Augmenting integrity and scalability in mobile payment applications using blockchain

The transactional information from the mobile wallets is offloaded from the mobile device to the mobile transaction server. The transaction involves various communication standards, confidential transaction information to ensure flawless transaction of data. There exist several encryption techniques to preserve confidentiality, hashing schemes to prove the integrity, signature schemes to prove the identity in the mobile transaction using mobile wallet applications. Even though mobile wallet possesses secure algorithms, the transactions are facing security issues such as double spending, lack of dispute redressal issue, lack of forward secrecy, lack of anonymity in the transaction and security. Therefore, Blockchain based Mobile transaction Scheme is proposed to solve the security issues including integrity, double spending and improve scalability. This paper presents a strategy which implements blockchain framework by using irreversible keys for mobile wallet applications. The proposed scheme proves to be secure against the security attacks and enhances integrity and scalability compared to the existing schemes.

[1]  Jong-Hyouk Lee,et al.  Analysis of the main consensus protocols of blockchain , 2020, ICT Express.

[2]  Block-Chain Based Authentication Technique , 2020, International Journal of Engineering and Advanced Technology.

[3]  Yujie Xu,et al.  Research on application of block chain in distributed energy transaction , 2017, 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC).

[4]  Hu Yan,et al.  Distributed Energy Transaction Pattern and Block Chain Based Architecture Design , 2018 .

[5]  Hyoung Joong Kim,et al.  Electronic Voting Service Using Block-Chain , 2016, J. Digit. Forensics Secur. Law.

[6]  Arati Baliga,et al.  Understanding Blockchain Consensus Models , 2017 .

[7]  Alin Bogdan Popa,et al.  Instant payment and latent transactions on the Ethereum Blockchain , 2018, 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet).

[8]  Roberto Baldoni,et al.  PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.

[9]  Subash Chandra Bose,et al.  Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain , 2019 .

[10]  Bo Zhou,et al.  Research on the risk of block chain technology in Internet finance supported by wireless network , 2020, EURASIP J. Wirel. Commun. Netw..

[11]  Shuyang Xiao,et al.  Research on the information security of sharing economy customers based on block chain technology , 2018, Information Systems and e-Business Management.

[12]  Huu-Thuan Huynh,et al.  Digitizing Invoice and Managing VAT Payment Using Blockchain Smart Contract , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).