Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.34Keywords:
Cloud computing, Blum Goldwasser Cryptography, Session Password, SecuredDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing is an eminent and evolving technology that offers various services such as data transaction, authentication, distribution and so on. In this article, session password Blum–Goldwasser Cryptography based user authentication (SPBGCUA) method is proposed to enhance the communication security of cloud services with minimum overhead. Moreover, SPBGCUA is a cryptographic technique that provides secured authentication mechanism for financial transaction with higher confidentiality rate. In order to fill the security lack of recent authentication techniques, this method develops dynamic security structure with key generation, encryption, authentication and decryption techniques. Finally, analysis is performed using SPBGCUA Method on factors such as authentication accuracy, data confidentiality rate and data integrity for number of financial data and cloud users.Abstract
How to Cite
Downloads
Similar Articles
- A. Anand, A. Nisha Jebaseeli, AI-driven real-time performance optimization and comparison of virtual machines and containers in cloud environments , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- P. Hepsibah Kenneth, E. George Dharma Prakash Raj, Priority based parallel processing multi user multi task scheduling algorithm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- I.Bhuvaneshwarri, M. N. Sudha, An implementation of secure storage using blockchain technology on cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- A. Anand, A. Nisha Jebaseeli, A comparative analysis of virtual machines and containers using queuing models , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Kumari Neha, Amrita ., Quantum programming: Working with IBM’S qiskit tool , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Mudassir Peeran A, A.R. Mohamed Shanavas, A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- S. Ranganathan, V. Umadevi, FDBSCAN-MBKSched: A Hybrid Edge-Cloud Clustering and Energy-Aware Federated Learning Framework with Adaptive Update Scheduling for Healthcare IoT , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- K. Gokulkannan, M. Parthiban, Jayanthi S, Manoj Kumar T, Cost effective cloud-based data storage scheme with enhanced privacy preserving principles , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
You may also start an advanced similarity search for this article.

