Mobile payments in global markets using biometrics and cloud

Mathematics, Engineering and Computer Science Department, LaGuardia Community College, CUNY, LongIsland City, 11101, NY, USA Computer Science Department, California State Polytechnic University, Pomona, 91768, CA, USA Nanjing University, Nanjing, China Correspondence Praveenkumar Khethavath, Mathematics, Engineering and Computer Science Department, LaGuardia Community College, CUNY, LongIsland City, NY 11101, USA. Email: pkhethavath@lagcc.cuny.edu Summary Payment methods using mobile devices instead of using traditional methods (cash, credit card, etc) has been gaining popularity all over the world. The ubiquitous nature of smartphones and tablets has widened the ambit for using these devices for payments and other daily life activities. Recent advancements in mobile technology along with the convenience of mobile devices made these applications possible. Despite the worldwide user adoption of mobile applications, security is the key challenge in mobile banking and payments system. Mobile payments systems need to be very efficient and provide utmost security endlessly. State-of-the-art mobile payment systems need the physical presence of a merchant agent to make a payment. In this article, we had described in detail about the design and implementation of a mobile payments application, used to make in-store purchases and make secure payments without any physical presence of a cashier or a merchant agent. We proposed a novel privacy-preserving and secure authentication algorithm to make mobile payments using biometrics. The analysis and experimental results show the reliability and efficiency of our proposed solution.

[1]  Upkar Varshney,et al.  Mobile Payments , 2002, Computer.

[2]  Suresh Sankaranarayanan,et al.  Biometric security mechanism in Mobile paymentts , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).

[3]  Stephanie Boehm M Commerce Technologies Services And Business Models , 2016 .

[4]  H. Harb,et al.  SecureSMSPay: Secure SMS Mobile Payment model , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.

[5]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[6]  Pong C. Yuen,et al.  A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.

[7]  Guangjie Han,et al.  A Multiqueue Interlacing Peak Scheduling Method Based on Tasks’ Classification in Cloud Computing , 2018, IEEE Systems Journal.

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  Deren Chen,et al.  Study of mobile payments system , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[10]  Oded Goldreich Foundations of Cryptography: Volume 1 , 2006 .

[11]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[12]  Anil K. Jain,et al.  An Introduction to Biometric Authentication Systems , 2005 .

[13]  George Ghinea,et al.  Managing NFC payment applications through cloud computing , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[14]  Chris Clifton,et al.  Privacy-Preserving Decision Trees over Vertically Partitioned Data , 2005, DBSec.

[15]  Qingkai Zeng,et al.  Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing , 2012 .

[16]  Matti Rossi,et al.  Mobile banking services , 2004, CACM.

[17]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[18]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[19]  Takahiro Hara,et al.  A Multi-Objective Optimization Scheduling Method Based on the Ant Colony Algorithm in Cloud Computing , 2015, IEEE Access.

[20]  Farouk Kamoun,et al.  A SET based approach to secure the payment in mobile commerce , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..

[21]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[22]  Bala Srinivasan,et al.  A secure account-based mobile payment protocol , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[23]  Vincenzo Piuri,et al.  Privacy-preserving fingercode authentication , 2010, MM&Sec '10.

[24]  Upkar Varshney Representative democracy and the profession , 2002 .

[25]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[26]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[27]  Sugata Sanyal,et al.  A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices , 2011, ArXiv.

[28]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..