Security Extensions for Mobile Commerce Objects

Electronic commerce and its variance mobile commerce have tremendously increased their popularity in the last several years. As mobile devices have become the most popular mean to access and use the Internet, mobile commerce and its security are timely and very hot topics. Yet, today there is still no consistent model of various m–commerce applications and transactions, even less clear specification of their security. In order to address and solve those issues, in this paper, we first establish the concept of mobile commerce objects, an equivalent of virtual currencies, used for m–commerce transactions. We describe functionalities and unique characteristics of these objects; we follow with security requirements, and then offer some solutions – security extensions of these objects. All solutions are treated within the complete lifecycle of creation and use of the m–commerce objects.

[1]  Sead Muftic,et al.  Secure Middleware for Mobile Phones and UICC Applications , 2011, MOBILWARE.

[2]  Ming Gu,et al.  Lightweight security for mobile commerce transactions , 2003, Comput. Commun..

[3]  Igor Nai Fovino,et al.  Security and Privacy in Mobile Cloud Under a Citizen’s Perspective , 2013 .

[4]  Sead Muftic,et al.  Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications , 2012, SECURWARE 2012.

[5]  Gianmarco Baldini,et al.  An Architecture for Secure m-Commerce Applications , 2013, 2013 19th International Conference on Control Systems and Computer Science.

[6]  David Shaw,et al.  Security of service requests for cloud based m-commerce , 2012, 2012 Proceedings of the 35th International Convention MIPRO.

[7]  John Hughes Feature: Enabling E-Commerce Through PKI , 2000 .

[8]  Donald E. Eastlake,et al.  Requirements and Design for Voucher Trading System (VTS) , 2003, RFC.

[9]  Gianluigi Me Security overview for m-payed virtual ticketing , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[10]  Chang-Tien Lu,et al.  Analysis of payment transaction security in mobile commerce , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..

[11]  Sead Muftic,et al.  Secure and privacy-enhanced e-mail system based on the concept of proxies , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[12]  Chin-Chen Chang,et al.  A Secure E-coupon System for Mobile Users , 2006 .