Skip to main content
Log in

Accountable mobile E-commerce scheme in intelligent cloud system transactions

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The vivid and rapid development of the Internet motivates cloud-based intelligent information systems to be applied. Mobile e-commerce, as a new business model based on cloud computing in intelligent service, has become the mainstream of mobile applications. It not only provides efficient computation services for both trading parties, but also gives a secure and reliable data storage center. However, privacy and accountability have become one of users’ crucial concerns in mobile e-commerce transactions. In this paper, we present a practical and efficient accountable mobile e-commerce scheme that is based on cloud platform to address the fundamental transaction requirement. We propose the concrete construction and demonstrate that the proposed scheme can provide effective security in the transaction process, and also give the practical deployment in cloud computing systems to provide the intelligent information services. We also give the performance analysis and show it is efficient and practical compared with related methods in terms of computation complexity and communication costs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Biswas D, Vidyasankar K (2014) Privacy preserving and transactional advertising for mobile services. Computing 96(7):613–630

    Article  Google Scholar 

  • Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Advances in Cryptology-CRYPTO 2001, Springer, pp 213–229

  • Brown A, Mortier R, Rodden T (2012) Multinet: usable and secure wifi device association. ACM SIGCOMM Comput Commun Rev 42(4):275–276

    Article  Google Scholar 

  • Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In: High Performance Computing and Communications, 2008. HPCC’08. 10th IEEE International Conference on, IEEE, pp 5–13

  • Canard S, Fuchsbauer G, Gouget A, Laguillaumie F (2012) Plaintext-checkable encryption. Topics in Cryptology-CT-RSA 2012:332–348

  • Duarte M, Sabharwal A, Aggarwal V, Jana R, Ramakrishnan K, Rice CW, Shankaranarayanan N (2012) Design and characterization of a full-duplex multiantenna system for wifi networks. IEEE Trans Vehicular Technol 63(3):1160–1177

    Article  Google Scholar 

  • Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716

    Article  Google Scholar 

  • Gentry C (2006) Practical identity-based encryption without random oracles. Eurocrypt, Springer 4004:445–464

  • Ghosh AK, Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce. Commun ACM 44(2):51–57

    Article  Google Scholar 

  • Han CK, Choi HK (2013) Security analysis of handover key management in 4g lte/sae networks. IEEE Trans Mobile Comput 13(2):457–468

    Article  Google Scholar 

  • Han J, Yang Y, Huang X, Yuen TH, Li J, Cao J (2016) Accountable mobile e-commerce scheme via identity-based plaintext-checkable encryption. Inf Sci 345:143–155

    Article  Google Scholar 

  • Hwang RH, Huang CF, Lin CH, Chung CY (2015) Context-aware multimedia broadcast and multicast service area planning in 4g networks. Comput Commun 64:33–43

    Article  Google Scholar 

  • Jo HJ, Paik JH, Lee DH (2014) Efficient privacy-preserving authentication in wireless mobile networks. IEEE Trans Mobile Comput 13(7):1469–1481

    Article  Google Scholar 

  • Kim Y, Shin H, Chon Y, Cha H (2015) Crowdsensing-based wi-fi radio map management using a lightweight site survey. Comput Commun 60:86–96

    Article  Google Scholar 

  • Kolodziej J, Xhafa F (2011) Supporting situated computing with intelligent multi-agent systems. Int J Space-Based Situated Comput 1(1):30–42

    Article  Google Scholar 

  • Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inf Sci 328:389–402

    Article  Google Scholar 

  • Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458–470

    Article  Google Scholar 

  • Miracl L (2017) Miracl cryptographic library: multiprecision integer and rational arithmetic c/c++ library. https://www.miracl.com/

  • Park JH, Lee DH (2016) An efficient ibe scheme with tight security reduction in the random oracle model. Des, Codes Cryptogr 79(1):63–85

    Article  MathSciNet  Google Scholar 

  • Paterson KG, Schuldt JC (2006) Efficient identity-based signatures secure in the standard model. In: Australasian Conference on Information Security and Privacy, Springer, pp 207–222

  • Seo JH, Emura K (2014) Revocable hierarchical identity-based encryption. Theor Comput Sci 542:44–62

    Article  MathSciNet  Google Scholar 

  • Shamir A et al (1984) Identity-based cryptosystems and signature schemes. Crypto, Springer 84:47–53

  • Shen J, Chang S, Shen J, Liu Q, Sun X (2016) A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Comput Syst 78:956–963

    Article  Google Scholar 

  • Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Transactions on Information Forensics and Security

  • Tang C, Wu DO (2008) Mobile privacy in wireless networks-revisited. IEEE Trans Wireless Commun 7(3):1035–1042

    Article  Google Scholar 

  • Torres-Sospedra J, Montoliu R, Trilles S, scar Belmonte, Huerta J, (2015) Comprehensive analysis of distance and similarity measures for wi-fi fingerprinting indoor positioning systems. Expert Systems with Applications 42(23):9263–9278

    Article  Google Scholar 

  • Varshney U, Jain R (2001) Issues in emerging 4g wireless networks. Computer 34(6):94–96

    Article  Google Scholar 

  • Wang S (2007) Practical identity-based encryption (ibe) in multiple pkg environments and its applications. arXiv preprint cs/0703106

  • Waters B (2005) Efficient identity-based encryption without random oracles. Eurocrypt, Springer 3494:114–127

  • Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel and Distributed Syst 27(2):340–352

    Article  Google Scholar 

  • Yang B, Liu H (2010) Cloud computing is a driving force for mobile internet development. Telicom Eng Technics Stand 23(12):24–27

    Google Scholar 

  • Yang J, Zheng Y (2012) Reconstruction of traditional e-commerce system based on workflow technology. In: Computer Science and Network Technology (ICCSNT), 2011 International Conference on, IEEE, vol 3, pp 1927–1931

  • Ye S, Xiao L (2013) Designation and realization of mobile commerce interaction model under cloud computing platform. Comput Sci 40(6A):247–250

    Google Scholar 

  • Zhang M, Mu Y (2016) Token-leakage tolerant and vector obfuscated ipe and application in privacy- preserving two-party point/polynomial evaluations. Comput J 59(4):493–507

    Article  Google Scholar 

  • Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Utility Comput 6(2):91–97

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under grants 61672010, 61370224 and 61702168, and the Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes of Guangzhou University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingwu Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, M., Yao, Y., Jiang, Y. et al. Accountable mobile E-commerce scheme in intelligent cloud system transactions. J Ambient Intell Human Comput 9, 1889–1899 (2018). https://doi.org/10.1007/s12652-017-0672-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-017-0672-4

Keywords

Navigation