Skip to main content

Advertisement

Log in

Activity-based payments: alternative (anonymous) online payment model

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Electronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study was to broaden the portfolio with a solution that assures the highest level of anonymity and is well applicable. An empirical design research study with prototyping and conceptual research with a proposed construct were employed for this purpose. As a result, the Activity-Based Payment (ABP) model was proposed. It introduces a different mode of completing a payment transaction based on performing specific activities on a web location indicated by the payee. The anonymity properties of the solution, as well as its performance and applicability have been evaluated showing its particular suitability to micropayment and small payment scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Data Availability Statement

The pilot implementation of the TApay payment model based on following advertisements is available publicly at tamail.org. Other research data generated during the current study are available from the corresponding author upon reasonable request.

Notes

  1. RO—Research Objective.

References

  1. Kantar Public: Study on new digital payment methods. Technical report, European Central Bank (2022)

  2. Scheir, M., Balasch, J., Rial, A., Preneel, B., Verbauwhede, I.: Anonymous split e-cash-toward mobile anonymous payments. ACM Trans. Embed. Comput. Syst. 14(4), 3439 (2015). https://doi.org/10.1145/2783439

    Article  Google Scholar 

  3. Zhang, Q., Markantonakis, K., Mayes, K.: A practical fair-exchange e-payment protocol for anonymous purchase and physical delivery. In: IEEE International Conference on Computer Systems and Applications, 2006., pp. 851–858 (2006). https://doi.org/10.1109/AICCSA.2006.205188

  4. Ashrafi, M.Z., Ng, S.K.: Privacy-preserving e-payments using one-time payment details. Comput. Stand. Interfaces 31(2), 321 (2009). https://doi.org/10.1016/j.csi.2008.04.001

    Article  Google Scholar 

  5. Bakhtiari, S., Baraani, A., Khayyambashi, M.R.: Mobicash: a new anonymous mobile payment system implemented by elliptic curve cryptography. In: 2009 WRI World Congress on Computer Science and Information Engineering, vol. 3, pp. 286–290 (2009). https://doi.org/10.1109/CSIE.2009.939

  6. Wang, H., Cao, J., Zhang, Y.: A consumer scalable anonymity payment scheme with role based access control. In: Proceedings of the Second International Conference on Web Information Systems Engineering, vol. 1, pp. 53–62 (2001). https://doi.org/10.1109/WISE.2001.996466

  7. Wang, H., Cao, J.: Building a consumer scalable anonymity payment protocol for internet purchases. In: Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002, pp. 159–168 (2002). https://doi.org/10.1109/RIDE.2002.995110

  8. Juang, W.S.: A practical anonymous payment scheme for electronic commerce. Comput. Math. Appl. 46(12), 1787 (2003). https://doi.org/10.1016/S0898-1221(03)90237-9

    Article  MathSciNet  Google Scholar 

  9. Zamanian, F., Mala, H.: A new anonymous unlinkable mobile payment protocol. In: 2016 6th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 117–122 (2016). https://doi.org/10.1109/ICCKE.2016.7802126

  10. Kim, C., Tao, W., Shin, N., Kim, K.S.: An empirical study of customers’ perceptions of security and trust in e-payment systems. Electron. Commer. Res. Appl. 9(1), 84 (2010). https://doi.org/10.1016/j.elerap.2009.04.014. Special Issue: Social Networks and Web 2.0

  11. Oney, E., Guven, G.O., Rizvi, W.H.: The determinants of electronic payment systems usage from consumers’ perspective. Econ. Res. Ekonomska Istraživanja 30(1), 394 (2017). https://doi.org/10.1080/1331677X.2017.1305791

    Article  Google Scholar 

  12. Gonzalez, D.: Chapter 8 - currency and campaigns. In: Gonzalez, D. (ed.) Managing Online Risk, pp. 185–211. Butterworth-Heinemann, Boston (2015). https://doi.org/10.1016/B978-0-12-420055-5.00008-6

  13. Lim, B., Lee, H., Kurnia, S.: Exploring the reasons for a failure of electronic payment systems: a case study of an Australian company. J. Res. Pract. Inf. Technol. 39(4), 231 (2007)

    Google Scholar 

  14. Tsiakis, T., Sthephanides, G.: The concept of security and trust in electronic payments. Comput. Secur. 24(1), 10 (2005). https://doi.org/10.1016/j.cose.2004.11.001

    Article  Google Scholar 

  15. Shon, T., Swatman, P.M.: Identifying effectiveness criteria for internet payment systems. Internet Res. 8(3), 202 (1998). https://doi.org/10.1108/10662249810217759

    Article  Google Scholar 

  16. Wayner, P.: Digital Cash: Commerce on the Net, 2nd edn. Academic Press Professional, Inc., USA (1997)

  17. Abrazhevich, D.: Classification and characteristics of electronic payment systems. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) Electronic Commerce and Web Technologies, pp. 81–90. Springer Berlin Heidelberg, Berlin, Heidelberg (2001)

  18. O’Mahony, D., Pierce, M., Tewari, H.: Electronic Payment Systems for E-Commerce, 2nd edn. Artech (2001)

  19. Ni, J., Au, M.H., Wu, W., Luo, X., Lin, X., Shen, X.S.: Dual-anonymous off-line electronic cash for mobile payment. IEEE Trans. Mobile Comput. 1–1 (2021). https://doi.org/10.1109/TMC.2021.3135301

  20. Liu, W., Wang, X., Peng, W.: State of the art: secure mobile payment. IEEE Access 8, 13898 (2020). https://doi.org/10.1109/ACCESS.2019.2963480

    Article  Google Scholar 

  21. Tso, R.: Untraceable and anonymous mobile payment scheme based on near field communication. Symmetry 10(12), 20685 (2018). https://doi.org/10.3390/sym10120685

    Article  Google Scholar 

  22. Dahlberg, T., Guo, J., Ondrus, J.: A critical review of mobile payment research. Electron. Commer. Res. Appl. 14(5), 265 (2015). https://doi.org/10.1016/j.elerap.2015.07.006. Contemporary Research on Payments and Cards in the Global Fintech Revolution

  23. Dahlberg, T., Mallat, N., Ondrus, J., Zmijewska, A.: Past, present and future of mobile payments research: A literature review. Electron. Commer. Res. Appl. 7(2), 165 (2008). https://doi.org/10.1016/j.elerap.2007.02.001. Special Section: Research Advances for the Mobile Payments Arena

  24. Carat, G.: epayment systems database - trends and analysis. Technical report EUR 20264 EN, Electronic Payment Systems Observatory (ePSO), Institute for Prospective Technological Studies Directorate General Joint Research Centre European Commission, Seville, Spain (2002)

  25. Braeken, A.: An improved e-payment system and its extension to a payment system for visually impaired and blind people with user anonymity. Wirel. Pers. Commun. 96(1), 563 (2017). https://doi.org/10.1007/s11277-017-4184-5

    Article  Google Scholar 

  26. EMPSA european mobile payment systems association. https://empsa.org/. Accessed 10 January 2024

  27. Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. 26(2), xiii (2002)

    Google Scholar 

  28. Kitchenham, B., Brereton, P.: A systematic review of systematic review process research in software engineering. Inf. Softw. Technol. 55(12), 2049 (2013). https://doi.org/10.1016/j.infsof.2013.07.010

    Article  Google Scholar 

  29. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer US, Boston, MA (1983)

  30. Carbunar, B., Chen, Y., Sion, R.: Tipping pennies? privately practical anonymous micropayments. IEEE Trans. Inf. Forensics Secur. 7(5), 1628 (2012). https://doi.org/10.1109/TIFS.2012.2204982

    Article  Google Scholar 

  31. Chen, Y., Sion, R., Carbunar, B.: Xpay: Practical anonymous payments for tor routing and other networked services. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES ’09, p. 41-50. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1655188.1655195

  32. Popescu, C.: An anonymous mobile payment system based on bilinear pairings. Informatica 20(4), 579 (2009). https://doi.org/10.15388/Informatica.2009.267

  33. Wei, K., Smith, A., Chen, Y.F., Vo, B.: Whopay: A scalable and anonymous payment system for peer-to-peer environments. In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06), pp. 13–13 (2006). https://doi.org/10.1109/ICDCS.2006.85

  34. Martinez-Pelaez, R., Rico-Novella, F., Satizabal, C.: Mobile payment protocol for micropayments: Withdrawal and payment anonymous. In: 2008 New Technologies, Mobility and Security, pp. 1–5 (2008). https://doi.org/10.1109/NTMS.2008.ECP.61

  35. Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: Anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy, pp. 397–411 (2013). https://doi.org/10.1109/SP.2013.34

  36. Ben Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: Decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459–474 (2014). https://doi.org/10.1109/SP.2014.36

  37. Miao, J., Han, Z.: An decentralized anonymous payment confidential transactions with efficient proofs and scalability. In: 2022 IEEE International Conference on Electrical Engineering, Big Data and Algorithms (EEBDA), pp. 1347–1351 (2022). https://doi.org/10.1109/EEBDA53927.2022.9744784

  38. Kwansah Ansah, A.K., Adu-Gyamfi, D., Anokye, S.: Privacy preservation of users in p2p e-payment system. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–8 (2019). https://doi.org/10.1109/ICECCT.2019.8869354

  39. Isaac, J.T., Zeadally, S.: An anonymous secure payment protocol in a payment gateway centric model. Procedia Comput. Sci. 10, 758 (2012). https://doi.org/10.1016/j.procs.2012.06.097. ANT 2012 and MobiWIS 2012

  40. Chen, S.W., Tso, R.: Nfc-based mobile payment protocol with user anonymity. In: 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), pp. 24–30 (2016). https://doi.org/10.1109/AsiaJCIS.2016.30

  41. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf (2010)

  42. Edman, M., Yener, B.: On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems. ACM Comput. Surv. 42(1) (2009). https://doi.org/10.1145/1592451.1592456

  43. Ren, J., Wu, J.: Survey on anonymous communications in computer networks. Comput. Commun. 33(4), 420 (2010). https://doi.org/10.1016/j.comcom.2009.11.009

    Article  Google Scholar 

  44. Li, B., Erdin, E., Gunes, M.H., Bebis, G., Shipley, T.: An overview of anonymity technology usage. Comput. Commun. 36(12), 1269 (2013). https://doi.org/10.1016/j.comcom.2013.04.009

    Article  Google Scholar 

  45. Hou, H., Ning, J., Zhao, Y., Deng, R.H.: A traitor-resistant and dynamic anonymous communication service for cloud-based vanets. IEEE Trans. Serv. Comput. 15(5), 2551 (2022). https://doi.org/10.1109/TSC.2021.3071156

    Article  Google Scholar 

  46. Yang, X., Yi, X., Nepal, S., Khalil, I., Huang, X., Shen, J.: Efficient and anonymous authentication for healthcare service with cloud based wbans. IEEE Trans. Serv. Comput. 15(5), 2728 (2022). https://doi.org/10.1109/TSC.2021.3059856

    Article  Google Scholar 

  47. Xu, H., Hsu, C., Harn, L., Cui, J., Zhao, Z., Zhang, Z.: Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for industrial internet of things. IEEE Trans. Serv. Comput. 1–14 (2023). https://doi.org/10.1109/TSC.2023.3257569

  48. Wang, H., He, D., Yu, J., Wang, Z.: Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans. Serv. Comput. 12(5), 824 (2019). https://doi.org/10.1109/TSC.2016.2633260

    Article  Google Scholar 

  49. Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: Obpp: An ontology-based framework for privacy-preserving in iot-based smart city. Futur. Gener. Comput. Syst. 123, 1 (2021). https://doi.org/10.1016/j.future.2021.01.028

    Article  Google Scholar 

  50. McCauley, N.P., Chi, Y., Yan, R.: Anonymous payment transactions (2021)

  51. Canard, S., Malville, E., Traore, J., Cosnefroy, B., Caron, S.: Anonymous and secure internet payment method and mobile devices (2009)

  52. Canard, S., Malville, E., Traore, J., Cosnefroy, B., Caron, S.: Anonymous and secure internet payment method and mobile devices (2008)

  53. Stock, H.: Digicash idea finds new life in more flexible ecash. Am. Banker 165(67), 9 (2000)

    Google Scholar 

  54. Mearian, L.: Lawmakers have introduced a bill that would allow the us treasury to create a digital dollar. Computerworld (Online Only) p. 1 (2022)

  55. Tor Project Anonymity Online (2022). www.torproject.org

  56. Haraty, R.A., Zantout, B.: The TOR data communication system. J. Commun. Netw. 16(4), 415 (2014). https://doi.org/10.1109/JCN.2014.000071

    Article  Google Scholar 

  57. I2P Anonymous Network (2022). https://geti2p.net

  58. Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An Empirical Study of the I2P Anonymity Network and Its Censorship Resistance. In: Proceedings of the Internet Measurement Conference 2018, IMC ’18, pp. 379–392. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3278532.3278565

  59. Leszczyna, R.: A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents’ Networks. In: Pelegrín-Borondo, J., Oliva, M.A., Murata, K., Palma, A.M.L. (eds.) Moving technology ethics at the forefront of society, organisations and governments, pp. 439–452. Universidad de La Rioja (2021). https://dialnet.unirioja.es/servlet/articulo?codigo=8037082

  60. Raymond, J.F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, pp. 10–29. Springer Berlin Heidelberg, Berlin, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_2

  61. Venkatesh, V., Morris, M., Davis, G., Davis, F.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425 (2003). https://doi.org/10.2307/30036540

    Article  Google Scholar 

  62. Leszczyna, R.: Aiming at methods’ wider adoption: applicability determinants and metrics. Comput. Sci. Rev. 40, 100387 (2021). https://doi.org/10.1016/j.cosrev.2021.100387

    Article  Google Scholar 

  63. Wolves, F.: 8 ways to get paid for leaving your computer running. https://financialwolves.com/get-paid-for-leaving-your-computer-running/ (2023). Accessed 10 January 2024

  64. Weiss, R.J.: 12 legit ways to get paid for searching the web. https://www.thewaystowealth.com/make-money/get-paid-to-play-games/ (2023). Accessed 10 Jan 2024

  65. StartedBlogging: 10 file sharing websites that pay for downloads. https://startedblogging.com/file-sharing-websites-that-pay-for-downloads/ (2023). Accessed 10 Jan 2024

  66. Weiss, R.J.: Get paid to play games: The best apps, websites and jobs. https://www.thewaystowealth.com/make-money/get-paid-to-play-games/ (2023). Accessed 10 Jan 2024

  67. Cruz, J.J.D.: Photomath: Earn \$300 a week by solving math problems online. https://phmillennia.com/photomath-14/ (2023). Accessed 10 Jan 2024

  68. MathforMoney: How to earn money by solving math problems. https://www.mathformoney.app/earn-money-solving-math-problems.html (2023). Accessed 10 Jan 2024

  69. Gupta, R., Kumar, B., Banga, G.: Role of affiliate marketing in today’s era: a review. Indian J. Econ. Dev. 13(2A), 687 (2017). https://doi.org/10.5958/2322-0430.2017.00153.6

    Article  Google Scholar 

  70. Mahdian, M., Tomak, K.: Pay-per-action model for on-line advertising. Int. J. Electron. Commer. 13(2), 113 (2008). https://doi.org/10.2753/JEC1086-4415130205

    Article  Google Scholar 

  71. Pelánek, R., Jarušek, P.: Student modeling based on problem solving times. Int. J. Artif. Intell. Educ. 25(4), 493 (2015). https://doi.org/10.1007/s40593-015-0048-x

    Article  Google Scholar 

  72. Leszczyna, R.: TAmail – Anonymous Sending of Messages with Possibility of Responding. Tech. rep. (2023). Submitted to Information Systems and e-Business Management

  73. Leszczyna, R.: Practical cybersecurity assessment techniques - why are they adopted? A Review, Determinants and the Applicability Checklist. Tech. rep. (2023). Submitted to IEEE Access

  74. Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science, pp. 96–114. Springer-Verlag New York, Inc., Berkeley, California, USA (2000)

  75. Dolev, S., Ostrobsky, R.: Xor-trees for efficient anonymous multicast and reception. ACM Trans. Inf. Syst. Secur. 3(2), 63 (2000)

    Article  Google Scholar 

  76. Dlodlo, N., Mofolo, M., Masoane, L., Mncwabe, S., Sibiya, G., Mboweni, L.: Research Trends in Existing Technologies that are Building Blocks to the Internet of Things. In: Sobh, T., Elleithy, K. (eds.) Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering, pp. 539–548. Springer, Cham (2015)

  77. Hyman, V.: Your real-time guide to real-time payments. https://www.mastercard.com/news/perspectives/2022/real-time-payments-what-is-rtp-and-why-do-we-need-instant-payments/ (2023). Accessed 10 Jan 2024

  78. LLP., D.: Economic impact of real-time payments. Technical report, Mastercard (2019)

  79. Webster, N.: Webster’s Revised Unabridged Dictionary. G. & C. Merriam Company (1913)

  80. Babylon Software: Babylon NG (2020). dictionary.babylon-software.com

  81. Verkijika, S.F.: An affective response model for understanding the acceptance of mobile payment systems. Electron. Commer. Res. Appl. 39, 100905 (2020). https://doi.org/10.1016/j.elerap.2019.100905

    Article  Google Scholar 

  82. Leszczyna, R.: Review of cybersecurity assessment methods: applicability perspective. Comput. Secur. 108, 102376 (2021). https://doi.org/10.1016/J.COSE.2021.102376

    Article  Google Scholar 

  83. Wallis, T., Leszczyna, R.: Ee-isac – practical cybersecurity solution for the energy sector. Energies 15(6) (2022). https://doi.org/10.3390/en15062170

  84. Leszczyna, R., Wallis, T., Wróbel, M.R.: Developing novel solutions to realise the European energy - information sharing & analysis centre. Decis. Support Syst. 122, 113067 (2019). https://doi.org/10.1016/j.dss.2019.05.007

    Article  Google Scholar 

  85. Information Sharing & Analysis Centre (EE-ISAC). ww.ee-isac.eu

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rafał Leszczyna.

Ethics declarations

Conflicts of interest

The author declares that he has no known competing financial interests or personal relationships that could appear to influence the work described in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Leszczyna, R. Activity-based payments: alternative (anonymous) online payment model. Int. J. Inf. Secur. 23, 1741–1759 (2024). https://doi.org/10.1007/s10207-024-00816-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-024-00816-0

Keywords