scholarly journals An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving

2016 ◽  
Vol 2016 ◽  
pp. 1-14 ◽  
Author(s):  
Hong Zhong ◽  
Song Li ◽  
Ting-Fang Cheng ◽  
Chin-Chen Chang

With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.

2014 ◽  
Vol 513-517 ◽  
pp. 1748-1751
Author(s):  
Ping Teng

With the rapid development of network technology, the Internet and electronic commerce technology is unceasingly used, the application scope of computer application in the hospitality industry booming, online room-booking system also increasingly mature. In this paper, based on the analysis of the present situation of online room-booking system, conducts specific design and system implementation of online room-booking system.


Author(s):  
Peng Hu ◽  
Yongli Wang ◽  
Ahmadreza Vajdi ◽  
Bei Gong ◽  
Yongjian Wang

Road side units (RSUs) can act as fog nodes to perform data aggregation at the edge of network, which can reduce communication overhead and improve the utilization of network resources. However, because the RSU is public infrastructure, this feature may bring data security and privacy risks in data aggregation. In this paper, we propose a secure multi-subinterval data aggregation scheme, named SMDA, with interval privacy preservation for vehicle sensing systems. Specifically, our scheme combines the [Formula: see text] encoding theory and proxy re-encryption to protect interval privacy, this can ensure that the interval information is only known by the data center, and the RSU can classify the encrypted data without knowing the plaintext of the data and interval information. Meanwhile, our scheme employs the Paillier homomorphic encryption to accomplish data aggregation at the RSU, and the Identity-based batch authentication technology to solve authentication and data integrity. Finally, the security analysis and performance evaluations illustrate the safety and efficiency of our scheme.


1998 ◽  
Vol 07 (04) ◽  
pp. 315-329 ◽  
Author(s):  
MARTIN BICHLER ◽  
ARIE SEGEV ◽  
CARRIE BEAM

Distributed object standards provide a key to building interoperable applications that can run on a range of platforms. The paper describes a CORBA-based research prototype for an electronic broker in business-to-business electronic commerce. High-level IDL specifications are used to achieve interoperability between components of the electronic marketplace. The two key functionalities of the electronic broker are the ability to dynamically gather information from remote electronic catalogs and the support for negotiations through auction mechanisms. The paper discusses the functionality and the design of the electronic broker and gives an overview of current extensions of the prototype. As application-level interoperability is a crucial precondition for many brokerage services, we put special emphasis on electronic commerce protocol standards.


2004 ◽  
Vol 23 (4) ◽  
pp. 269-273
Author(s):  
Ihssan Alkadi ◽  
Ghassan Alkadi ◽  
Zhiwei Zhu

Since the beginning of the Internet, electronic commerce (E-commerce) has grown rapidly. The rapid development of information technology has brought many business opportunities for companies doing business in a global market. This paper discusses the issues that affect a company's business operations in a global market.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jinxin Zhang ◽  
Meng Wu

With the rapid development of the mobile internet and intelligent technology of in-vehicle equipment, the Internet of Vehicles (IoV), centered on intelligent connected cars, has gradually entered people’s lives. However, these technologies also bring serious privacy risks and security issues in terms of data transmission and storage. In this article, we propose a blockchain-based authentication system to provide vehicle safety management. The privacy and security attributes of various vehicle authentication transactions are based on high-level cryptographic primitives, realizing temporary and formal authentication methods. At the same time, a fair blockchain consensus mechanism Auction of block generation Rights (AoR) is proposed. To demonstrate the feasibility and scalability of the proposed scheme, security and performance analyses are presented. The relevant experimental results show that the scheme can provide superior decentralized management for IoV.


2021 ◽  
Author(s):  
Xianfei Zhou ◽  
Jing Huang ◽  
Fulong Chen ◽  
Yuqing Tang ◽  
Canlin Wang

Abstract With the rapid development of medical information, the medical cyber system is rapidly transforming, and medical information sharing faces new challenges. Blockchain technology is a revolutionary technology. It has the characteristics of tamper-proof and privacy-preserving, and has natural protection for big data systems, that can be used in medical systems. In this paper,we proposed to store medical cyber physical data in a mixed blockchain with private blockchain and consortium blockchain in order to realize the secure storage of medical cyber physical data by the tamper-resistant and sharing of blockchain technology. In the system, a threshold signature system based on blockhain is also proposed. Aiming at the situation that medical accidents are easy to occur in multidisciplinary joint consultation in the medical process, this paper proposes to use threshold signature for joint consultation. Using the security and threshold of threshold signature, treatment can be carried out when the threshold number is reached, and medical data can be uploaded to the consortium blockchain. The security analysis and performance analysis show that the scheme has advantages in safety and performance and is suitable for the medical environment to a certain extent.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Jabar Mahmood ◽  
Zongtao Duan ◽  
Heng Xue ◽  
Yun Yang ◽  
Michael Abebe Berwo ◽  
...  

The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle-to-vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper’s primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.’s scheme is incorrect, and resultantly, the scheme does not provide mutual authentication between a vehicle and vehicle server when multiple vehicles are registered with the vehicle sever. Furthermore, this paper proposes a secure message transmission scheme for V2V in VANETs. The proposed scheme fulfills the security and performance requirements of VANETs. The security analysis of the proposed scheme using formal BAN and informal discussion on security features confirm that the proposed scheme fulfills the security requirements, and the performance comparisons show that the proposed scheme copes with the lightweightness requirements of VANETs.


Author(s):  
Sattam Alamro ◽  
Asim El-Sheikh

Companies and institutions in the light of globalization and competitiveness are seeking to improve their services, particularly electronic access to excellence. With the tremendous growth in the global digital transactions, the entry of electronic commerce strongly in global business dealings under acceleration, heated competition in the provision of electronic services, the companies are keen on achieving the principle of comprehensive quality and special electronic sites and services on the Internet. Thus, those sites become electronic firms, so it must give good impression about the company from the outset. The significance of the study is that it addresses one of the vital issues of our time, which is the current enormous revolution in information technology and communications, it provides a framework to the quality of sites and electronic services are comprehensive, objective and flexible to reach the ideal site. The proposed framework can be used to compare the quality of E-Commerce systems, or to improve the image and performance of a particular E-Commerce systems or to provide reference guide for designers of the sites where their determination to new sites. This chapter examined and analyzed previous research studies that interrelated with the quality of sites and electronic services, and then developed an inclusive theoretical framework. This framework consisted of new indicators that are clear, measurable, and flexible to the possibility of its application on all sites and services, regardless of the nature of the company or institution. Consequently, the proposed framework can be applied easily to evaluate the quality of any system.


Author(s):  
Maha Saadeh ◽  
Azzam Sleit ◽  
Khair Eddin Sabri ◽  
Wesam Almobaideen

Internet of Things (IoT) is considered as the future of the Internet that connects billions of objects all together. Trusted communication between these objects is a crucial requirement for the wide deployment of IoT services. Consequently, effective authentication procedures should be applied between the communicating objects. This paper provides a comprehensive survey of object authentication in the IoT. The survey aims to direct future researchers in the field of IoT object authentication by delving into the details of authentication schemes and going through different comparisons. Comparisons are based on various criteria which include authentication process characteristics, the underlying architecture, key generation and distribution techniques, supporting IoT challenges, security analysis, and performance evaluation. Additionally, this survey highlights the main issues and challenges of IoT objects authentication and recommends future research directions.


2020 ◽  
Vol 1 (1) ◽  
pp. 74-79
Author(s):  
Ratih Cahya Pramitasari ◽  
I Nyoman Putu Budiartha ◽  
Ni Made Sukaryati Karma

In this Development Era, the rapid development of electronic-based trading. Of course the need for the internet as a medium that connects important online shopping pages. This is what is called E-Commerce, which is a form of electronic-based trading. One company engaged in electronic commerce uses PT. Orindo Alam Ayu. Therefore, the authors are interested in discussing various problems that often occur in this company by pouring in the form of a thesis entitled Legal Protection Against Consumers who are disadvantaged in electronic transactions at PT. Orindo Alam Ayu, with the formulation of the problem 1) How is the legal protection for consumers who are disadvantaged in electronic transactions at PT. Orindo Alam Ayu? 2) How to resolve disputes against consumers who are disadvantaged through electronic transactions at PT. Orindo Alam Ayu? The research method used is empirical research.A loss that is often experienced by consumers who make electronic transactions at PT. Orindo Alam Ayu can do the transfer. Shipping and delivery of goods from PT. Orindo Alam Ayu to the consumer. Consumers take advantage of time, because they have to make complaints to the business, to the channeling of funds, namely banks. Therefore, PT. Orindo Alam Party business assistance here As well as resolving disputes over consumers by fixing money disputes related to each consumer. So the final settlement does not reach the end of the path, licensing can be completed properly. 


Sign in / Sign up

Export Citation Format

Share Document