118,668 research outputs found
A secure electronic Murabaha transaction
Conventional credit card transactions are not consistent with Islamic principles, as exemplified by the Islamic banking system and the ‘Murabaha sale’. Thus, if Islamic principles are to be applied to e-commerce, where credit card transactions are the norm, a new and secure electronic payment process is required. In this paper we present a method for secure electronic Murabaha transactions. After introducing the notion of Murabaha sale within the Islamic banking framework, we describe a general model for a secure electronic Murabaha transaction, and then consider the associated security risks. Security requirements are then identified for a secure electronic Murabaha transaction. We then present the Secure Electronic Murabaha Transaction (SEMT), designed to address the identified security requirements. Finally, we analyse how the proposed protocol matches the identified security requirements. 1
A Secure on-line credit card transaction method based on Kerberos Authentication protocol
Nowadays, electronic payment system is an essential part of modern business. Credit cards or debit cards have been widely used for on-site or remote transactions, greatly reducing the need for inconvenient cash transactions. However, there have been a huge number of incidents of credit card frauds over the Internet due to the security weakness of electronic payment system. A number of solutions have been proposed in the past to prevent this problem, but most of them were inconvenient and did not satisfy the needs of cardholders and merchants at the same time.
In this thesis, we present a new secure card payment system called NNCC (No Number Credit Card) that significantly reduces the possibility of credit card frauds. This scheme is primarily designed for on-line shopping. NNCC is based on the Kerberos cryptographic framework that has been proven to be secure after being used in real world for decades. In this proposed system, instead of card numbers, only the payment tokens are exchanged between the buyers and merchants. The token is generated based on the payment amount, the client information, and merchant information. However it does not contain the credit card number, so the merchant cannot acquire and illegally use the credit card number. A token is cryptographically secure and valid only for the designated merchant, so it is robust against eavesdropping.
This thesis describes the underlying cryptographic schemes, the operating principles, and the system design. It explains the concept of Kerberos and the background in Cryptography. Then it discusses the new proposed system and the associated payment processes. We have implemented a proof-of-concept prototype comprised of ecommerce web sites, client modules, payment server, and database. We show the architecture and protocol of the system, and discuss the performance
Towards Applying Cryptographic Security Models to Real-World Systems
The cryptographic methodology of formal security analysis usually works in three steps:
choosing a security model, describing a system and its intended security properties, and creating a formal proof of security.
For basic cryptographic primitives and simple protocols this is a well understood process and is performed regularly.
For more complex systems, as they are in use in real-world settings it is rarely applied, however.
In practice, this often leads to missing or incomplete descriptions of the security properties and requirements of such systems, which in turn can lead to insecure implementations and consequent security breaches.
One of the main reasons for the lack of application of formal models in practice is that they are particularly difficult to use and to adapt to new use cases.
With this work, we therefore aim to investigate how cryptographic security models can be used to argue about the security of real-world systems.
To this end, we perform case studies of three important types of real-world systems: data outsourcing, computer networks and electronic payment.
First, we give a unified framework to express and analyze the security of data outsourcing schemes.
Within this framework, we define three privacy objectives: \emph{data privacy}, \emph{query privacy}, and \emph{result privacy}.
We show that data privacy and query privacy are independent concepts, while result privacy is consequential to them.
We then extend our framework to allow the modeling of \emph{integrity} for the specific use case of file systems.
To validate our model, we show that existing security notions can be expressed within our framework and we prove the security of CryFS---a cryptographic cloud file system.
Second, we introduce a model, based on the Universal Composability (UC) framework, in which computer networks and their security properties can be described
We extend it to incorporate time, which cannot be expressed in the basic UC framework, and give formal tools to facilitate its application.
For validation, we use this model to argue about the security of architectures of multiple firewalls in the presence of an active adversary.
We show that a parallel composition of firewalls exhibits strictly better security properties than other variants.
Finally, we introduce a formal model for the security of electronic payment protocols within the UC framework.
Using this model, we prove a set of necessary requirements for secure electronic payment.
Based on these findings, we discuss the security of current payment protocols and find that most are insecure.
We then give a simple payment protocol inspired by chipTAN and photoTAN and prove its security within our model.
We conclude that cryptographic security models can indeed be used to describe the security of real-world systems.
They are, however, difficult to apply and always need to be adapted to the specific use case
Recommended from our members
A multi-agent architecture for electronic payment
The Internet has brought about innumerable changes to the way enterprises do business. An essential problem to be solved before the widespread commercial use of the Internet is to provide a trustworthy solution for electronic payment. We propose a multi-agent mediated electronic payment architecture in this paper. It is aimed at providing an agent-based approach to accommodate multiple e-payment schemes. Through a layered design of the payment structure and a well-defined uniform payment interface, the architecture shows good scalability. When a new e-payment scheme or implementation is available, it can be plugged into the framework easily. In addition, we construct a framework allowing multiple agents to work cooperatively to realize automation of electronic payment. A prototype has been built to illustrate the functionality of this design. Finally we discuss the security issues
Recommended from our members
A modularized electronic payment system for agent-based e-commerce
With the explosive growth of the Internet, electronic-commerce (e-commerce) is an increasingly important segment of commercial activities on the web. The Secure Agent Fabrication, Evolution & Roaming (SAFER) architecture was proposed to further facilitate e-commerce using agent technology. In this paper, the electronic payment aspect of SAFER will be explored. The Secure Electronic Transaction (SET) protocol and E-Cash were selected as the bases for the electronic payment system implementation. The various modules of the payment system and how they interface with each other are shown. An extensible implementation done using JavaTM will also be elaborated. This application incorporates agent roaming functionality and the ability to conduct e-commerce transactions and carry out intelligent e-payment procedures
A Framework for M-Commerce Implementation in Nigeria
The Internet has brought about the concept of grobalilation, which has
revolutionized the way business is transacted all over the world. The E-comnterce
is of particular interest, though widely used but still has some security challenges
in terms of transparency and confidentiality of transactiorts. This papei focuses
on M-contnrcrce as an extensiott to E-commerce hnplementatiott with the Bankiltg
industry proposed as core implementation consideration in ortler to guarantee
high level security. We have reviewed some cqses of onlilrc frauds and eliscussed
tlte emerging critical issues afficting software development of M-cornmerce
applicatiotts. Afranrcworkfor M-commerce implementationis therefore,proposed
for countries such as Nigeria, Romania and Indonesia where cases of online
scam are alanning
Design of a secure unified e-payment system in Nigeria: A case study
The automatic teller machine (ATM) is the most widely used e-Payment instrument in Nigeria. It is responsible for about 89% (in volume) of all e-Payment instruments since 2006 to 2008. Some customers have at least two ATM cards depending on the number of accounts operated by them and
they represent the active users of the ATM cards. Furthermore, identity theft has been identified as one
of the most prominent problems hindering the wider adoption of e-Business, particularly e-Banking, hence the need for a more secure platform of operation. Therefore, in this paper we propose a unified (single) smart card-based ATM card with biometric-based cash dispenser for all banking transactions.
This is to reduce the number of ATM cards carried by an individual and the biometric facility is to introduce another level of security in addition to the PIN which is currently being used. A set of questionnaire was designed to evaluate the acceptability of this concept among users and the architecture of the proposed system is presented
- …