Skip to main content

Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing

  • Conference paper
  • First Online:
Book cover Computational Intelligence, Communications, and Business Analytics (CICBA 2018)

Abstract

Digital payment using mobile wallet is one of the easiest and frequent mode of payment methods in recent era. Payment through mobile wallet is becoming more widespread due to the rapid growth of smart device users as well as easy availability of Internet. However, it is very important to make the whole payment procedure of mobile wallet system safe and secure, otherwise it may be fatal for the users, as the users have to share their valuable credentials like real identity, secret key to make a successful payment. Also the service provider has to keep in mind that the resources available in a mobile device are not appropriate for carrying large computational overheads. To overcome these issues Qin et al. has proposed a secure and privacy preserving mobile wallet protocol integrating the digital signature and pseudo-identity technique using outsourced computing with the help of a cloud server. The cloud server performs the complex computation to reduce the computational overhead of mobile wallet. In this paper we have analyzed all possible security attacks that may occur in Qin et al. proposed scheme and also found that this scheme is vulnerable to various security attacks like known session specific temporary information attack, cloud server bypassing attack, untrusted cloud server and client colluding attack and impersonation attack. The aforesaid attacks are explained using mathematical model to show that this scheme is not enough secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yu, X., Kywe, S.M., Li, Y.: Security issues of in-store mobile payment. In: Handbook of Blockchain, Digital Finance, and Inclusion, vol. 2 (2017)

    Google Scholar 

  2. Smith, S.M., et al.: System and method of conducting transactions using a mobile wallet system. U.S. Patent Application (2010)

    Google Scholar 

  3. Sakalauskas, E., Muleravicius, J., Timofejeva, I.: Computational resources for mobile e-wallet system with observers. In: ELECTRONICS 2017, Palanga, pp. 1–5. IEEE (2017)

    Google Scholar 

  4. Kenneth, W.: Mobile payments, digital wallets and tunnel vision. In: Biometric Technology Today, pp. 8–9. Elsevier (2011)

    Google Scholar 

  5. Feifei, W.: Research on security of mobile payment model based on trusted third party. In: Second International Conference on Network Security Wireless Communication and Trusted Computing (NSWCTC), Wuhan, pp. 442–445. IEEE (2010)

    Google Scholar 

  6. Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36(1), 58–80 (2016)

    Article  Google Scholar 

  7. Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)

    Article  Google Scholar 

  8. Ray, S., Biswas, G.P.: An ECC based public key infrastructure usable for mobile applications. In: Second International Conference on Computational Science, Engineering and Information Technology, pp. 562–568. ACM (2012)

    Google Scholar 

  9. Ray, S., Biswas, G.P., Dasgupta, M.: Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel. Pers. Commun. 90(3), 1331–1354 (2016)

    Article  Google Scholar 

  10. Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96–1129 (2014)

    Article  Google Scholar 

  11. Qin, Z., Sun, J., Wahaballa, A., Zheng, W., Xiong, H., Qin, Z.: A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput. Stan. Interfaces 54, 55–60 (2017)

    Article  Google Scholar 

  12. Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)

    Google Scholar 

  13. Veeraraghavan, P.: Pseudo-identity based encryption and its application in mobile ad hoc networks. In: 2011 IEEE 10th Malaysia International Conference on Communications (MICC), Malaysia, pp. 49–52. IEEE (2011)

    Google Scholar 

  14. Islam, S.K., Biswas, G.P.: An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Eng. 30, 499–507 (2012)

    Article  Google Scholar 

  15. Amin, R., Biswas, G.P., Giri, D., Khan, M.K., Kumar, N.: A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Netw. 9(17), 4650–4666 (2016)

    Article  Google Scholar 

  16. Liao, Y., He, Y., Li, F., Zhou, S.: Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stan. Interfaces 56, 101–106 (2018)

    Article  Google Scholar 

  17. Shin, D.: Towards an understanding of the consumer acceptance of mobile wallet. Comput. Hum. Behav. 25(6), 1343–1354 (2009)

    Article  Google Scholar 

  18. Amoroso, D.L., Watanabe, R.M.: Building a research model for mobile wallet consumer adoption: the case of mobile Suica in Japan. J. Theor. Appl. Electron. Commerce Res. 7(1), 94–110 (2012)

    Article  Google Scholar 

  19. Yu, Y., Mu, Y., Wang, G., Xia, Q., Yang, B.: Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2), 102–110 (2012)

    Article  Google Scholar 

  20. Xiong, H.: Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12), 2327–2339 (2014)

    Article  Google Scholar 

  21. Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wirel. Pers. Commun. 71(3), 2259–2294 (2013)

    Article  Google Scholar 

  22. Luo, Y., Fu, S., Huang, K., Wang, D., Xu, M.: Securely outsourcing of bilinear pairings with untrusted servers for cloud storage. In: Trustcom/BIGDATASE/ISPA, IEEE 2016, Tianjin, pp. 623–629. IEEE (2016)

    Google Scholar 

  23. Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptography: a survey. Cryptology ePrint Archive, Report 2004/064 (2004)

    Google Scholar 

  24. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44987-6_28

    Chapter  Google Scholar 

  25. Chen, H.B., Chen, T.H., Lee, W.B., Chang, C.C.: Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. Comput. Stan. Interfaces 30(1–2), 95–99 (2008)

    Article  Google Scholar 

  26. Islam, S.K.: Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 78(3), 2261–2276 (2014)

    Article  Google Scholar 

  27. Islam, S.K., Khan, M.K., Obaidat, M.S., Muhaya, F.: Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wirel. Pers. Commun. 84(3), 2013–2034 (2015)

    Article  Google Scholar 

  28. Islam, S.K., Amin, R., Biswas, G.P., Farash, M.S., Li, X., Kumari, S.: An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ.-Comput. Inf. Sci. 29(3), 311–324 (2017)

    Article  Google Scholar 

  29. Sadhukhan, D., Ray, S.: Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication. In: 2018 IEEE 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, pp. 1–6. IEEE (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipanwita Sadhukhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tribedi, D., Sadhukhan, D., Ray, S. (2019). Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing. In: Mandal, J., Mukhopadhyay, S., Dutta, P., Dasgupta, K. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2018. Communications in Computer and Information Science, vol 1031. Springer, Singapore. https://doi.org/10.1007/978-981-13-8581-0_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8581-0_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8580-3

  • Online ISBN: 978-981-13-8581-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics