Advertisement

Verification of Money Atomicity in Digital Cash Based Payment System

  • Girish Chandra
  • Divakar Yadav
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7671)

Abstract

Digital cash, analogous to the paper cash, is a certificate that carries a value. It is issued by an authorized entity and is verifiable by all. It can be used as an instrument for making payments or purchases. Unlike paper cash, being a digital data, it may be easily replicated which gives a scope for duplicate spending of the cash certificates. Digital cash based payment systems can be classified as business critical systems as any failure may lead to loss of trust. Verification of critical requirements of such systems is therefore essential. In this paper, we present refinement approach for construction of the models of the digital cash based payment system using Event-B, wherein we verify how money atomicity property can be preserved in these systems. This ensures that money is neither generated nor destroyed in the electronic payment transactions.

Keywords

Formal Method Event-B Digital Cash Verification 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abrial, J.R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press, Cambridge (2010)zbMATHGoogle Scholar
  2. 2.
    Abrial, J.R.: A System Development Process with Event-B and the Rodin Platform. In: Butler, M., Hinchey, M.G., Larrondo-Petrie, M.M. (eds.) ICFEM 2007. LNCS, vol. 4789, pp. 1–3. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Abrial, J.-R.: Train Systems. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 1–36. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Abrial, J.-R., Cansell, D., Méry, D.: A mechanically proved and incremental development of IEEE 1394 tree identify protocol. Formal Aspects of Computing 14(3), 215–227 (2003)CrossRefGoogle Scholar
  5. 5.
    Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET Purchase Protocols. Journal of Automated Reasoning 36(1-2), 5–37 (2006)zbMATHCrossRefGoogle Scholar
  6. 6.
    Bella, G., Massacci, F., Paulson, L., Tramontano, P.: Formal Verification of Card holder Registration in SET. IEEE Journal on Selected Areas in Communications 21(1), 77–87 (2003)CrossRefGoogle Scholar
  7. 7.
    Butler, M., Yadav, D.: An incremental development of the mondex system in Event-B. Formal Aspects of Computing 20(1), 61–77 (2008)CrossRefGoogle Scholar
  8. 8.
    Butler, M.: On the use of data refinement in the development of secure communications systems. Formal Aspects of Computing 14(1), 2–34 (2002)zbMATHCrossRefGoogle Scholar
  9. 9.
    Butler, M.: An Approach to the Design of Distributed Systems with B AMN. In: Bowen, J.P., Hinchey, M.G., Till, D. (eds.) ZUM 1997. LNCS, vol. 1212, pp. 223–241. Springer, Heidelberg (1997)Google Scholar
  10. 10.
    Chandra, G., Yadav, D.: Analyzing Data Flow in Trustworthy Electronic Payment Systems Using Event-B. In: Kannan, R., Andres, F. (eds.) ICDEM 2010. LNCS, vol. 6411, pp. 325–332. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  11. 11.
    Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)Google Scholar
  12. 12.
    Freitas, L., Woodcock, J.: Mechanising Mondex with Z/Eves. Formal Aspects of Computing 20(1), 117–139 (2008)CrossRefGoogle Scholar
  13. 13.
    Gouda, M.G., Liu, A.X.: Formal Specification and Verification of a Secure Micropayment Protocol. International Journal of Network Security 7(1), 81–87 (2008)Google Scholar
  14. 14.
    Haneberg, D., Grandy, H., Reif, W., Schellhorn, G.: Verifying Smart Card Applications: An ASM Approach. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 313–332. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  15. 15.
    Heintze, N., Tygar, J.D., Wing, J., Chi Wong, H.: Model checking electronic commerce protocols. In: Proc. of the Second USENIX Workshop on Electronic Commerce, Oakland, California, pp. 147–164 (1996)Google Scholar
  16. 16.
    Katsaros, P.: A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach. Information and Software Technology 51(2), 235–257 (2009)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Kessler, V., Neumann, H.: A Sound Logic for Analysing Electronic Commerce Protocols. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 345–360. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  18. 18.
    Laibinis, L., Troubitsyna, E., Leppänen, S., Lilius, J., Malik, Q.A.: Formal Service-Oriented Development of Fault Tolerant Communicating Systems. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 261–287. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  19. 19.
    Lu, S., Smolka, S.: Model Checking the Secure Electronic Transaction (SET) Protocol. In: Proc. of 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 358–365. IEEE Computer Society, Washington, DC (1999)Google Scholar
  20. 20.
    Meadows, C., Syverson, P.: A Formal Specification of Requirements for Payment Transactions in the SET Protocol. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 122–140. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  21. 21.
    Panti, M., Spalazzi, L., Tacconi, S., Valenti, S.: Automatic verification of security in payment protocols for electronic commerce. In: Piattini, M., Filipe, J., Braz, J. (eds.) Enterprise Information Systems IV, pp. 276–282. Kluwer Academic Publishers, MA (2003)Google Scholar
  22. 22.
    Prisco, R.D., Fekete, A., Lynch, N., Shvartsman, A.: A dynamic view-oriented group communication service. In: PODC 1998: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pp. 227–236. ACM Press, NY (1998)CrossRefGoogle Scholar
  23. 23.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, Inc., Singapore (1996)zbMATHGoogle Scholar
  24. 24.
    Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: Formal methods: Practice and experience. ACM Computing Surveys 41(4), 1–36 (2009)CrossRefGoogle Scholar
  25. 25.
    Yadav, D., Butler, M.: Rigorous Design of Fault-Tolerant Transactions for Replicated Database Systems Using Event B. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 343–363. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Girish Chandra
    • 1
  • Divakar Yadav
    • 2
  1. 1.Institute of Engineering and TechnologyLucknowIndia
  2. 2.Department of Computer ScienceSouth Asian UniversityNew DelhiIndia

Personalised recommendations