Cloudbank: A Secure Anonymous Banking Cloud

  • Ridhi Sood
  • Meenakshi Kalia
Part of the Communications in Computer and Information Science book series (CCIS, volume 94)

Abstract

In this paper a novel banking framework residing over the cloud storage architecture for electronic payment which takes place over the Internet is presented. It implements electronic cash-based transactions, between customers and merchants through the CloudBank. It is based on a bank account, though it can be easily extended and can be readily applied to other account payment models like debit cards. The proposed architecture is designed using Millicent’s main concept (scrip) technique. In this architecture, financial institutions become partners in the e-commerce transaction, conducted by their customers over the Internet. The innovation of the proposed framework is the removal of the involvement of the financial institutions to ancillary support services like helping on establishing trust between the parties payment transaction. Moreover, the proposed system can be characterized as distributed virtual banking environment provided to users (customers/merchants) authorizing all payments taking place between them. Finally, in this architecture e-cash once used is never used again so all the e-transactions are secure.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    IAIK Java Group. IAIK Java Crypto Software, http://jce.iaik.tu-graz.ac.at/
  2. 2.
    Amazon.com, Inc., http://www.amazon.com/
  3. 3.
  4. 4.
  5. 5.
    Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The Millicent protocol for inexpensive electronic commerce. In: Proceeding of the 4th International World Wide Conference, pp. 603–618 (1995)Google Scholar
  6. 6.
    Executive Summary on Electronic Commerce, http://www.big-world.org/upload/cahp1.htm
  7. 7.
    Armbrust, M., Fox, A., Griffith, R., et al.: Above the Clouds: A Berkeley View Cloud Computing, Technical Report No. UCB/EECS-2009-28, http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
  8. 8.
    Lee, Z.Y., Yu, H.C., Kuo, P.J.: An analysis and comparison of different types of electronic payment systems. In: Management of Engineering and Technology, PICMET 2001, vol. 2, pp. 38–45 (2001)Google Scholar
  9. 9.
  10. 10.
    Nentwich, F., Kirda, E., Kruegel, C.: Secure Systems Lab, Technical University Vienna: Practical Security Aspects of Digital Signature Systems. Technical Report (2006)Google Scholar
  11. 11.
    Wallish, P.: Cyber view: How to steal millions in champ change, pp. 32–33. Science AmericanGoogle Scholar
  12. 12.
    Rivest, R.: The MD5 Message-Digest Algorithm, IETF RFC 1321, http://gopher.ds2.internic.net/00/rfc/rfc1321.txt
  13. 13.
    National Institute for Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1: Secure Hash Standard (April 1995), http://csrc.ncsl.nist.gov/fips/fip180-1.txt

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Ridhi Sood
    • 1
  • Meenakshi Kalia
    • 1
  1. 1.Shobhit Institute of Engineering and TechnologyUPTU MeerutIndia

Personalised recommendations