A fair and secure group buying system based on arbitration computing mechanism

Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends or family of a buyer are interested in the same commodity or service, they can often buy at a lower price by buying in volume. This concept is referred to as group buying. Although the profit on a single commodity decreases for a merchant, the overall profits are increased due to volume. Traditionally, buyers and merchants trade through a group buying service company. However, sometimes transaction disputes arise. This might happen because a buyer has already paid through a group buying service company but has not received the merchandise or because a merchant has delivered merchandise to a buyer but has not been paid. Transaction disputes arise. We propose a fair group buying system. The proposed scheme uses secure computing theory to meet the security requirements such as mutual authentication, integrity of transaction data and anonymity of buyer. We propose a fair and secure group buying system based on arbitration computing mechanism to provide a comprehensive method for arbitrating an appeal. We create a win/win situation for the buyers, the merchants and the group buying service companies.

[1]  Katia P. Sycara,et al.  Customer Coalitions in Electronic Markets , 2000, AMEC.

[2]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[5]  Jung-San Lee,et al.  An innovative electronic group-buying system for mobile commerce , 2013, Electron. Commer. Res. Appl..

[6]  Li Chen,et al.  Group-Buying E-Commerce in China , 2012, IT Professional.

[7]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Xiong Li,et al.  An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..

[10]  Ho-fung Leung,et al.  Fairness in secure computing protocols based on incentives , 2016, Soft Comput..

[11]  Athanasios V. Vasilakos,et al.  TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[12]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[13]  Athanasios V. Vasilakos,et al.  Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.

[14]  Jianhua Li,et al.  Escrowable identity-based authenticated key agreement protocol with strong security , 2013, Comput. Math. Appl..

[15]  Zuowen Tan A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments , 2012, J. Netw. Comput. Appl..

[16]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[17]  Chin-Ling Chen,et al.  A fair online payment system for digital content via subliminal channel , 2011, Electron. Commer. Res. Appl..

[18]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[19]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[20]  Athanasios V. Vasilakos,et al.  Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..

[21]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[22]  Pulak Mishra,et al.  Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .

[23]  Han-Zhi Song The B2C group-buying model on the Internet , 2011, 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC).

[24]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[25]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[26]  Athanasios V. Vasilakos,et al.  A Framework for Truthful Online Auctions in Cloud Computing with Heterogeneous User Demands , 2016, IEEE Transactions on Computers.

[27]  Athanasios V. Vasilakos,et al.  Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.

[28]  Athanasios V. Vasilakos,et al.  Incentive-Compatible Online Mechanisms for Resource Provisioning and Allocation in Clouds , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[29]  Athanasios V. Vasilakos,et al.  Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.

[30]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[31]  Athanasios V. Vasilakos,et al.  An Online Mechanism for Resource Allocation and Pricing in Clouds , 2016, IEEE Transactions on Computers.