Cloudbank: A Secure Anonymous Banking Cloud
In this paper a novel banking framework residing over the cloud storage architecture for electronic payment which takes place over the Internet is presented. It implements electronic cash-based transactions, between customers and merchants through the CloudBank. It is based on a bank account, though it can be easily extended and can be readily applied to other account payment models like debit cards. The proposed architecture is designed using Millicent’s main concept (scrip) technique. In this architecture, financial institutions become partners in the e-commerce transaction, conducted by their customers over the Internet. The innovation of the proposed framework is the removal of the involvement of the financial institutions to ancillary support services like helping on establishing trust between the parties payment transaction. Moreover, the proposed system can be characterized as distributed virtual banking environment provided to users (customers/merchants) authorizing all payments taking place between them. Finally, in this architecture e-cash once used is never used again so all the e-transactions are secure.
Unable to display preview. Download preview PDF.
- 1.IAIK Java Group. IAIK Java Crypto Software, http://jce.iaik.tu-graz.ac.at/
- 2.Amazon.com, Inc., http://www.amazon.com/
- 3.eBay, Inc., http://www.ebay.com/
- 4.Wal-Mart, http://www.walmart.com/
- 5.Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The Millicent protocol for inexpensive electronic commerce. In: Proceeding of the 4th International World Wide Conference, pp. 603–618 (1995)Google Scholar
- 6.Executive Summary on Electronic Commerce, http://www.big-world.org/upload/cahp1.htm
- 7.Armbrust, M., Fox, A., Griffith, R., et al.: Above the Clouds: A Berkeley View Cloud Computing, Technical Report No. UCB/EECS-2009-28, http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
- 8.Lee, Z.Y., Yu, H.C., Kuo, P.J.: An analysis and comparison of different types of electronic payment systems. In: Management of Engineering and Technology, PICMET 2001, vol. 2, pp. 38–45 (2001)Google Scholar
- 9.Netscape Inc., SSL Protocol, http://home.netscape.com/newsref/std/SSL.html
- 10.Nentwich, F., Kirda, E., Kruegel, C.: Secure Systems Lab, Technical University Vienna: Practical Security Aspects of Digital Signature Systems. Technical Report (2006)Google Scholar
- 11.Wallish, P.: Cyber view: How to steal millions in champ change, pp. 32–33. Science AmericanGoogle Scholar
- 12.Rivest, R.: The MD5 Message-Digest Algorithm, IETF RFC 1321, http://gopher.ds2.internic.net/00/rfc/rfc1321.txt
- 13.National Institute for Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1: Secure Hash Standard (April 1995), http://csrc.ncsl.nist.gov/fips/fip180-1.txt