Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wa...Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wallet protocols with outsourced verification in cloud computing were proposed. But in some of the protocols, there exist the risk of a colluding attack of the customer and the untrusted cloud server. In this paper, we propose an improved protocol, in which the payment information is protected by Hash function and random number. The malicious customer and cloud server cannot change the payment information to conduct a collusion forgery attack to defraud the merchant. The security analysis indicates that the proposed improved protocol can enhance the security in terms of correctness, unforgeability and traceability without increasing the computational burden.展开更多
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payme...Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies.展开更多
基于CoSE(cloud of secure elements)概念,提出一个NFC安全支付协议。根据CoSE架构部署一个可信云支付平台,使用虚拟SE替代硬件安全模块,所有交易项都由云支付平台完成;商户的POS终端充当消费者和云支付平台的通信桥梁,消费者的NFC设备...基于CoSE(cloud of secure elements)概念,提出一个NFC安全支付协议。根据CoSE架构部署一个可信云支付平台,使用虚拟SE替代硬件安全模块,所有交易项都由云支付平台完成;商户的POS终端充当消费者和云支付平台的通信桥梁,消费者的NFC设备和商户的POS终端通过射频场连接,消费者NFC设备不需要数据网络即可完成支付流程;交易过程中通过对交易双方身份信息与随机数进行hash运算,实现正常交易匿名性。通过安全性分析及实验验证了该协议的正确性和安全性。展开更多
基金Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)
文摘Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wallet protocols with outsourced verification in cloud computing were proposed. But in some of the protocols, there exist the risk of a colluding attack of the customer and the untrusted cloud server. In this paper, we propose an improved protocol, in which the payment information is protected by Hash function and random number. The malicious customer and cloud server cannot change the payment information to conduct a collusion forgery attack to defraud the merchant. The security analysis indicates that the proposed improved protocol can enhance the security in terms of correctness, unforgeability and traceability without increasing the computational burden.
文摘Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies.
文摘基于CoSE(cloud of secure elements)概念,提出一个NFC安全支付协议。根据CoSE架构部署一个可信云支付平台,使用虚拟SE替代硬件安全模块,所有交易项都由云支付平台完成;商户的POS终端充当消费者和云支付平台的通信桥梁,消费者的NFC设备和商户的POS终端通过射频场连接,消费者NFC设备不需要数据网络即可完成支付流程;交易过程中通过对交易双方身份信息与随机数进行hash运算,实现正常交易匿名性。通过安全性分析及实验验证了该协议的正确性和安全性。