A Tokenization System to Secure Critical Data

  • Authors

    • Chetana Pujari
    • Balachandra Muniyal
    • Aishwarya Kulkarni
    2018-12-19
    https://doi.org/10.14419/ijet.v7i4.41.24509
  • POS, token, cryptography, security, critical data, cipher, AES
  • One of the recent developments in India is a major shift from cash to cashless transaction which is going to bring in drastic change in the world of e-commerce. As transaction is a crucial task, the need for security is the prominent factor to consider. The proposed work aims to revise AES and develop a secure system based on tokenization.This method ensures no relation between actual credit card data and the token generated for it, so all the applications will be dealing with token but not the actual data. In tokenization there is no need to store token and corresponding data in a database instead a standard random value table is used to generate token, which reduces the overhead of storing tokens and ensures reduction in security audit.

     


     
  • References

    1. [1] Niteen Surv, Balu Wanve, Rahul Kamble, Sachin Patil, Jayshree Katti (2015), “Framework for client side AES encryption technique in cloud computingâ€, 2015 IEEE International Advance Computing Conference (IACC).

      [2] Fang Rao, Jian Jun Tan, “Energy consumption research of AES encryption algorithm in ZIGBEEâ€, International Conference on Cyberspace Technology 2014, IET, Bejing China.

      [3] Jun Shu, Yiwen Wang, Wenchang Li, Zhiyong Gan (2010), “Realization of a resource sharing fast encryption and decryption AES algorithmâ€, 2010 International Symposium on Intelligent Signal Processing and Communication Systems December 6-8,2010.

      [4] “By 2025, digital transactions in India could be worth $1 trillion a yearâ€,Available:https://economictimes.indiatimes.com/industry/banking/finance/banking/by-2025-digital-transactions-in-india-could-be-worth-1-trn-a-year/articleshow/63284898.cms, March 13, 2018.

      [5] "Encryption as a Service (EaaS) as a Solution for Cryptography in Cloud", The 4th International Conference on Electrical Engineering and Informatics, 2013.

      [6] Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram and Keith Mayes, “Extending EMV Tokenised Payments To Offline-Environmentsâ€, 2016 IEEE TrustCom-BigDataSE-ISPA.

      [7] Shreya Paul, Atma Prakash Singh and Shafeeq Ahmad, “Tokenization Based Service Model for Cloud Computing Environmentâ€, 2016 International Conference on Inventive Computation Technologies.

      [8] Ram Kumar Garg, NK Garg, “Developing Secured Biometric Payments Model Using Tokenizationâ€, 2015 International Conference on Soft Computing Techniques and Implementations, India.

      [9] Noor Ashitah Abu Othman, Fakariah Hani Mohd Ali and Mashyum Binti Mohd Noh, “Secured Web Application Using Combination of Query Tokenization and Adaptive Method in Preventing SQL Injection Attacksâ€, 2014 IEEE 2014 International Conference on Computer, Communication, and Control Technology, Malaysia.

      [10] Sandra D´ıaz-Santiago, Lil Maria Rodriguez-Henriquez and Debrup Chakraborty, “A Cryptographic Study of Tokenization Systemsâ€, International Journal of Information Security 2016.

      [11] PCI Security Standards Council: Payment Card Industry Data Security Standard Version 1.2 (2008). https://www. pcisecuritystandards.org/security_standards/pci_dss.shtml

  • Downloads

  • How to Cite

    Pujari, C., Muniyal, B., & Kulkarni, A. (2018). A Tokenization System to Secure Critical Data. International Journal of Engineering & Technology, 7(4.41), 126-128. https://doi.org/10.14419/ijet.v7i4.41.24509