Call for Paper - June 2017 Edition
IJCA solicits original research papers for the June 2017 Edition. Last date of manuscript submission is May 20, 2017. Read More

An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 18
Year of Publication: 2015
Authors:
Princewill Aigbe
Andrew Onibere
10.5120/21803-5112

Princewill Aigbe and Onibere. Article: An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications 122(18):32-39, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Princewill Aigbe and andrew Onibere},
	title = {Article: An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {18},
	pages = {32-39},
	month = {July},
	note = {Full text available}
}

Abstract

The introduction electronic commerce has created new financial needs that in many cases cannot be effectively fulfilled by the traditional payment systems. The success of electronic commerce business depends on the credibility of the available electronic payment systems. Electronic cash payment is one electronic payment systems developed to settle payments electronically, but suffers the problem of double-spending fraud. This paper identifies the possible causes of double-spending fraud and presents techniques to mitigate this type of fraud. These techniques involve the modification of existing electronic cash payment system, and a demonstration of the modified system to determine its double-spending fraud resistant capability.

References

  • Chaum, D. , (1982). Blind signature for untraceable payments. Proceeding of the Annual International Cryptology conference on Advances in Cryptology (CRYTO'82), Santa Barbara, California.
  • Chaum, D. , Fiat A. , Naor M. (1988). Untraceable Electronic Cash payments. Proceeding of the 8th Annual International Cryptology conference on Advances in Cryptology (CRYTO'88), Santa Barbara, California.
  • Brands, S. (1993). An efficient off-line electronic cash system in wallets with observers. Proceeding of the 13th Annual International Cryptology conference on Advances in Cryptology (CRYTO'88), Santa Barbara, California.
  • Osipkor, E. , Hopper, N. , and Kin, Y. (2007). Combating double-spending using co-operative P2P systems. 27th International conference on distributed computing systems (ICDCS '07), IEEE computer society.
  • Elaalim, K. O. , and Yang, S. (2010). Electronic cash system with double-spending tracing based on elliptic curve cryptography. Journal of Computational information Systems, 6(9), 2949 – 2957.
  • Nashidi, T. , Miyazaki, S. , and Sakurai, K. (2011). Security analysis of E-Cash systems with malicious insider. Journal of Wireless mobile Networks, Ubiquittous Computing, and Depending Applications, 3(2), 55 – 71.
  • Ziba, E. , and Mehdi, E. (2011). A new untraceable off-line electronic cash system. Electronic Commerce and Applications, 10, 59 – 66.
  • Yanling, H. , Haibin, W. , Xuguanf, C. , and Xia, L. (2014). Efficient divisible E-cash based on the P-Signature. International Journal of Multimedia and Ubiquitous Engineering, 9(10), 153 – 168.
  • Colouris, G. , Dolkimore, J. , and Kindberg, T. (2001). Distributed Systems: Design and Concepts (3rd ed. ). Addison Wesley Publishers, Boston.
  • Omrani, L. , Rafinezhad, Z. , and Keyvanpour, M. (2011). A function-based framework for classification and evaluation of mutual exclusion algorithms in distributed systems. International Journal of Computer Science and Security (IJCSS), 5(2), 890 – 908.
  • Bertier, M. , Arantes, L. , and Sens, P. (2006). Hierarchical token based mutual exclusion algorithms. IEEE Intemational Symposium on Cluster Computing and the Grid, 539 - 546.
  • Swaroop, A. , and Singh, K. (2007). A study of token-based algorithms for distributed mutual exclusion. International Review on Computers and Software (I. RE. CO. S), 2(4).
  • Gupta, A. , Reddy, B. , Udayan, G. , and Ashish, K. (2012). A permission-based clustering mutual exclusion algorithms in mobile ad-hoc networks. International Journal of Engineering Research and Applications, 2(4), 019 – 026.
  • Chokhani, E. , Carlisle, A. , and Lloyd, S. (2010). Internet X. 509 Public Key Infrastructure: Certificate Policy and Certification Practices Framework. Orion Security Solutions, Inc.
  • Lenstra A. , and Verheul E. (2005). Selecting Cryptographic Key Sizes. Journal of Cryptology, 14.
  • Stevens, M. (2012). Attacks on hash functions and applications. IpaskampDrukkers, Amsterdam.