Accountable mobile E-commerce scheme in intelligent cloud system transactions

The vivid and rapid development of the Internet motivates cloud-based intelligent information systems to be applied. Mobile e-commerce, as a new business model based on cloud computing in intelligent service, has become the mainstream of mobile applications. It not only provides efficient computation services for both trading parties, but also gives a secure and reliable data storage center. However, privacy and accountability have become one of users’ crucial concerns in mobile e-commerce transactions. In this paper, we present a practical and efficient accountable mobile e-commerce scheme that is based on cloud platform to address the fundamental transaction requirement. We propose the concrete construction and demonstrate that the proposed scheme can provide effective security in the transaction process, and also give the practical deployment in cloud computing systems to provide the intelligent information services. We also give the performance analysis and show it is efficient and practical compared with related methods in terms of computation complexity and communication costs.

[1]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Juan Yang,et al.  Reconstruction of traditional e-commerce system based on workflow technology , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[4]  Debmalya Biswas,et al.  Privacy preserving and transactional advertising for mobile services , 2013, Computing.

[5]  Raúl Montoliu,et al.  Comprehensive analysis of distance and similarity measures for Wi-Fi fingerprinting indoor positioning systems , 2015, Expert Syst. Appl..

[6]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[7]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[8]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[9]  Hojung Cha,et al.  Crowdsensing-based Wi-Fi radio map management using a lightweight site survey , 2015, Comput. Commun..

[10]  Fatos Xhafa,et al.  Supporting situated computing with intelligent multi-agent systems , 2011, Int. J. Space Based Situated Comput..

[11]  Yi Mu,et al.  Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations , 2016, Comput. J..

[12]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[13]  Xiao Lei,et al.  Designation and Realization of Mobile Commerce Interaction Model Under Cloud Computing Platform , 2013 .

[14]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[15]  Dong Hoon Lee,et al.  An efficient IBE scheme with tight security reduction in the random oracle model , 2015, Designs, Codes and Cryptography.

[16]  Sha Ma,et al.  Identity-based encryption with outsourced equality test in cloud computing , 2016, Inf. Sci..

[17]  N. K. Shankaranarayanan,et al.  Design and Characterization of a Full-Duplex Multiantenna System for WiFi Networks , 2012, IEEE Transactions on Vehicular Technology.

[18]  Tom Rodden,et al.  MultiNet: usable and secure WiFi device association , 2012, SIGCOMM '12.

[19]  Upkar Varshney,et al.  Issues in Emerging 4G Wireless Networks , 2001, Computer.

[20]  Tsz Hon Yuen,et al.  Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption , 2016, Inf. Sci..

[21]  Shengbao Wang,et al.  Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications , 2007, IACR Cryptol. ePrint Arch..

[22]  Mingwu Zhang,et al.  Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.

[24]  Xiaoyuan Yang,et al.  Protecting data in cloud environment with attribute-based encryption , 2015, Int. J. Grid Util. Comput..

[25]  Georg Fuchsbauer,et al.  Plaintext-Checkable Encryption , 2012, CT-RSA.

[26]  Keita Emura,et al.  Revocable hierarchical identity-based encryption , 2014, Theor. Comput. Sci..

[27]  Ren-Hung Hwang,et al.  Context-aware multimedia broadcast and multicast service area planning in 4G networks , 2015, Comput. Commun..

[28]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[29]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[30]  Hyoung-Kee Choi,et al.  Security Analysis of Handover Key Management in 4G LTE/SAE Networks , 2014, IEEE Transactions on Mobile Computing.

[31]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[32]  Dapeng Wu,et al.  Mobile Privacy in Wireless Networks-Revisited , 2008, IEEE Transactions on Wireless Communications.

[33]  Dong Hoon Lee,et al.  Efficient Privacy-Preserving Authentication in Wireless Mobile Networks , 2014, IEEE Transactions on Mobile Computing.