Abstract
The goal of this paper is to design and implement a security mechanism for cloud-based checkout systems based on chain-hashing scheme. Many cloud-based checkout systems are developed for merchants. However, storing transaction data in cloud storage is associated with serious security risks. The repudiation problem exists between merchants and service providers. We need a scheme that enables the service provider to prove its innocence and the merchant to prove its guilt. The proof of innocence is also called auditing. This paper designs a secure cloud-based checkout system. We use chain hashing to design auditing scheme for checkout systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Feng, J., Chen, Y., Summerville, D., Ku, W.-S., Su, Z.: Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol. In: 8th IEEE Consumer Communications and Networking Conference (CCNC), pp. 521–522 (2011)
Shraer, A., Keidar, I., Cachin, C., Michalevsky, Y., Cidon, A., Shaket, D.: Venus: verification for untrusted cloud storage. In: 17th ACM Cloud Computing Security Workshop (CCSW) (2010)
Shah, M.A., Baker, M., Mogul, J., Swaminathan, R: Auditing to keep online storage services honest. In: USENIX HotOS XI: 11st Workshop on Hot Topics in Operating Systems (2007)
Li, J., Krohn, M., Mazières, D., Shasha, D.: Secure untrusted data repository (SUNDR). In: USENIX 6th Symposium on Operating Systems Design and Implementation (OSDI 2004) (2004)
Mazières, D., Shasha, D.: Building secure file systems out of Byzantine storage. In: 21st Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 108–117 (2002)
Cachin, C., Shelat, A., Shraer, A.: Efficient fork-linearizable access to untrusted shared memory. In: ACM 26th PODC, pp. 129–138 (2007)
Majuntje, M., Dobre, D., Serafini, M., Suri, N.: Abortable fork-linearizable storage. In: ACM 13th OPODIS, pp. 255–269 (2009)
Cachin, C., Shelat, A., Shraer, A.: Integrity protection for revision control. In: ACM 7th ACNS, pp. 382–399 (2009)
Popa, R.A., Lorch, J.R., Molnar, D., Wang, H., Zhuang, L.: Enabling security in cloud storage SLAs with CloudProof. In: USENIX Annual Technical Conference (USENIXATC 2011), p. 31 (2011)
Hwang, G.-H., Peng, J.-Z., Huang, W.-S.: A mutual nonrepudiation protocol for cloud storage with interchangeable accesses of a single account from multiple devices. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2013) (2013)
Merkle, R.C.: A digital signature based on a conventional encryption function. In: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology (CRYPTO 1987), pp. 369–378 (1988)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Chang, TK., Lu, CY. (2020). An Auditing Scheme for Cloud-Based Checkout Systems. In: Yang, CN., Peng, SL., Jain, L. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2018. Advances in Intelligent Systems and Computing, vol 895. Springer, Cham. https://doi.org/10.1007/978-3-030-16946-6_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-16946-6_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16945-9
Online ISBN: 978-3-030-16946-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)