Lightweight security primitives for E-commerce

被引:0
|
作者
Matias, Y [1 ]
Mayer, A [1 ]
Silberschatz, A [1 ]
机构
[1] AT&T Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended client-server relationships. For example, consider a web-site (server) which offers repeated authenticated personalized stock quotes to each of its subscribers (clients). The value of a single transaction (e.g., delivery of a web-page with a customized set of quotes) does not warrant the cost of executing a handshake and key distribution protocol. Also, a client might not always use the same machine during such an extended relationship (e.g., a PC at home, a laptop on a trip). Typical transport/session-layer security mechanisms such as SSL and S-HTTP either require handshake/key distribution for each transaction or do not support client mobility. We propose a new security framework for extended relationships between clients and servers, based on persistent shared keys. We argue that this is a preferred model for inexpensive transactions executing within extended relationships. Our main contribution is the design and implementation of a set of lightweight application-layer primitives, for (1) generating and maintaining persistent shared keys without requiring a client to store any information between transactions and (2) securing a wide range of web-transactions (e.g., subscription, authenticated and/or private delivery of information, receipts) with adequate computational cost. Oar protocols require public key infrastructure only for servers/vendors, and its usage only once per client (upon first interaction).
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
  • [31] Security: important issue in e-commerce
    Zahra, Ahmadi-Brooghani
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOL 3: ADVANCES IN COMMUNICATIONS, 2007, : 23 - +
  • [32] Security issues in e-commerce: An overview
    Ahmadi-Brooghani, Zhara
    International Review on Computers and Software, 2010, 5 (05) : 575 - 580
  • [33] E-commerce Security: Classifications and Arts
    Raheem, Osamah Adil
    2018 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2018, : 1 - 3
  • [34] Research on E-Commerce Security Issues
    Wen, Yuanqiao
    Zhou, Chunhui
    Ma, Juan
    Liu, Kezhong
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, : 186 - +
  • [35] Sicherheitstechnologien für E-Commerce 2000Security technologies for e-commerce 2000
    R. Fleck
    e&i Elektrotechnik und Informationstechnik, 2000, 117 (6) : 411 - 416
  • [36] Application of Lightweight RFID Authentication Protocol in E-Commerce
    Fu, Qi
    Tan, Jun
    Li, Hong
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 1045 - 1050
  • [37] Study on the Security and Trust Issues of E-commerce
    Wen, Xiaosen
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 191 - 194
  • [38] Study on the Information Security based on E-Commerce
    Meng, Yu-qiao
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 437 - 439
  • [39] Integrated e-commerce security model for websites
    Alfadli, Ibrahim
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2022, 9 (04): : 106 - 113
  • [40] Study of security issues in E-commerce applications
    Hanumesh, V.J.
    Sunder, K.S.
    IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 2000, 17 (04): : 209 - 214