Skip to main content
Log in

Cloud based efficient authentication for mobile payments using key distribution method

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The extensive usage of clever strategies fascinates numerous considerations on the innovation intended for mobile payment method in the background of cloud computing. Though, payment confidence and customer confidentiality still increase serious anxieties to the use of mobile payments. Subsequently, current authentication procedures for mobile payments moreover have high overhead on source inadequate smart scheme. These schemes cannot deliver customer secrecy in mobile payment. To resolve the tasks smartly we have present a cloud based efficient Authentication for mobile payments using key distribution method. Based on the certificate less proxy re signature system, we have designed a different mobile payment procedure which not only attains secrecy; it also achieves the storage complexity by consuming fewer amounts of data. In our proposed method, the efficiency is particularly enhanced by retaining cost of computation in the payment area. Furthermore, by seeing that the payment area the Merchant Server wishes to achieve computation for every payment operation, the impression of batch authentication was implemented to remove the difficulties faced when more number of customers use the Payment area so that Merchant Server can solve the scalability dispute. By our security analysis discussed in this paper, the proposed method is verified to be safe by using the prolonged CDH issues. Furthermore, the performance results displays the proposed method is reasonable and quick for the source inadequate smart mobiles in cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Laih CS (ed) Advances in Cryptology - ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science, vol 2894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40061-5_29

  • Ateniese G, Hohenberger S (2005) Proxyre-signatures: new definitions, algorithms, and applications. In: ACM Conference on Computer and Communications Security, pp 310–319

  • Atzori L, Iera A, Morabito G (2002) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  Google Scholar 

  • Baskar M, Gnansekaran T (2017) Developing efficient intrusion tracking system using region based traffic impact measure towards the denial of service attack mitigation. J Comput Theor Nanosci 14(7):3576–3582

    Article  Google Scholar 

  • Baskar M, Gnansekaran T (2017) Multi model network analysis for improved intrusion tracing towards mitigating DDoS attack. Asian J Res Soc Human 7(3):1343–1353

    Google Scholar 

  • Baskar M, Gnansekaran T, Vijay JF (2018) Time variant predicate based traffic approximation algorithm for efficient low rate DDoS attack detection. TAGA J Graph Technol 14:352–368

    Google Scholar 

  • Bellare M, Garay J, Rabin T (1998) Batch verification of short signatures. In: International conference on the theory and applications of cryptographic techniques, pp 236–250

  • Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. Lect Notes Comput Sci 1403:127–144

    Article  MathSciNet  Google Scholar 

  • Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Proc. 21st Annual International Cryptology Conference (CRYPTO 2001), LNCS 2139, pp 213–229

  • Camenisch J, Hohenberger S, Pedersen M (2007) Batch verification of short signatures. Int Conf Adv Cryptol 4515:246–263

    MathSciNet  MATH  Google Scholar 

  • Chen C-M, Xiang B, Liu Y, Wang K-H (2019) A secure authentication protocol for internet of vehicles. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2891105

    Article  Google Scholar 

  • Coron JS (2000) On the exact security of full domain hash. Advances in cryptology-CRYPTO 2000. LNCS 1880:229–235

    MATH  Google Scholar 

  • Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  • Gordon S, Kristensen LM, Billington J (2002) Verification of a revised WAP wireless transaction protocol. In: Esparza J, Lakos C (eds) Application and Theory of Petri Nets 2002. ICATPN 2002. Lecture Notes in Computer Science, vol 2360. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48068-4_12

  • Guo D, Ping W, Dan Y, Yang X (2010) A certificateless proxy resignature scheme. In: IEEE international conference on computer science and information technology, pp 157–161

  • He D, Kumar N, Khan MK, Wang L, Shen J (2018) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2):621–1631

    Article  Google Scholar 

  • Huang X, Susilo W, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Proc. Fourth Int’l Conf. Cryptology and Network Security (CANS ’05), pp 13–25

  • Hu BC, Wong DS, Zhang Z, Deng X (2006) Key replacement attack against a generic construction of certificateless signature. In: Proc. 11th Australasian Conference on Information Security and Privacy (ACISP ’06), pp 235–246

  • Kamijo K, Aihara T, Murase M (2010) Anonymity-AwareFace-to-Face Mobile Payment. In: 7th International ICST Conference on Mobile and Ubiquitous Systems: computing, networking, and services (MobiQuitous 2010), LNICST 73, pp 198–209

  • Katz JE (2008) Hand book of mobile communication studies. The MIT Press, Cambridge

    Book  Google Scholar 

  • Katz J (2010) Digital signatures. Springer, New York

    Book  Google Scholar 

  • Kumari A, Kumar V, Abbasi MY, Kumari S, Chaudhary P, Chen CM (2020) CSEF: cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access 8(3):107838–107852

    Article  Google Scholar 

  • Liao Y, He Y, Li F, Zhou S (2017) Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput Stand Interfaces. https://doi.org/10.1016/j.csi.2017.09.008

    Article  Google Scholar 

  • Pfleeger CP, Pfleeger SK (2002) Security in computing. In: Prentice Hall Professional Technical Reference, pp 182–202

  • Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361369

    Article  Google Scholar 

  • Qin Z, Sun J, Wahaballa A (2017) A secure and privacy-preserving moblie wallet with outsoured verification in cloud computing. Comput Stand Interfaces 54:55–60

    Article  Google Scholar 

  • Shamir A (1984) Identity-based cryptosystems and signature schemes, vol 21, no 2, pp 47–53

  • Shao J, Wei G, Ling Y, Xie M (2011) Unidirectional identity-based proxy re-signature. In: IEEE International Conference on Communications, pp 1–5

  • Suchithra M, Baskar M, Ramkumar J, Kalyanasundaram P, Amutha B (2020) Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-02056-1

    Article  Google Scholar 

  • Sureshkumar V, Ramalingam A, Rajamanickam N, Amin R (2017) A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Comput Electric Eng 57:223–240

    Article  Google Scholar 

  • Tang F, Ma S, Xiang Y, Lin C (2019) An efficient authentication scheme for Blockchain-based electronic health records. IEEE Access 7(3):41678–41689

    Article  Google Scholar 

  • The pairing-based cryptography library (PBC). https://crypto.stanford.edu/pbc/

  • Vergnaud D (2008) Multi-use unidirectional proxy re-signatures. In: ACM conference on computer and communications security, pp 511–520

  • Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inf Forensics Secur 9(12):2327–2339

    Article  Google Scholar 

  • Xiong H, Sun J (2017) Comments on verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Dependable Secure Comput 14(4):461–462

    Article  Google Scholar 

  • Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10(7):1442–1455

    Article  Google Scholar 

  • Xiong H, Mei Q, Zhao Y (2018a) Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Syst J. https://doi.org/10.1109/JSYST.2018.2890126

    Article  Google Scholar 

  • Xiong H, Zhang H, Sun J (2018b) Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst J. https://doi.org/10.1109/JSYST.2018.2865221

    Article  Google Scholar 

  • Yang JH, Lin PY (2016) A mobile payment mechanism with anonymity for cloud computing. J Syst Softw 116:69–74

    Article  Google Scholar 

  • Yeh KH (2017) A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments. IEEE Syst J. https://doi.org/10.1109/JSYST.2017.2668389

    Article  Google Scholar 

  • Zhang Z, Wong DS, Xu J, Feng D (2006) Certificateless PublicKey signature: security model and efficient construction. In: 4th International Conference on Applied Cryptography and Network Security (ACNS 2006), LNCS 3989, pp 293–308

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Naresh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saranya, A., Naresh, R. Cloud based efficient authentication for mobile payments using key distribution method. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-020-02765-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-020-02765-7

Keywords

Navigation