A. Shaikh and H. Karjaluoto, "Mobile banking adoption: A literature review," Telematics and Informatics, vol. 32, no. 1, pp. 129-142, Feb. 2015.