Abstract
Abstract: In this paper the need to develop an accountable anonymity scheme specifically for mobile e-commerce is established. The requirements of such a scheme are identified and shortfalls in existing anonymity services are identified. A novel approach based on the concept of unlinking processes to prevent any meaningful collation of information on a particular on-line identity being performed is discussed. We then propose (in outline) an anonymity scheme based on this concept that will then be extended to provide accountability through on-line revocation.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35586-3_46
Chapter PDF
Similar content being viewed by others
Key words
References
Buttyan et al(1999) Levente Buttyan and Jean-Pierre Hubaux. Accountable anonymous access to services in mobile communication systems. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, page 384, 1999.
Camenisch et al(2000) J.~Camenisch and A.~Lysyanskaya*. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Research report rz 3295 (93341), IBM Zurich Research Laboratory and *MIT, 2000. (Found at http://www.zurich.ibm.com on 6 Dec 00).
CMU Carnegie~Mellon University. Netbill. (http://www.ini.cmu.edu/NETBILL/home.html)
Chaum (1981) David Chaum. Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM, 24(2):84, 1981.
Chaum (1985) David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030, 1985.
Cybercash Cybercash. (http://wwvv.cybercash.com.)
Digicash DigiCash. Ecash by digicash. (http://www.digicash.com/ecash/ecash-home.html).
E-gold E-gold. (http://www.e-gold.com).
IBM IBM. Ibm micro payments. (http://www.hrl.il.ibm.com/mpay).
Jokela (1999) Petri Jokela. Wireless internet access using anonymous access methods. IEEE 1999 International Workshop On Mobile Multimedia Communications (MoMuC’99), page 194, 1999.
Lacoste et al (1998) G.~Lacoste et~-~al. Semper — secure electronic marketplace for europe. LNCS, (1854), 1998.
Marchai et al(1998) B.~Marchai N.~Mikula B.~Peat, D.~Webber et~al. Guidelines for using xml for electronic data interchange. Open standard, XML/EDI Group, 1998. (Home Page URL: http://www.xmledi.org).
Mondex Mondex. Mondex electronic cash. (http://www.mondex.com).
Nicolle (2000) Lindsay Nicolle. Life by phone The British Computer Society: The Computer Bulletin, 2(6):20, 2000.
OBI Consortium (1999) OBI Consortium. Open buying on the internet — technical specifications v2.1 Technical report, OBI Consortium, 1999. (Found at www.openbuy.com, on 16 April 01).
Oppliger (1999) R. Oppliger. Shaping the research agenda for security in e-commerce. Proceedings of the 10th International Workshop on Database and Expert Systems Applications, page 810, 1999.
Peat et al (1997) B.~Peat and D.-Webber. Introducing xml/edi — the e-business framework. (http://www.geocities.com/WallStreet/Floor/5815/guide.htm), 1997.
Pipkin (1998) D.~L. Pipkin. Information Security — Protecting The Global Enterprise. Prentice Hall, 2000.
Preneel (1999) Bart~Preneel Joris~ ~Claessens and Joos Vandewalle. Solutions for anonymous communication on the internet. Proceedings of the IEEE 33rd Annual International Carnahan Conference on Security technology, page 298, 1999.
Reiter et al (1998) Michael~K. Reiter and Aviel~D. Rubin. Crowds: Anonymity for web transactions. ACM Transactions on Information and Systems Security, 1(1):66, 1998.
RosettaNet RosettaNet. Rosettanet overview. (http://www.rosettanet.org found April 2001).
Shi et al (1997) Qi~~Shi Bob~Askwith, Madjid~Merabti and Keith Whiteley. Achieving user privacy in mobile networks. IEEE Proceedings of the 13th Annual Computer Security Applications Conference), page 108, 1997.
Shi et al(2000) Q~Shi N~Zhang and M~Merabti. Anonymous public-key certificates for anonymous and fair document exchange). IEE Proceedings on Communications, 147(6):345, 2000.
Shields (2000) Clay Shields and Brian—N. Levine. A protocol for anonymous communication over the internet. Proceedings of the 7th ACM Conference on Computer and Communication Security, page~33, 3, 2000.
Syverson (1998) P.F.~~Syverson M.~G.~Reed and D.M. Goldschlag. Anonymous connections and onion routing. IEEE Journal On Selected Areas in Communications, 16(4):482, 1998.
Waidner (1998) M.~Waidner. Open issues in secure electronic commerce. Research report rz 3070 (93116), IBM Zurich Research Laboratory, 1998. (Found at http://www.zurich.ibm.com on 22 Nov 00).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Critchlow, D., Zhang, N. (2002). An Insight into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. In: Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K. (eds) Security in the Information Society. IFIP Advances in Information and Communication Technology, vol 86. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35586-3_33
Download citation
DOI: https://doi.org/10.1007/978-0-387-35586-3_33
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1026-7
Online ISBN: 978-0-387-35586-3
eBook Packages: Springer Book Archive