Skip to main content

A Novel Sharing M-Coupons with Lightweight Computations via Cloud Computing

  • Conference paper
  • First Online:
  • 2642 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 927))

Abstract

Coupons are useful and widely used in the market place to attract new customers and keep loyal customers. As more and more wireless devices are connected to the Internet, many have computed that mobile commerce will blossom soon, just like e-commerce booming in recent years. In this paper, we proposed a secure sharing m-coupon scheme that a user can use the mobile device to share the sharable m-coupons to his/her friend through the cloud. In the proposed scheme, a customer does not need to download the m-coupon from cloud. If customer wants to redeem the m-coupon, he just needs to send a redemption request message to the cloud, and the cloud will help the customer to transfer the m-coupon to the retiler. So that the customers do not worry about problem of storing and losing, it is convenient for customers. Our implementation incorporates only lightweight computations, message authentication code, and simple hash chains for security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Scharl, A., Dickinger, A., Murphy, J.: Diffusion and success factors of mobile marketing. Electron. Commer. Res. Appl. 4(2), 159–173 (2005)

    Article  Google Scholar 

  2. Neil, D.S.: Coupons: Identifying New Opportunities Beyond Early Trials. Jupiter Research Report (2008)

    Google Scholar 

  3. Juniper Research: Mobile Coupons (2008). http://www.juniperresearch.com

  4. Raskino, M.: Mobile coupons will reach right into your pocket. GartnerGroup Research Note (2001). http://www.gartner.com/

  5. Kumar, M., Rangachari, A., Jhingran, A., Mohan, R.: Sales promotions on the internet. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 167–176 (1998)

    Google Scholar 

  6. Blundo, C., Cimato, S., De Bonis, A.: A lightweight protocol for the generation and distribution of secure e-coupons. In: Proceedings of the 11th International Conference on World Wide Web, Honolulu, Hawaii, USA, pp. 542–552 (2002)

    Google Scholar 

  7. Blundo, C., Cimato, S., De Bonis, A.: Secure E-coupons. E-Commer. Res. 5(1), 117–139 (2005)

    Article  Google Scholar 

  8. Chang, C.C., Wu, C.C., Lin, I.C.: A secure E-coupon system for mobile users. Int. J. Comput. Sci. Netw. Secur. 6(1), 273–279 (2006)

    Google Scholar 

  9. Wray, J., Plante, D.: Mobile advertising engine for centralized mobile coupon delivery. Int. J. Manag. Mark. Res. 4(1), 75–85 (2011)

    Google Scholar 

  10. Hsueh, S.C., Chen, J.M.: Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electron. Commer. Res. Appl. 9(4), 283–293 (2010)

    Article  Google Scholar 

  11. Ricest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Proceedings of 1996 International Workshop on Security Protocols, pp. 69–87 (1996)

    Google Scholar 

  12. Damgard, I.B.: A design principle for hash functions. In: Advances in Cryptology-CRYPTO 1989. LNCS, vol. 435, pp. 416–427 (1990)

    Google Scholar 

  13. Merkle, R.C.: One way hash function and DES. In: Advances in Cryptology-CRYPTO 1989. LNCS, vol. 435, pp. 428–446 (1989)

    Google Scholar 

  14. Merkle, R.C.: A fast software one-way hash function. J. Cryptol. 3(1), 43–58 (1990)

    Article  MathSciNet  Google Scholar 

  15. Davies, D.W.: A message authentication algorithm suitable for a main-frame computer. In: Advance in Cryptology-CRYPTO 1984. LNCS, vol. 196, pp. 393–400 (1984)

    Google Scholar 

  16. ISO/IEC 9797: Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm. Internal Organization for Standardization

    Google Scholar 

  17. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1996)

    Book  Google Scholar 

  18. Hendry, M.: Smart Card Security and Applications. Artech House, Norwood (1997)

    MATH  Google Scholar 

  19. Jones, H.W.E., Watson, A.C., O’Neill, T.J.: Vehicle security using smartcards. Secur. J. 13(2), 79–87 (1998)

    Article  Google Scholar 

  20. Schneier, B.: Applied Cryptography, 2nd edn. Wiley, Hoboken (1996)

    MATH  Google Scholar 

  21. Baldonado, M., Chang, C.-C.K., Gravano, L., Paepcke, A.: The stanford digital library metadata architecture. Int. J. Digit. Libr. 1, 108–121 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iuon-Chang Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lin, IC., Chiang, HC. (2019). A Novel Sharing M-Coupons with Lightweight Computations via Cloud Computing. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol 927. Springer, Cham. https://doi.org/10.1007/978-3-030-15035-8_43

Download citation

Publish with us

Policies and ethics