An accountability model for Internet transactions

Internet transaction is increasing significantly due to very fast grown of mobile devices, electronic commerce, and electronic records. Many researchers proposed several protocols to analyze the accountability in Internet transaction. In this paper we propose accountability model and protocol in Internet transaction that have advantages over existing protocols and satisfies essential security properties: Confidentiality, Integrity, Authorization, Authentication, Non-repudiation, Liability and Responsiveness. The protocol is designed using asymmetric cryptography and hash function to ensure that it meets all above accountability properties. The proposed protocol is also analyzed and compared with existing accountability protocols.

[1]  Yan Wang,et al.  A Disclosure Framework for Service Accountability in SOA , 2008, 2008 IEEE International Conference on e-Business Engineering.

[2]  Leau Yu Beng,et al.  Privacy in New Mobile Payment Protocol , 2008 .

[3]  Rajashekar Kailar,et al.  Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..

[4]  Bala Srinivasan,et al.  Lightweight Mobile Credit-Card Payment Protocol , 2003, INDOCRYPT.

[5]  Kenneth G. Paterson,et al.  Concurrent Signatures , 2004, EUROCRYPT.

[6]  He Dake,et al.  Accountability of Perfect Concurrent Signature , 2008, 2008 International Conference on Computer and Electrical Engineering.

[7]  Leau Yu Beng,et al.  A lightweight and private mobile payment protocol by using mobile network operator , 2008, 2008 International Conference on Computer and Communication Engineering.

[8]  Bo Meng,et al.  The practical detailed requirements of accountability and its application in the electronic payment protocols , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[9]  Arti Trivedi,et al.  A Study of Literature Review on Individual Accountability , 2013 .

[10]  Supakorn Kungpisdan,et al.  Practical Reasoning about Accountability in Electronic Commerce Protocols , 2001, ICISC.

[11]  Bala Srinivasan,et al.  Accountability logic for mobile payment protocols , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[12]  Jianying Zhou,et al.  An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..

[13]  M. Bovens Two Concepts of Accountability: Accountability as a Virtue and as a Mechanism , 2010 .

[14]  Yi Mu,et al.  Perfect Concurrent Signature Schemes , 2004, ICICS.

[15]  Heike Neumann,et al.  A Sound Logic for Analysing Electronic Commerce Protocols , 1998, ESORICS.

[16]  Leau Yu Beng,et al.  Accountability Analysis of Mobile Payment Protocol , 2022 .

[17]  Christopher J. Pavlovski,et al.  Towards Accountable Enterprise Mashup Services , 2007 .

[18]  Yan Wang,et al.  Accountability Computing for E-society , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[19]  N. Asokan,et al.  Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.

[20]  Ana Ferreira,et al.  Towards accountability for Electronic Patient Records , 2003, 16th IEEE Symposium Computer-Based Medical Systems, 2003. Proceedings..

[21]  Jianying Zhou,et al.  The Fairness of Perfect Concurrent Signatures , 2006, ICICS.

[22]  Deqing Zou,et al.  A Hidden Credential Based Oblivious Automated Trust Negotiation Model , 2007 .

[23]  Supakorn Kungpisdan Accountability in centralized payment environments , 2009, 2009 9th International Symposium on Communications and Information Technology.