Abstract
Electronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study was to broaden the portfolio with a solution that assures the highest level of anonymity and is well applicable. An empirical design research study with prototyping and conceptual research with a proposed construct were employed for this purpose. As a result, the Activity-Based Payment (ABP) model was proposed. It introduces a different mode of completing a payment transaction based on performing specific activities on a web location indicated by the payee. The anonymity properties of the solution, as well as its performance and applicability have been evaluated showing its particular suitability to micropayment and small payment scenarios.



















Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data Availability Statement
The pilot implementation of the TApay payment model based on following advertisements is available publicly at tamail.org. Other research data generated during the current study are available from the corresponding author upon reasonable request.
Notes
RO—Research Objective.
References
Kantar Public: Study on new digital payment methods. Technical report, European Central Bank (2022)
Scheir, M., Balasch, J., Rial, A., Preneel, B., Verbauwhede, I.: Anonymous split e-cash-toward mobile anonymous payments. ACM Trans. Embed. Comput. Syst. 14(4), 3439 (2015). https://doi.org/10.1145/2783439
Zhang, Q., Markantonakis, K., Mayes, K.: A practical fair-exchange e-payment protocol for anonymous purchase and physical delivery. In: IEEE International Conference on Computer Systems and Applications, 2006., pp. 851–858 (2006). https://doi.org/10.1109/AICCSA.2006.205188
Ashrafi, M.Z., Ng, S.K.: Privacy-preserving e-payments using one-time payment details. Comput. Stand. Interfaces 31(2), 321 (2009). https://doi.org/10.1016/j.csi.2008.04.001
Bakhtiari, S., Baraani, A., Khayyambashi, M.R.: Mobicash: a new anonymous mobile payment system implemented by elliptic curve cryptography. In: 2009 WRI World Congress on Computer Science and Information Engineering, vol. 3, pp. 286–290 (2009). https://doi.org/10.1109/CSIE.2009.939
Wang, H., Cao, J., Zhang, Y.: A consumer scalable anonymity payment scheme with role based access control. In: Proceedings of the Second International Conference on Web Information Systems Engineering, vol. 1, pp. 53–62 (2001). https://doi.org/10.1109/WISE.2001.996466
Wang, H., Cao, J.: Building a consumer scalable anonymity payment protocol for internet purchases. In: Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002, pp. 159–168 (2002). https://doi.org/10.1109/RIDE.2002.995110
Juang, W.S.: A practical anonymous payment scheme for electronic commerce. Comput. Math. Appl. 46(12), 1787 (2003). https://doi.org/10.1016/S0898-1221(03)90237-9
Zamanian, F., Mala, H.: A new anonymous unlinkable mobile payment protocol. In: 2016 6th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 117–122 (2016). https://doi.org/10.1109/ICCKE.2016.7802126
Kim, C., Tao, W., Shin, N., Kim, K.S.: An empirical study of customers’ perceptions of security and trust in e-payment systems. Electron. Commer. Res. Appl. 9(1), 84 (2010). https://doi.org/10.1016/j.elerap.2009.04.014. Special Issue: Social Networks and Web 2.0
Oney, E., Guven, G.O., Rizvi, W.H.: The determinants of electronic payment systems usage from consumers’ perspective. Econ. Res. Ekonomska Istraživanja 30(1), 394 (2017). https://doi.org/10.1080/1331677X.2017.1305791
Gonzalez, D.: Chapter 8 - currency and campaigns. In: Gonzalez, D. (ed.) Managing Online Risk, pp. 185–211. Butterworth-Heinemann, Boston (2015). https://doi.org/10.1016/B978-0-12-420055-5.00008-6
Lim, B., Lee, H., Kurnia, S.: Exploring the reasons for a failure of electronic payment systems: a case study of an Australian company. J. Res. Pract. Inf. Technol. 39(4), 231 (2007)
Tsiakis, T., Sthephanides, G.: The concept of security and trust in electronic payments. Comput. Secur. 24(1), 10 (2005). https://doi.org/10.1016/j.cose.2004.11.001
Shon, T., Swatman, P.M.: Identifying effectiveness criteria for internet payment systems. Internet Res. 8(3), 202 (1998). https://doi.org/10.1108/10662249810217759
Wayner, P.: Digital Cash: Commerce on the Net, 2nd edn. Academic Press Professional, Inc., USA (1997)
Abrazhevich, D.: Classification and characteristics of electronic payment systems. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) Electronic Commerce and Web Technologies, pp. 81–90. Springer Berlin Heidelberg, Berlin, Heidelberg (2001)
O’Mahony, D., Pierce, M., Tewari, H.: Electronic Payment Systems for E-Commerce, 2nd edn. Artech (2001)
Ni, J., Au, M.H., Wu, W., Luo, X., Lin, X., Shen, X.S.: Dual-anonymous off-line electronic cash for mobile payment. IEEE Trans. Mobile Comput. 1–1 (2021). https://doi.org/10.1109/TMC.2021.3135301
Liu, W., Wang, X., Peng, W.: State of the art: secure mobile payment. IEEE Access 8, 13898 (2020). https://doi.org/10.1109/ACCESS.2019.2963480
Tso, R.: Untraceable and anonymous mobile payment scheme based on near field communication. Symmetry 10(12), 20685 (2018). https://doi.org/10.3390/sym10120685
Dahlberg, T., Guo, J., Ondrus, J.: A critical review of mobile payment research. Electron. Commer. Res. Appl. 14(5), 265 (2015). https://doi.org/10.1016/j.elerap.2015.07.006. Contemporary Research on Payments and Cards in the Global Fintech Revolution
Dahlberg, T., Mallat, N., Ondrus, J., Zmijewska, A.: Past, present and future of mobile payments research: A literature review. Electron. Commer. Res. Appl. 7(2), 165 (2008). https://doi.org/10.1016/j.elerap.2007.02.001. Special Section: Research Advances for the Mobile Payments Arena
Carat, G.: epayment systems database - trends and analysis. Technical report EUR 20264 EN, Electronic Payment Systems Observatory (ePSO), Institute for Prospective Technological Studies Directorate General Joint Research Centre European Commission, Seville, Spain (2002)
Braeken, A.: An improved e-payment system and its extension to a payment system for visually impaired and blind people with user anonymity. Wirel. Pers. Commun. 96(1), 563 (2017). https://doi.org/10.1007/s11277-017-4184-5
EMPSA european mobile payment systems association. https://empsa.org/. Accessed 10 January 2024
Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. 26(2), xiii (2002)
Kitchenham, B., Brereton, P.: A systematic review of systematic review process research in software engineering. Inf. Softw. Technol. 55(12), 2049 (2013). https://doi.org/10.1016/j.infsof.2013.07.010
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer US, Boston, MA (1983)
Carbunar, B., Chen, Y., Sion, R.: Tipping pennies? privately practical anonymous micropayments. IEEE Trans. Inf. Forensics Secur. 7(5), 1628 (2012). https://doi.org/10.1109/TIFS.2012.2204982
Chen, Y., Sion, R., Carbunar, B.: Xpay: Practical anonymous payments for tor routing and other networked services. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES ’09, p. 41-50. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1655188.1655195
Popescu, C.: An anonymous mobile payment system based on bilinear pairings. Informatica 20(4), 579 (2009). https://doi.org/10.15388/Informatica.2009.267
Wei, K., Smith, A., Chen, Y.F., Vo, B.: Whopay: A scalable and anonymous payment system for peer-to-peer environments. In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06), pp. 13–13 (2006). https://doi.org/10.1109/ICDCS.2006.85
Martinez-Pelaez, R., Rico-Novella, F., Satizabal, C.: Mobile payment protocol for micropayments: Withdrawal and payment anonymous. In: 2008 New Technologies, Mobility and Security, pp. 1–5 (2008). https://doi.org/10.1109/NTMS.2008.ECP.61
Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: Anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy, pp. 397–411 (2013). https://doi.org/10.1109/SP.2013.34
Ben Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: Decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459–474 (2014). https://doi.org/10.1109/SP.2014.36
Miao, J., Han, Z.: An decentralized anonymous payment confidential transactions with efficient proofs and scalability. In: 2022 IEEE International Conference on Electrical Engineering, Big Data and Algorithms (EEBDA), pp. 1347–1351 (2022). https://doi.org/10.1109/EEBDA53927.2022.9744784
Kwansah Ansah, A.K., Adu-Gyamfi, D., Anokye, S.: Privacy preservation of users in p2p e-payment system. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–8 (2019). https://doi.org/10.1109/ICECCT.2019.8869354
Isaac, J.T., Zeadally, S.: An anonymous secure payment protocol in a payment gateway centric model. Procedia Comput. Sci. 10, 758 (2012). https://doi.org/10.1016/j.procs.2012.06.097. ANT 2012 and MobiWIS 2012
Chen, S.W., Tso, R.: Nfc-based mobile payment protocol with user anonymity. In: 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), pp. 24–30 (2016). https://doi.org/10.1109/AsiaJCIS.2016.30
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf (2010)
Edman, M., Yener, B.: On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems. ACM Comput. Surv. 42(1) (2009). https://doi.org/10.1145/1592451.1592456
Ren, J., Wu, J.: Survey on anonymous communications in computer networks. Comput. Commun. 33(4), 420 (2010). https://doi.org/10.1016/j.comcom.2009.11.009
Li, B., Erdin, E., Gunes, M.H., Bebis, G., Shipley, T.: An overview of anonymity technology usage. Comput. Commun. 36(12), 1269 (2013). https://doi.org/10.1016/j.comcom.2013.04.009
Hou, H., Ning, J., Zhao, Y., Deng, R.H.: A traitor-resistant and dynamic anonymous communication service for cloud-based vanets. IEEE Trans. Serv. Comput. 15(5), 2551 (2022). https://doi.org/10.1109/TSC.2021.3071156
Yang, X., Yi, X., Nepal, S., Khalil, I., Huang, X., Shen, J.: Efficient and anonymous authentication for healthcare service with cloud based wbans. IEEE Trans. Serv. Comput. 15(5), 2728 (2022). https://doi.org/10.1109/TSC.2021.3059856
Xu, H., Hsu, C., Harn, L., Cui, J., Zhao, Z., Zhang, Z.: Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for industrial internet of things. IEEE Trans. Serv. Comput. 1–14 (2023). https://doi.org/10.1109/TSC.2023.3257569
Wang, H., He, D., Yu, J., Wang, Z.: Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans. Serv. Comput. 12(5), 824 (2019). https://doi.org/10.1109/TSC.2016.2633260
Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: Obpp: An ontology-based framework for privacy-preserving in iot-based smart city. Futur. Gener. Comput. Syst. 123, 1 (2021). https://doi.org/10.1016/j.future.2021.01.028
McCauley, N.P., Chi, Y., Yan, R.: Anonymous payment transactions (2021)
Canard, S., Malville, E., Traore, J., Cosnefroy, B., Caron, S.: Anonymous and secure internet payment method and mobile devices (2009)
Canard, S., Malville, E., Traore, J., Cosnefroy, B., Caron, S.: Anonymous and secure internet payment method and mobile devices (2008)
Stock, H.: Digicash idea finds new life in more flexible ecash. Am. Banker 165(67), 9 (2000)
Mearian, L.: Lawmakers have introduced a bill that would allow the us treasury to create a digital dollar. Computerworld (Online Only) p. 1 (2022)
Tor Project Anonymity Online (2022). www.torproject.org
Haraty, R.A., Zantout, B.: The TOR data communication system. J. Commun. Netw. 16(4), 415 (2014). https://doi.org/10.1109/JCN.2014.000071
I2P Anonymous Network (2022). https://geti2p.net
Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An Empirical Study of the I2P Anonymity Network and Its Censorship Resistance. In: Proceedings of the Internet Measurement Conference 2018, IMC ’18, pp. 379–392. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3278532.3278565
Leszczyna, R.: A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents’ Networks. In: Pelegrín-Borondo, J., Oliva, M.A., Murata, K., Palma, A.M.L. (eds.) Moving technology ethics at the forefront of society, organisations and governments, pp. 439–452. Universidad de La Rioja (2021). https://dialnet.unirioja.es/servlet/articulo?codigo=8037082
Raymond, J.F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, pp. 10–29. Springer Berlin Heidelberg, Berlin, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_2
Venkatesh, V., Morris, M., Davis, G., Davis, F.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425 (2003). https://doi.org/10.2307/30036540
Leszczyna, R.: Aiming at methods’ wider adoption: applicability determinants and metrics. Comput. Sci. Rev. 40, 100387 (2021). https://doi.org/10.1016/j.cosrev.2021.100387
Wolves, F.: 8 ways to get paid for leaving your computer running. https://financialwolves.com/get-paid-for-leaving-your-computer-running/ (2023). Accessed 10 January 2024
Weiss, R.J.: 12 legit ways to get paid for searching the web. https://www.thewaystowealth.com/make-money/get-paid-to-play-games/ (2023). Accessed 10 Jan 2024
StartedBlogging: 10 file sharing websites that pay for downloads. https://startedblogging.com/file-sharing-websites-that-pay-for-downloads/ (2023). Accessed 10 Jan 2024
Weiss, R.J.: Get paid to play games: The best apps, websites and jobs. https://www.thewaystowealth.com/make-money/get-paid-to-play-games/ (2023). Accessed 10 Jan 2024
Cruz, J.J.D.: Photomath: Earn \$300 a week by solving math problems online. https://phmillennia.com/photomath-14/ (2023). Accessed 10 Jan 2024
MathforMoney: How to earn money by solving math problems. https://www.mathformoney.app/earn-money-solving-math-problems.html (2023). Accessed 10 Jan 2024
Gupta, R., Kumar, B., Banga, G.: Role of affiliate marketing in today’s era: a review. Indian J. Econ. Dev. 13(2A), 687 (2017). https://doi.org/10.5958/2322-0430.2017.00153.6
Mahdian, M., Tomak, K.: Pay-per-action model for on-line advertising. Int. J. Electron. Commer. 13(2), 113 (2008). https://doi.org/10.2753/JEC1086-4415130205
Pelánek, R., Jarušek, P.: Student modeling based on problem solving times. Int. J. Artif. Intell. Educ. 25(4), 493 (2015). https://doi.org/10.1007/s40593-015-0048-x
Leszczyna, R.: TAmail – Anonymous Sending of Messages with Possibility of Responding. Tech. rep. (2023). Submitted to Information Systems and e-Business Management
Leszczyna, R.: Practical cybersecurity assessment techniques - why are they adopted? A Review, Determinants and the Applicability Checklist. Tech. rep. (2023). Submitted to IEEE Access
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science, pp. 96–114. Springer-Verlag New York, Inc., Berkeley, California, USA (2000)
Dolev, S., Ostrobsky, R.: Xor-trees for efficient anonymous multicast and reception. ACM Trans. Inf. Syst. Secur. 3(2), 63 (2000)
Dlodlo, N., Mofolo, M., Masoane, L., Mncwabe, S., Sibiya, G., Mboweni, L.: Research Trends in Existing Technologies that are Building Blocks to the Internet of Things. In: Sobh, T., Elleithy, K. (eds.) Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering, pp. 539–548. Springer, Cham (2015)
Hyman, V.: Your real-time guide to real-time payments. https://www.mastercard.com/news/perspectives/2022/real-time-payments-what-is-rtp-and-why-do-we-need-instant-payments/ (2023). Accessed 10 Jan 2024
LLP., D.: Economic impact of real-time payments. Technical report, Mastercard (2019)
Webster, N.: Webster’s Revised Unabridged Dictionary. G. & C. Merriam Company (1913)
Babylon Software: Babylon NG (2020). dictionary.babylon-software.com
Verkijika, S.F.: An affective response model for understanding the acceptance of mobile payment systems. Electron. Commer. Res. Appl. 39, 100905 (2020). https://doi.org/10.1016/j.elerap.2019.100905
Leszczyna, R.: Review of cybersecurity assessment methods: applicability perspective. Comput. Secur. 108, 102376 (2021). https://doi.org/10.1016/J.COSE.2021.102376
Wallis, T., Leszczyna, R.: Ee-isac – practical cybersecurity solution for the energy sector. Energies 15(6) (2022). https://doi.org/10.3390/en15062170
Leszczyna, R., Wallis, T., Wróbel, M.R.: Developing novel solutions to realise the European energy - information sharing & analysis centre. Decis. Support Syst. 122, 113067 (2019). https://doi.org/10.1016/j.dss.2019.05.007
Information Sharing & Analysis Centre (EE-ISAC). ww.ee-isac.eu
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The author declares that he has no known competing financial interests or personal relationships that could appear to influence the work described in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Leszczyna, R. Activity-based payments: alternative (anonymous) online payment model. Int. J. Inf. Secur. 23, 1741–1759 (2024). https://doi.org/10.1007/s10207-024-00816-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-024-00816-0