Accountable mobile E-commerce scheme in intelligent cloud system transactions

  • Mingwu ZhangEmail author
  • Yao Yao
  • Yan Jiang
  • Bingbing Li
  • Chunming Tang
Original Research


The vivid and rapid development of the Internet motivates cloud-based intelligent information systems to be applied. Mobile e-commerce, as a new business model based on cloud computing in intelligent service, has become the mainstream of mobile applications. It not only provides efficient computation services for both trading parties, but also gives a secure and reliable data storage center. However, privacy and accountability have become one of users’ crucial concerns in mobile e-commerce transactions. In this paper, we present a practical and efficient accountable mobile e-commerce scheme that is based on cloud platform to address the fundamental transaction requirement. We propose the concrete construction and demonstrate that the proposed scheme can provide effective security in the transaction process, and also give the practical deployment in cloud computing systems to provide the intelligent information services. We also give the performance analysis and show it is efficient and practical compared with related methods in terms of computation complexity and communication costs.


Plaintext checkability Mobile E-commerce Accountability Intelligent cloud Encryption with equality test 



This work is supported by the National Natural Science Foundation of China under grants 61672010, 61370224 and 61702168, and the Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes of Guangzhou University.


  1. Biswas D, Vidyasankar K (2014) Privacy preserving and transactional advertising for mobile services. Computing 96(7):613–630CrossRefGoogle Scholar
  2. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Advances in Cryptology-CRYPTO 2001, Springer, pp 213–229Google Scholar
  3. Brown A, Mortier R, Rodden T (2012) Multinet: usable and secure wifi device association. ACM SIGCOMM Comput Commun Rev 42(4):275–276CrossRefGoogle Scholar
  4. Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In: High Performance Computing and Communications, 2008. HPCC’08. 10th IEEE International Conference on, IEEE, pp 5–13Google Scholar
  5. Canard S, Fuchsbauer G, Gouget A, Laguillaumie F (2012) Plaintext-checkable encryption. Topics in Cryptology-CT-RSA 2012:332–348Google Scholar
  6. Duarte M, Sabharwal A, Aggarwal V, Jana R, Ramakrishnan K, Rice CW, Shankaranarayanan N (2012) Design and characterization of a full-duplex multiantenna system for wifi networks. IEEE Trans Vehicular Technol 63(3):1160–1177CrossRefGoogle Scholar
  7. Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716CrossRefGoogle Scholar
  8. Gentry C (2006) Practical identity-based encryption without random oracles. Eurocrypt, Springer 4004:445–464Google Scholar
  9. Ghosh AK, Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce. Commun ACM 44(2):51–57CrossRefGoogle Scholar
  10. Han CK, Choi HK (2013) Security analysis of handover key management in 4g lte/sae networks. IEEE Trans Mobile Comput 13(2):457–468CrossRefGoogle Scholar
  11. Han J, Yang Y, Huang X, Yuen TH, Li J, Cao J (2016) Accountable mobile e-commerce scheme via identity-based plaintext-checkable encryption. Inf Sci 345:143–155CrossRefGoogle Scholar
  12. Hwang RH, Huang CF, Lin CH, Chung CY (2015) Context-aware multimedia broadcast and multicast service area planning in 4g networks. Comput Commun 64:33–43CrossRefGoogle Scholar
  13. Jo HJ, Paik JH, Lee DH (2014) Efficient privacy-preserving authentication in wireless mobile networks. IEEE Trans Mobile Comput 13(7):1469–1481CrossRefGoogle Scholar
  14. Kim Y, Shin H, Chon Y, Cha H (2015) Crowdsensing-based wi-fi radio map management using a lightweight site survey. Comput Commun 60:86–96CrossRefGoogle Scholar
  15. Kolodziej J, Xhafa F (2011) Supporting situated computing with intelligent multi-agent systems. Int J Space-Based Situated Comput 1(1):30–42CrossRefGoogle Scholar
  16. Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inf Sci 328:389–402CrossRefGoogle Scholar
  17. Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458–470CrossRefGoogle Scholar
  18. Miracl L (2017) Miracl cryptographic library: multiprecision integer and rational arithmetic c/c++ library.
  19. Park JH, Lee DH (2016) An efficient ibe scheme with tight security reduction in the random oracle model. Des, Codes Cryptogr 79(1):63–85MathSciNetCrossRefGoogle Scholar
  20. Paterson KG, Schuldt JC (2006) Efficient identity-based signatures secure in the standard model. In: Australasian Conference on Information Security and Privacy, Springer, pp 207–222Google Scholar
  21. Seo JH, Emura K (2014) Revocable hierarchical identity-based encryption. Theor Comput Sci 542:44–62MathSciNetCrossRefGoogle Scholar
  22. Shamir A et al (1984) Identity-based cryptosystems and signature schemes. Crypto, Springer 84:47–53Google Scholar
  23. Shen J, Chang S, Shen J, Liu Q, Sun X (2016) A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Comput Syst 78:956–963CrossRefGoogle Scholar
  24. Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Transactions on Information Forensics and SecurityGoogle Scholar
  25. Tang C, Wu DO (2008) Mobile privacy in wireless networks-revisited. IEEE Trans Wireless Commun 7(3):1035–1042CrossRefGoogle Scholar
  26. Torres-Sospedra J, Montoliu R, Trilles S, scar Belmonte, Huerta J, (2015) Comprehensive analysis of distance and similarity measures for wi-fi fingerprinting indoor positioning systems. Expert Systems with Applications 42(23):9263–9278CrossRefGoogle Scholar
  27. Varshney U, Jain R (2001) Issues in emerging 4g wireless networks. Computer 34(6):94–96CrossRefGoogle Scholar
  28. Wang S (2007) Practical identity-based encryption (ibe) in multiple pkg environments and its applications. arXiv preprint cs/0703106Google Scholar
  29. Waters B (2005) Efficient identity-based encryption without random oracles. Eurocrypt, Springer 3494:114–127Google Scholar
  30. Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel and Distributed Syst 27(2):340–352CrossRefGoogle Scholar
  31. Yang B, Liu H (2010) Cloud computing is a driving force for mobile internet development. Telicom Eng Technics Stand 23(12):24–27Google Scholar
  32. Yang J, Zheng Y (2012) Reconstruction of traditional e-commerce system based on workflow technology. In: Computer Science and Network Technology (ICCSNT), 2011 International Conference on, IEEE, vol 3, pp 1927–1931Google Scholar
  33. Ye S, Xiao L (2013) Designation and realization of mobile commerce interaction model under cloud computing platform. Comput Sci 40(6A):247–250Google Scholar
  34. Zhang M, Mu Y (2016) Token-leakage tolerant and vector obfuscated ipe and application in privacy- preserving two-party point/polynomial evaluations. Comput J 59(4):493–507CrossRefGoogle Scholar
  35. Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Utility Comput 6(2):91–97CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of ComputersHubei University of TechnologyWuhanChina
  2. 2.School of Mathematics and Information ScienceGuangzhou UniversityGuangzhouChina

Personalised recommendations