Skip to main content

Verification of Money Atomicity in Digital Cash Based Payment System

  • Conference paper
Book cover Information Systems Security (ICISS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7671))

Included in the following conference series:

Abstract

Digital cash, analogous to the paper cash, is a certificate that carries a value. It is issued by an authorized entity and is verifiable by all. It can be used as an instrument for making payments or purchases. Unlike paper cash, being a digital data, it may be easily replicated which gives a scope for duplicate spending of the cash certificates. Digital cash based payment systems can be classified as business critical systems as any failure may lead to loss of trust. Verification of critical requirements of such systems is therefore essential. In this paper, we present refinement approach for construction of the models of the digital cash based payment system using Event-B, wherein we verify how money atomicity property can be preserved in these systems. This ensures that money is neither generated nor destroyed in the electronic payment transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abrial, J.R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press, Cambridge (2010)

    MATH  Google Scholar 

  2. Abrial, J.R.: A System Development Process with Event-B and the Rodin Platform. In: Butler, M., Hinchey, M.G., Larrondo-Petrie, M.M. (eds.) ICFEM 2007. LNCS, vol. 4789, pp. 1–3. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Abrial, J.-R.: Train Systems. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 1–36. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Abrial, J.-R., Cansell, D., Méry, D.: A mechanically proved and incremental development of IEEE 1394 tree identify protocol. Formal Aspects of Computing 14(3), 215–227 (2003)

    Article  Google Scholar 

  5. Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET Purchase Protocols. Journal of Automated Reasoning 36(1-2), 5–37 (2006)

    Article  MATH  Google Scholar 

  6. Bella, G., Massacci, F., Paulson, L., Tramontano, P.: Formal Verification of Card holder Registration in SET. IEEE Journal on Selected Areas in Communications 21(1), 77–87 (2003)

    Article  Google Scholar 

  7. Butler, M., Yadav, D.: An incremental development of the mondex system in Event-B. Formal Aspects of Computing 20(1), 61–77 (2008)

    Article  Google Scholar 

  8. Butler, M.: On the use of data refinement in the development of secure communications systems. Formal Aspects of Computing 14(1), 2–34 (2002)

    Article  MATH  Google Scholar 

  9. Butler, M.: An Approach to the Design of Distributed Systems with B AMN. In: Bowen, J.P., Hinchey, M.G., Till, D. (eds.) ZUM 1997. LNCS, vol. 1212, pp. 223–241. Springer, Heidelberg (1997)

    Google Scholar 

  10. Chandra, G., Yadav, D.: Analyzing Data Flow in Trustworthy Electronic Payment Systems Using Event-B. In: Kannan, R., Andres, F. (eds.) ICDEM 2010. LNCS, vol. 6411, pp. 325–332. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)

    Google Scholar 

  12. Freitas, L., Woodcock, J.: Mechanising Mondex with Z/Eves. Formal Aspects of Computing 20(1), 117–139 (2008)

    Article  Google Scholar 

  13. Gouda, M.G., Liu, A.X.: Formal Specification and Verification of a Secure Micropayment Protocol. International Journal of Network Security 7(1), 81–87 (2008)

    Google Scholar 

  14. Haneberg, D., Grandy, H., Reif, W., Schellhorn, G.: Verifying Smart Card Applications: An ASM Approach. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 313–332. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Heintze, N., Tygar, J.D., Wing, J., Chi Wong, H.: Model checking electronic commerce protocols. In: Proc. of the Second USENIX Workshop on Electronic Commerce, Oakland, California, pp. 147–164 (1996)

    Google Scholar 

  16. Katsaros, P.: A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach. Information and Software Technology 51(2), 235–257 (2009)

    Article  MathSciNet  Google Scholar 

  17. Kessler, V., Neumann, H.: A Sound Logic for Analysing Electronic Commerce Protocols. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 345–360. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  18. Laibinis, L., Troubitsyna, E., Leppänen, S., Lilius, J., Malik, Q.A.: Formal Service-Oriented Development of Fault Tolerant Communicating Systems. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 261–287. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  19. Lu, S., Smolka, S.: Model Checking the Secure Electronic Transaction (SET) Protocol. In: Proc. of 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 358–365. IEEE Computer Society, Washington, DC (1999)

    Google Scholar 

  20. Meadows, C., Syverson, P.: A Formal Specification of Requirements for Payment Transactions in the SET Protocol. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 122–140. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  21. Panti, M., Spalazzi, L., Tacconi, S., Valenti, S.: Automatic verification of security in payment protocols for electronic commerce. In: Piattini, M., Filipe, J., Braz, J. (eds.) Enterprise Information Systems IV, pp. 276–282. Kluwer Academic Publishers, MA (2003)

    Google Scholar 

  22. Prisco, R.D., Fekete, A., Lynch, N., Shvartsman, A.: A dynamic view-oriented group communication service. In: PODC 1998: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pp. 227–236. ACM Press, NY (1998)

    Chapter  Google Scholar 

  23. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, Inc., Singapore (1996)

    MATH  Google Scholar 

  24. Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: Formal methods: Practice and experience. ACM Computing Surveys 41(4), 1–36 (2009)

    Article  Google Scholar 

  25. Yadav, D., Butler, M.: Rigorous Design of Fault-Tolerant Transactions for Replicated Database Systems Using Event B. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 343–363. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chandra, G., Yadav, D. (2012). Verification of Money Atomicity in Digital Cash Based Payment System. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics