Skip to main content

Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-Verifier for Digital Goods Providers

  • Conference paper
  • First Online:
Computational Intelligence, Cyber Security and Computational Models

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 412))

Abstract

Mobile web payment for online shopping is done using only single gateway. If a customer wants to use balances of two different bank accounts in a single transaction then the customer has to transfer this fund to any one of the bank account and then he/she can start the transaction. This is a time consuming process. In this situation, the facility of making the payment via two gateways for a single transaction is more convenient to the customer. Our work is mainly devoted to design an efficient payment protocol that can be used in portable payment devices for making the payment via two gateways for digital goods providers. The proposed scheme is analyzed using an automated tool CPSA, based on different security features and computation overhead. Moreover, the computation overhead of this protocol is less than that of the other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    As the existing payment systems are designed only for single gateway, the comparison is made on the basis of single gateway.

References

  1. Bhasker, B.: Electronic Commerce: Framework, Technologies and Applications. Tata McGraw-Hill Education (2013)

    Google Scholar 

  2. Kailar, R.: Reasoning about accountability in protocols for electronic commerce. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 236–250. Oakland, CA (May 1995)

    Google Scholar 

  3. Rajamanickam, N., Nadarajan, R.: Implementing real-time transactional security property using timed edit automata. In: Proceedings of the Sixth International Conference on Security of Information and Networks, pp. 429–432. Aksaray, Turkey (2013)

    Google Scholar 

  4. SET Secure Electronic Transaction Specification. Book 3: Formal Protocol Definition. SET Secure Electronic Transaction LLC (1997)

    Google Scholar 

  5. Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Van Herreweghen, E., Waidner, M., et al.: Design, implementation, and deployment of the ikp secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4), 611–627 (2000)

    Article  Google Scholar 

  6. Kungpisdan, S., Srinivasan, B., Le, P.D.: A secure account-based mobile payment protocol. In: Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on, vol. 1, pp. 35–39. IEEE (2004)

    Google Scholar 

  7. Isaac, J.T., Camara, J.S.: A secure payment protocol for restricted connectivity scenarios in m-commerce. In: E-Commerce and Web Technologies, pp. 1–10. Springer (2007)

    Google Scholar 

  8. Fun, T.S., Beng, L.Y., Likoh, J., Roslan, R.: A lightweight and private mobile payment protocol by using mobile network operator. In: International Conference on Computer and Communication Engineering. ICCCE 2008, pp. 162–166. IEEE (2008)

    Google Scholar 

  9. Isaac, J.T., Zeadally, S.: An anonymous secure payment protocol in a payment gateway centric model. Procedia Comput. Sci. 10, 758–765 (2012)

    Article  Google Scholar 

  10. Waidner, B.B., Mueller, A., Pedersen, T., Schunter, M.: Architecture of Payment Gateway. SEMPER Consortium (1996)

    Google Scholar 

  11. Hwang, J.J., Hsueh, S.C.: Greater protection for credit card holders: a revised set protocol. Computer Stand. Interfaces 19(1), 1–8 (1998)

    Article  Google Scholar 

  12. Fabrega, F., Herzog, J.C., Guttman, J.D.: Strand spaces: why is a security protocol correct? In: Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium on, pp. 160–171. IEEE (1998)

    Google Scholar 

  13. Sureshkumar, V., Anitha, R.: Analysis of electronic voting protocol using strand space model. In: Recent Trends in Computer Networks and Distributed Systems Security, pp. 416–427. Springer (2014)

    Google Scholar 

  14. Sureshkumar, V., Ramalingam, A., Anandhi, S.: Analysis of accountability property in payment systems using strand space model. In: Security in Computing and Communications, pp. 424–437. Springer (2015)

    Google Scholar 

  15. Ramsdell, J.D., Guttman, J.D.: Cpsa Primer. The MITRE Corporation, Bedford, MA, USA 1 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Venkatasamy Sureshkumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Sureshkumar, V., Anitha, R., Rajamanickam, N. (2016). Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-Verifier for Digital Goods Providers. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics