Skip to main content

2022 | OriginalPaper | Buchkapitel

Validate Merchant Server for Secure Payment Using Key Distribution

verfasst von : A. Saranya, R. Naresh

Erschienen in: Cyber Security, Privacy and Networking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, growing and competitiveness of a financial sector and e-healthcare application developed rapidly and quicker ever so that mobile payment plays a vital role to make easier and quicker. In the existing paper, the cloud transmits the hash value straight to the merchant server without checking for fraud. This paper aims to provide a secure authentication mechanism between the cloud and the merchant server to avoid fraudulent merchant servers. For trustworthiness, our proposed system introduces secure key distribution between cloud and merchant server named as validate merchant server key distribution protocol (VMSKDP). Our proposed system improves security for mobile payments and reduces attacks like man-in-middle attacks, denial-of-service, etc.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Huang X, Susilo W, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Proceedings of Fourth International Conference on cryptology and network security (CANS ’05), pp 13–25 Huang X, Susilo W, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Proceedings of Fourth International Conference on cryptology and network security (CANS ’05), pp 13–25
2.
Zurück zum Zitat Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inf For Secur 9(12):2327–2339CrossRef Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inf For Secur 9(12):2327–2339CrossRef
3.
Zurück zum Zitat Coron JS (2000) On the exact security of full domain hash. Advances in cryptology-CRYPTO 2000. LNCS 1880, pp 229–235 Coron JS (2000) On the exact security of full domain hash. Advances in cryptology-CRYPTO 2000. LNCS 1880, pp 229–235
5.
Zurück zum Zitat Katz EJ (2008) Hand book of mobile communication studies. The MIT Press Katz EJ (2008) Hand book of mobile communication studies. The MIT Press
11.
Zurück zum Zitat Qin Z, Sun J, Wahaballa A (2017) A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput Stand Interfaces 54:55–60CrossRef Qin Z, Sun J, Wahaballa A (2017) A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput Stand Interfaces 54:55–60CrossRef
12.
Zurück zum Zitat Bellare M, Garay J, Rabin T (1998) Batch verification of short signatures. In: International conference on the theory and applications of cryptographic techniques, pp 236–250 Bellare M, Garay J, Rabin T (1998) Batch verification of short signatures. In: International conference on the theory and applications of cryptographic techniques, pp 236–250
13.
Zurück zum Zitat Taparia A, Panigrahy SK, Jena SK (2017) Secure key exchange using enhanced Diffie Hellman protocol based on string comparison. IEEE WiSPNET 2017 conference Taparia A, Panigrahy SK, Jena SK (2017) Secure key exchange using enhanced Diffie Hellman protocol based on string comparison. IEEE WiSPNET 2017 conference
14.
Zurück zum Zitat Tasi J-L, Lo N-W, Wu T-C (2012) Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int J Commun Syst Tasi J-L, Lo N-W, Wu T-C (2012) Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int J Commun Syst
15.
Zurück zum Zitat Wang L, Chen K, Long Y, Mao X, Wang H (2015) A modified efficient certificateless signature scheme without bilinear pairings. In: 2015 International conference on intelligent networking and collaborative systems Wang L, Chen K, Long Y, Mao X, Wang H (2015) A modified efficient certificateless signature scheme without bilinear pairings. In: 2015 International conference on intelligent networking and collaborative systems
16.
Zurück zum Zitat Peng G, Ping L (2014) Further improvement of a certificateless signature scheme without pairing. Int J Commun Syst 27:2083–2091 Peng G, Ping L (2014) Further improvement of a certificateless signature scheme without pairing. Int J Commun Syst 27:2083–2091
17.
Zurück zum Zitat He D, Chen J, Zhang R (2011) An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst He D, Chen J, Zhang R (2011) An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst
18.
Zurück zum Zitat Tsai J-L, A new efficient certificateless short signature scheme using bilinear pairings. IEEE Syst J Tsai J-L, A new efficient certificateless short signature scheme using bilinear pairings. IEEE Syst J
19.
Zurück zum Zitat Bodur H, Kara R (2017) Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission. In: 2017 9th International conference on computational intelligence and communication networks Bodur H, Kara R (2017) Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission. In: 2017 9th International conference on computational intelligence and communication networks
21.
Zurück zum Zitat Sung S, Youn C, Kon E, Ryou J (2015) User authentication using mobile phones for mobile payment. In: 2015 IEEE Sung S, Youn C, Kon E, Ryou J (2015) User authentication using mobile phones for mobile payment. In: 2015 IEEE
24.
Zurück zum Zitat Naresh R, Vijayakumar P, Jegatha Deborah L, Sivakumar R (2020) “A novel trust model for secure group communication in distributed computing”, special issue for security and privacy in cloud computing. J Organ End User Comput, IGI Global 32(3) Naresh R, Vijayakumar P, Jegatha Deborah L, Sivakumar R (2020) “A novel trust model for secure group communication in distributed computing”, special issue for security and privacy in cloud computing. J Organ End User Comput, IGI Global 32(3)
25.
Zurück zum Zitat Naresh R, Sayeekumar M, Karthick GM, Supraja P (2019) Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm. Soft Comput 23(8):2561–2574 (Springer) Naresh R, Sayeekumar M, Karthick GM, Supraja P (2019) Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm. Soft Comput 23(8):2561–2574 (Springer)
26.
Zurück zum Zitat Naresh R, Gupta A, Sanghamitra (2020) Malicious url detection system using combined svm and logistic regression model. Int J Adv Res Eng Technol (IJARET) 10(4):63–73 Naresh R, Gupta A, Sanghamitra (2020) Malicious url detection system using combined svm and logistic regression model. Int J Adv Res Eng Technol (IJARET) 10(4):63–73
27.
Zurück zum Zitat Meenakshi M, Naresh R, Pradeep S (2019) Smart home: security and acuteness in automation of IOT sensors. Int J Innovative Technol Exploring Eng (IJITEE) 9(1):3271–3274 Meenakshi M, Naresh R, Pradeep S (2019) Smart home: security and acuteness in automation of IOT sensors. Int J Innovative Technol Exploring Eng (IJITEE) 9(1):3271–3274
Metadaten
Titel
Validate Merchant Server for Secure Payment Using Key Distribution
verfasst von
A. Saranya
R. Naresh
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_9

Neuer Inhalt