Skip to main content
Top

2022 | OriginalPaper | Chapter

Validate Merchant Server for Secure Payment Using Key Distribution

Authors : A. Saranya, R. Naresh

Published in: Cyber Security, Privacy and Networking

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays, growing and competitiveness of a financial sector and e-healthcare application developed rapidly and quicker ever so that mobile payment plays a vital role to make easier and quicker. In the existing paper, the cloud transmits the hash value straight to the merchant server without checking for fraud. This paper aims to provide a secure authentication mechanism between the cloud and the merchant server to avoid fraudulent merchant servers. For trustworthiness, our proposed system introduces secure key distribution between cloud and merchant server named as validate merchant server key distribution protocol (VMSKDP). Our proposed system improves security for mobile payments and reduces attacks like man-in-middle attacks, denial-of-service, etc.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Huang X, Susilo W, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Proceedings of Fourth International Conference on cryptology and network security (CANS ’05), pp 13–25 Huang X, Susilo W, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Proceedings of Fourth International Conference on cryptology and network security (CANS ’05), pp 13–25
2.
go back to reference Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inf For Secur 9(12):2327–2339CrossRef Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inf For Secur 9(12):2327–2339CrossRef
3.
go back to reference Coron JS (2000) On the exact security of full domain hash. Advances in cryptology-CRYPTO 2000. LNCS 1880, pp 229–235 Coron JS (2000) On the exact security of full domain hash. Advances in cryptology-CRYPTO 2000. LNCS 1880, pp 229–235
5.
go back to reference Katz EJ (2008) Hand book of mobile communication studies. The MIT Press Katz EJ (2008) Hand book of mobile communication studies. The MIT Press
11.
go back to reference Qin Z, Sun J, Wahaballa A (2017) A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput Stand Interfaces 54:55–60CrossRef Qin Z, Sun J, Wahaballa A (2017) A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput Stand Interfaces 54:55–60CrossRef
12.
go back to reference Bellare M, Garay J, Rabin T (1998) Batch verification of short signatures. In: International conference on the theory and applications of cryptographic techniques, pp 236–250 Bellare M, Garay J, Rabin T (1998) Batch verification of short signatures. In: International conference on the theory and applications of cryptographic techniques, pp 236–250
13.
go back to reference Taparia A, Panigrahy SK, Jena SK (2017) Secure key exchange using enhanced Diffie Hellman protocol based on string comparison. IEEE WiSPNET 2017 conference Taparia A, Panigrahy SK, Jena SK (2017) Secure key exchange using enhanced Diffie Hellman protocol based on string comparison. IEEE WiSPNET 2017 conference
14.
go back to reference Tasi J-L, Lo N-W, Wu T-C (2012) Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int J Commun Syst Tasi J-L, Lo N-W, Wu T-C (2012) Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int J Commun Syst
15.
go back to reference Wang L, Chen K, Long Y, Mao X, Wang H (2015) A modified efficient certificateless signature scheme without bilinear pairings. In: 2015 International conference on intelligent networking and collaborative systems Wang L, Chen K, Long Y, Mao X, Wang H (2015) A modified efficient certificateless signature scheme without bilinear pairings. In: 2015 International conference on intelligent networking and collaborative systems
16.
go back to reference Peng G, Ping L (2014) Further improvement of a certificateless signature scheme without pairing. Int J Commun Syst 27:2083–2091 Peng G, Ping L (2014) Further improvement of a certificateless signature scheme without pairing. Int J Commun Syst 27:2083–2091
17.
go back to reference He D, Chen J, Zhang R (2011) An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst He D, Chen J, Zhang R (2011) An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst
18.
go back to reference Tsai J-L, A new efficient certificateless short signature scheme using bilinear pairings. IEEE Syst J Tsai J-L, A new efficient certificateless short signature scheme using bilinear pairings. IEEE Syst J
19.
go back to reference Bodur H, Kara R (2017) Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission. In: 2017 9th International conference on computational intelligence and communication networks Bodur H, Kara R (2017) Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission. In: 2017 9th International conference on computational intelligence and communication networks
21.
go back to reference Sung S, Youn C, Kon E, Ryou J (2015) User authentication using mobile phones for mobile payment. In: 2015 IEEE Sung S, Youn C, Kon E, Ryou J (2015) User authentication using mobile phones for mobile payment. In: 2015 IEEE
24.
go back to reference Naresh R, Vijayakumar P, Jegatha Deborah L, Sivakumar R (2020) “A novel trust model for secure group communication in distributed computing”, special issue for security and privacy in cloud computing. J Organ End User Comput, IGI Global 32(3) Naresh R, Vijayakumar P, Jegatha Deborah L, Sivakumar R (2020) “A novel trust model for secure group communication in distributed computing”, special issue for security and privacy in cloud computing. J Organ End User Comput, IGI Global 32(3)
25.
go back to reference Naresh R, Sayeekumar M, Karthick GM, Supraja P (2019) Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm. Soft Comput 23(8):2561–2574 (Springer) Naresh R, Sayeekumar M, Karthick GM, Supraja P (2019) Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm. Soft Comput 23(8):2561–2574 (Springer)
26.
go back to reference Naresh R, Gupta A, Sanghamitra (2020) Malicious url detection system using combined svm and logistic regression model. Int J Adv Res Eng Technol (IJARET) 10(4):63–73 Naresh R, Gupta A, Sanghamitra (2020) Malicious url detection system using combined svm and logistic regression model. Int J Adv Res Eng Technol (IJARET) 10(4):63–73
27.
go back to reference Meenakshi M, Naresh R, Pradeep S (2019) Smart home: security and acuteness in automation of IOT sensors. Int J Innovative Technol Exploring Eng (IJITEE) 9(1):3271–3274 Meenakshi M, Naresh R, Pradeep S (2019) Smart home: security and acuteness in automation of IOT sensors. Int J Innovative Technol Exploring Eng (IJITEE) 9(1):3271–3274
Metadata
Title
Validate Merchant Server for Secure Payment Using Key Distribution
Authors
A. Saranya
R. Naresh
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_9