Abstract
The extensive usage of clever strategies fascinates numerous considerations on the innovation intended for mobile payment method in the background of cloud computing. Though, payment confidence and customer confidentiality still increase serious anxieties to the use of mobile payments. Subsequently, current authentication procedures for mobile payments moreover have high overhead on source inadequate smart scheme. These schemes cannot deliver customer secrecy in mobile payment. To resolve the tasks smartly we have present a cloud based efficient Authentication for mobile payments using key distribution method. Based on the certificate less proxy re signature system, we have designed a different mobile payment procedure which not only attains secrecy; it also achieves the storage complexity by consuming fewer amounts of data. In our proposed method, the efficiency is particularly enhanced by retaining cost of computation in the payment area. Furthermore, by seeing that the payment area the Merchant Server wishes to achieve computation for every payment operation, the impression of batch authentication was implemented to remove the difficulties faced when more number of customers use the Payment area so that Merchant Server can solve the scalability dispute. By our security analysis discussed in this paper, the proposed method is verified to be safe by using the prolonged CDH issues. Furthermore, the performance results displays the proposed method is reasonable and quick for the source inadequate smart mobiles in cloud.
Similar content being viewed by others
References
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Laih CS (ed) Advances in Cryptology - ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science, vol 2894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40061-5_29
Ateniese G, Hohenberger S (2005) Proxyre-signatures: new definitions, algorithms, and applications. In: ACM Conference on Computer and Communications Security, pp 310–319
Atzori L, Iera A, Morabito G (2002) The internet of things: a survey. Comput Netw 54(15):2787–2805
Baskar M, Gnansekaran T (2017) Developing efficient intrusion tracking system using region based traffic impact measure towards the denial of service attack mitigation. J Comput Theor Nanosci 14(7):3576–3582
Baskar M, Gnansekaran T (2017) Multi model network analysis for improved intrusion tracing towards mitigating DDoS attack. Asian J Res Soc Human 7(3):1343–1353
Baskar M, Gnansekaran T, Vijay JF (2018) Time variant predicate based traffic approximation algorithm for efficient low rate DDoS attack detection. TAGA J Graph Technol 14:352–368
Bellare M, Garay J, Rabin T (1998) Batch verification of short signatures. In: International conference on the theory and applications of cryptographic techniques, pp 236–250
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. Lect Notes Comput Sci 1403:127–144
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Proc. 21st Annual International Cryptology Conference (CRYPTO 2001), LNCS 2139, pp 213–229
Camenisch J, Hohenberger S, Pedersen M (2007) Batch verification of short signatures. Int Conf Adv Cryptol 4515:246–263
Chen C-M, Xiang B, Liu Y, Wang K-H (2019) A secure authentication protocol for internet of vehicles. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2891105
Coron JS (2000) On the exact security of full domain hash. Advances in cryptology-CRYPTO 2000. LNCS 1880:229–235
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Gordon S, Kristensen LM, Billington J (2002) Verification of a revised WAP wireless transaction protocol. In: Esparza J, Lakos C (eds) Application and Theory of Petri Nets 2002. ICATPN 2002. Lecture Notes in Computer Science, vol 2360. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48068-4_12
Guo D, Ping W, Dan Y, Yang X (2010) A certificateless proxy resignature scheme. In: IEEE international conference on computer science and information technology, pp 157–161
He D, Kumar N, Khan MK, Wang L, Shen J (2018) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2):621–1631
Huang X, Susilo W, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Proc. Fourth Int’l Conf. Cryptology and Network Security (CANS ’05), pp 13–25
Hu BC, Wong DS, Zhang Z, Deng X (2006) Key replacement attack against a generic construction of certificateless signature. In: Proc. 11th Australasian Conference on Information Security and Privacy (ACISP ’06), pp 235–246
Kamijo K, Aihara T, Murase M (2010) Anonymity-AwareFace-to-Face Mobile Payment. In: 7th International ICST Conference on Mobile and Ubiquitous Systems: computing, networking, and services (MobiQuitous 2010), LNICST 73, pp 198–209
Katz JE (2008) Hand book of mobile communication studies. The MIT Press, Cambridge
Katz J (2010) Digital signatures. Springer, New York
Kumari A, Kumar V, Abbasi MY, Kumari S, Chaudhary P, Chen CM (2020) CSEF: cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access 8(3):107838–107852
Liao Y, He Y, Li F, Zhou S (2017) Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput Stand Interfaces. https://doi.org/10.1016/j.csi.2017.09.008
Pfleeger CP, Pfleeger SK (2002) Security in computing. In: Prentice Hall Professional Technical Reference, pp 182–202
Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361369
Qin Z, Sun J, Wahaballa A (2017) A secure and privacy-preserving moblie wallet with outsoured verification in cloud computing. Comput Stand Interfaces 54:55–60
Shamir A (1984) Identity-based cryptosystems and signature schemes, vol 21, no 2, pp 47–53
Shao J, Wei G, Ling Y, Xie M (2011) Unidirectional identity-based proxy re-signature. In: IEEE International Conference on Communications, pp 1–5
Suchithra M, Baskar M, Ramkumar J, Kalyanasundaram P, Amutha B (2020) Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-02056-1
Sureshkumar V, Ramalingam A, Rajamanickam N, Amin R (2017) A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Comput Electric Eng 57:223–240
Tang F, Ma S, Xiang Y, Lin C (2019) An efficient authentication scheme for Blockchain-based electronic health records. IEEE Access 7(3):41678–41689
The pairing-based cryptography library (PBC). https://crypto.stanford.edu/pbc/
Vergnaud D (2008) Multi-use unidirectional proxy re-signatures. In: ACM conference on computer and communications security, pp 511–520
Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inf Forensics Secur 9(12):2327–2339
Xiong H, Sun J (2017) Comments on verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Dependable Secure Comput 14(4):461–462
Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10(7):1442–1455
Xiong H, Mei Q, Zhao Y (2018a) Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Syst J. https://doi.org/10.1109/JSYST.2018.2890126
Xiong H, Zhang H, Sun J (2018b) Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst J. https://doi.org/10.1109/JSYST.2018.2865221
Yang JH, Lin PY (2016) A mobile payment mechanism with anonymity for cloud computing. J Syst Softw 116:69–74
Yeh KH (2017) A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments. IEEE Syst J. https://doi.org/10.1109/JSYST.2017.2668389
Zhang Z, Wong DS, Xu J, Feng D (2006) Certificateless PublicKey signature: security model and efficient construction. In: 4th International Conference on Applied Cryptography and Network Security (ACNS 2006), LNCS 3989, pp 293–308
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Saranya, A., Naresh, R. Cloud based efficient authentication for mobile payments using key distribution method. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-020-02765-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-020-02765-7