Advertisement

New Approach for Secure and Efficient Metering in the Web Advertising

  • Soon Seok Kim
  • Sung Kwon Kim
  • Hong Jin Park
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3043)

Abstract

In this paper, we present secure and efficient metering scheme to measure the number of interactions between clients and servers in the web advertising. In most cases the web advertising consists of advertisers, clients, servers, and an audit agency. The metering scheme should always be secure against fraud attempts by servers, which maliciously try to inflate the number of their visits and against clients that attempt to disrupt the metering process. We propose secure and efficient metering scheme based on cryptographic techniques. By analyzing the proposed scheme we show that our scheme is more secure and efficient than previous schemes [2,3,5].

Keywords

Web Advertising Metering WWW Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Marcus, B.: Web Ad Spending to Reach $7.6 Bln. Digitrends.net Corp. CA. [Online]. Available (May2001),http://www.digitrends.net/mna/index15600.html
  2. 2.
    Naor, M., Pinkas, B.: Secure and efficient metering. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 576–590. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. 3.
    Masucci, B., Stinson, D.R.: Efficient metering schemes with pricing. IEEE Trans. Information Theory 47(7), 2835–2844 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Shamir, A.: How to share a secret. Comm. ACM 22(11), 612–613 (1979)zbMATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Dwork, C., Naor, M.: Pricing via processing or combating junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 114–128. Springer, Heidelberg (1993)Google Scholar
  6. 6.
    Fiat, A., Shamir, A.: How to prove youeself. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 641–654. Springer, Heidelberg (1987)Google Scholar
  7. 7.
    Schneier, B.: Applied cryptography, 2nd edn. pp. 29–40. John Wiley & Sons, Chichester (1996)Google Scholar
  8. 8.
    Menezes, J., Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. In: CRC, pp. 22–33 (1996)Google Scholar
  9. 9.
    Aho, A., Hopcroft, J., Ullman, J.: The design and analysis of computer algorithms, p. 299. Addison-Wesley, Reading (1974)zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Soon Seok Kim
    • 1
  • Sung Kwon Kim
    • 2
  • Hong Jin Park
    • 3
  1. 1.School of Information and Communication EngineeringHalla UniversityKangwon-doKorea
  2. 2.Dept. of Computer Science and EngineeringChungang UniversitySeoulKorea
  3. 3.School of Computer, Information and Communication EngineeringSangJi UniversityKangwon-doKorea

Personalised recommendations