Back to Search
Start Over
Efficient Mobile Security for E Health Care Application in Cloud for Secure Payment Using Key Distribution.
- Source :
- Neural Processing Letters; Feb2023, Vol. 55 Issue 1, p141-152, 12p
- Publication Year :
- 2023
-
Abstract
- Through the growing attractiveness of the financial world, the e health care application has developed quicker than the previous period, such that mobile payment adore extraordinary fame and are occupying an ever-growing business. This is especially factual of mobile expenditures, which are interesting growing attention. Though, the occasion of various old-style financial misfortunes has visible the tasks in-built in virtual verification technology that is based on old-style methods of understanding the strong and steady growth of payment via mobile. In count, this technology guarantees data user account safety and confidentiality. In this paper, we propose a Secure Authentication Protocol (SAP) payment via mobile. To assurance trustworthy service, we use cryptographic techniques for attaining common authentication among the server as well as client, which can attack forged servers and fake workstations. Related to the styles presently used, the proposed method supports the safety of data user account data as well as distinct privacy during the payment business progression via mobile. To concurrently attain safety sturdiness and continue the practice suitability of payments via mobile within unconfident public communiqué systems is a critical matter for smart mobile device producers in addition to mobile data users. In this paper, we present a secure business method with key distribution cryptographic techniques for payments via mobile for the e health care application. The proposed method takes benefit of the advantages of payment using android and a refined key distribution cryptosystem to concurrently provide e health care business safety and attain payment efficiency in day to day life. With a properly defined challenger prototype and safety analysis, the proposed method is confirmed to be mutually correct and safe by using the key distribution method. It delivers robust business healthiness and communiqué safety to mobile data users for the duration of virtual payment dealings. Alternatively, the performance analysis demonstrations that our proposed transaction method has a low computation cost when compared to the previous papers. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 13704621
- Volume :
- 55
- Issue :
- 1
- Database :
- Complementary Index
- Journal :
- Neural Processing Letters
- Publication Type :
- Academic Journal
- Accession number :
- 162258938
- Full Text :
- https://doi.org/10.1007/s11063-021-10482-1