Advertisement

A Security Framework for Multi-authority Based e-Sealed Bid Auction System

  • Sourav Sinha
  • Mamata Jenamani
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)

Abstract

In a typical organization multiple authorities may participate in purchasing process. Online implementation of such system should properly distribute security control over multiple-authorities to ensure trust among them and avoid dispute. In our research we are presenting two aspects of e-sealed bid auction in a two server setting using public key infrastructure: First, secure bid submission and bid opening using multiple authorities, and second, secure bid document storage for future references.

Keywords

Sealed bid auction Multi-authority auction E-tendering Bid encryption decryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Boyd, C., Mao, W.: Security issues for electronic auctions. Hewlett-Packard Laboratories, HPL-2000-90 (2000) Google Scholar
  2. 2.
    Brandt, F.: How to obtain full privacy in auctions. International Journal of Information Security 5(4), 201–216 (2006)CrossRefGoogle Scholar
  3. 3.
    Chase, M.: Multi-Authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Chase, M., Chow, S.M.: Anonymous key issuing for Authority Attribute Based Encryption, US Patent,12(355),862 (2007)Google Scholar
  5. 5.
    Girouard, J., M., Ratliff, E., J., Simon, K.D.:System and method for intrusion decision-making in autonomic computing environment, US Patent, US 2005 0278178 A1(2005) Google Scholar
  6. 6.
    Islam, M.S., Dey, S., Kundu, G., Hoque, A.S.M.: A solution to the security issue of an e-government procurement system. In: International Conference on Electrical and Computer Engineering, pp. 659–664 (2008)Google Scholar
  7. 7.
    Juels, A., Szydlo, M.: A Two-Server, Sealed-Bid Auction Protocol. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 72–86. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Henecka, W., Schneider, T.: Two-Party Computation with Less Memory. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 437–446 (2013)Google Scholar
  9. 9.
    Hinkelmann, M., Jakoby, A., Stechert, P.: t-Ptivate t-Secure auction. Journal of Computer Science and Technology 23(5), 694–710 (2011)CrossRefMathSciNetGoogle Scholar
  10. 10.
    Li, M., Juan, J., Tsai, J.S.T., Practical, J.H.C.: electronic auction scheme with strong anonymity. Information Science 181, 2576 (2011)CrossRefzbMATHGoogle Scholar
  11. 11.
    Liao, T., Wang, S., Tserng, M.T., Framework, H.P.A.: of electronic tendering for government procurement: a lesson learned in Taiwan. Automation in Construction 11, 731–742 (2002)CrossRefGoogle Scholar
  12. 12.
    Lv, X., Li, H.S., Wang, B.: Group key agreement for secure group communication in dynamic peer systems. Journal of Parallel and Distributed Computing 72(10) (2012)Google Scholar
  13. 13.
    Naor, M., Pinkas, B., Summer, R.: Privacy preserving auctions and mechanism design. In: ACM Conference on Electronic Commerce, vol. 1, pp. 129–139 (1999)Google Scholar
  14. 14.
    Naseri, M.: Secure quantum sealed-bid auction. Optics Communications 282, 1939–1943 (2009)CrossRefGoogle Scholar
  15. 15.
    Olive, J.: Secure Document Management system, US patent, US 2008 0235175 A1 (2008)Google Scholar
  16. 16.
    Public Procurement Bill: Planning Commission, Government of India (2012)Google Scholar
  17. 17.
    Pei, S., Chen, D., Chu, Y., Xu, Q., Xi, S.: Research of web service security model based on SOAP information. Information Technology Journal 11(2), 241–247 (2012)CrossRefGoogle Scholar
  18. 18.
    Richhariya, P., Singh, P.K.: A Survey on Financial Fraud Detection Methodologies. International Journal of Computer Applications, 45–22 (2012)Google Scholar
  19. 19.
    Seveda, R.: Document Security Management system, EP patent, EP 1 894866 B1 (2011)Google Scholar
  20. 20.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  21. 21.
    Shih, D.H., Yen, D.C., Cheng, C.H., Shih, M.H.: A secure multi-item e-auction mechanism with bid privacy. Computer & Security, 273–287 (2011)Google Scholar
  22. 22.
    Viswanathan, K., Boyd, C., Dawson, E.: A Three Phased Schema for Sealed Bid Auction System Design. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 412–426. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  23. 23.
    William, B.C., Elaine, B.: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication, 800-67 (2012)Google Scholar
  24. 24.
    Xiong, H., Chen, Z., Li, F.: Bidder-anonymous English auction protocol based on revocable ring signature. Expert Systems with Applications, 7062–7066 (2013)Google Scholar
  25. 25.
    Xiong, H., Yuen, T.H., Zhang, C., He, Y.-J., Yiu, S.M.: Attribute specified identity-based encryption. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 60–74. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  26. 26.
    Yang, Y.G., Naseri, M., Wen, Q.Y.: Improved secure quantum sealed-bid auction. Optics Communications 282(20), 4167–4170 (2009)CrossRefGoogle Scholar
  27. 27.
    Yao, A.C.: Protocols for secure computations. In: FOCS 1982, pp. 160–164. IEEE Computer Society (1982)Google Scholar
  28. 28.
    Zhou, L., Varadharajan, V., Hitchens, M.: Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. The Computer Journal 54(10), 1675–1687 (2011)CrossRefGoogle Scholar
  29. 29.
    Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals E81-A(1), 20–27 (1998)MathSciNetGoogle Scholar
  30. 30.
    Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1–20. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  31. 31.
    Sako, K.: An auction protocol which hides bids of losers. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 422–432. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  32. 32.
    Franklin, K.M., Reiter, K.M.: The design and implementation of a secure auction service. IEEE Transaction on Software Engineering 22(5), 302–312 (1996)CrossRefGoogle Scholar
  33. 33.
    Du, T.C.: Building an Automatic e-Tendering System on the Semantic Web. Decision Support Systems 14(1), 13–21 (2009)CrossRefGoogle Scholar
  34. 34.
    Benatallah, B., Casati, F., Toumani, F.: Web Service Conversation Modeling: Cornerstone for e-Business Automation. IEEE Internet Computing 7(6) (2003)Google Scholar
  35. 35.
    Du, R., Foo, E., Boyd, C., Fitzgerald, B.: Defining security services for electronic tendering. In: The Australasian Information Security Workshop (AISW 2004), vol. 32, pp. 43–52. Australian Computer Society Inc. and ACM (2004)Google Scholar
  36. 36.
    Zhao, Z., Naseri, M., Zheng, Y.: Secure quantum sealed-bid auction with post confirmation. Opt. Commun. 283(16), 3194–3197 (2010)CrossRefGoogle Scholar
  37. 37.
    Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179 (December 1984)Google Scholar
  38. 38.
    Beaver, D., Micali, S., Rogaway, P.: The round plexity of secure protocols. ACM Synopsis on Theory of Computing, 503–513 (1990)Google Scholar
  39. 39.
    Kabisch, S., Peintner, D., Heuer, J.: XML-based Web service generation for microcontroller-based sensor actor networks. In: 2010 8th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 181–184 (2010)Google Scholar
  40. 40.
    Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption, pp. 280–300. Springer, Heidelberg (2001)Google Scholar
  41. 41.
    Panayiotou, N.A., Sotiris, P.G., Ilias, P.T.: An e-procurement system for governmental purchasing. International Journal of Production Economics 90(1), 79–102 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Sourav Sinha
    • 1
  • Mamata Jenamani
    • 1
  1. 1.Department of Industrial Engineering and ManagementIndian Institute of Technology, KharagpurIndia

Personalised recommendations