International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 109

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


A Secure Mobile Bill Payment (MOBILL) Service for M-Commerce

Pavuluri Gnana Ramakrishna, M. Chandra Naik


Abstract: Instead of paying by cash, check, or credit cards, consumers can also use their mobile devices to pay for a wide range of services and digital or material goods. However, consumers security concerns are a major barrier to broad adoption and use of mobile payments. In this paper, we design a secure operational model for mobile payment in which access control is based on service-oriented architecture. A consumer uses his/her mobile device to get authorization from cloud and generate a QR code as the payment certificate.


Keywords: Mobile Payment, Web Services, Cloud Security


Edition: Volume 3 Issue 9, September 2014,


Pages: 2234 - 2237


How to Cite this Article?

Pavuluri Gnana Ramakrishna, M. Chandra Naik, "A Secure Mobile Bill Payment (MOBILL) Service for M-Commerce", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=26091402, Volume 3 Issue 9, September 2014, 2234 - 2237

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Mobile Payment'

Downloads: 118

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 2100 - 2103

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

Anjaly Raj, Vidya N

Share this Article

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 428 - 431

A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics

Pawandeep Singh Aujla, Harneet Arora

Share this Article

Similar Articles with Keyword 'Web Services'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1886 - 1890

A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement

Shuchi Gupta, Prof. Praveen Bhanodia

Share this Article

Similar Articles with Keyword 'Cloud Security'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Similar Articles with Keyword 'Mobile'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Payment'

Downloads: 110

Case Studies, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 530 - 534

Cybercrime in Credit Card Systems: Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman

Share this Article

Downloads: 111

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2336 - 2339

Online Payment System using BPCS Steganography and Visual Cryptography

S. R. Khonde, Dheeraj Agarwal, Shrinivas Deshmukh

Share this Article

Similar Articles with Keyword 'Web'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Services'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article
Top