Skip to main content
Log in

A fair and secure group buying system based on arbitration computing mechanism

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends or family of a buyer are interested in the same commodity or service, they can often buy at a lower price by buying in volume. This concept is referred to as group buying. Although the profit on a single commodity decreases for a merchant, the overall profits are increased due to volume. Traditionally, buyers and merchants trade through a group buying service company. However, sometimes transaction disputes arise. This might happen because a buyer has already paid through a group buying service company but has not received the merchandise or because a merchant has delivered merchandise to a buyer but has not been paid. Transaction disputes arise. We propose a fair group buying system. The proposed scheme uses secure computing theory to meet the security requirements such as mutual authentication, integrity of transaction data and anonymity of buyer. We propose a fair and secure group buying system based on arbitration computing mechanism to provide a comprehensive method for arbitrating an appeal. We create a win/win situation for the buyers, the merchants and the group buying service companies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Burrows M, Abadi M, Needham R (2007) A logic of authentication. ACM Trans Comput Syst 8(1):18–36

    Article  MATH  Google Scholar 

  • Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    Article  MathSciNet  MATH  Google Scholar 

  • Bloom B (1970) Space/time tradeoffs in hash coding with allowable errors. Commun ACM 13(7):422–426

    Article  MATH  Google Scholar 

  • Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel. Electron. CommerRes Appl 10(3):279–287

    Article  Google Scholar 

  • Chung WY, Chen L (2012) Group-buying e-commerce in China. IT Prof 14(4):24–30

    Article  Google Scholar 

  • Daemen J, Rijmen V (2002) The design of rijndael: AES—the advanced encryption standard. Springer, New York

    Book  MATH  Google Scholar 

  • ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4):469–472

    Article  MathSciNet  MATH  Google Scholar 

  • Feng ZN, Zhu YM, Zhang Q, Ni LM, Vasilakos AV (2014) TRAC: truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In: IEEE INFOCOM 2014—IEEE conference on computer communications, 1231–1239

  • Gilt City (2015) https://www.giltcity.com/. Accessible 18 Nov 18 2015

  • GOMAJI (2015) http://www.gomaji.com/. Accessible 18 Nov18 2015

  • Ihergo (2015) http://www.ihergo.com/. Accessible 18 Nov 2015

  • ITU (2015) http://www.itu.int/en/pages/default.aspx/. Accessible 18 Nov 2015

  • Jing Q, Vasilakos AV, Wan JF, Lu JW, Qiu DH (2014) Security of the Internet of things: perspectives and challenges. Wirel. Netw 20(8):2481–2501

    Article  Google Scholar 

  • Juhuasuan (2015) http://ju.taobao.com/. Accessible 18 Nov 18 2015

  • Lee JS, Lin KS (2013) An innovative electronic group-buying system for mobile commerce. Electron Commerce Res Appl 12:1–13

    Article  Google Scholar 

  • Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card remote user password authentication scheme. J Netw Comput Appl 36:1365–1371

    Article  Google Scholar 

  • Liu BY, Bi J, Vasilakos AV (2014) Toward incentivizing anti-spoofing deployment. IEEE Trans Inf Forensics Secur 9(3):436–450

    Article  Google Scholar 

  • Mashayekhy L, Nejad MM, Grosu D, Vasilakos AV (2014) Incentive-compatible online mechanisms for resource provisioning and allocation in clouds. In: 2014 IEEE international conference on cloud computing, pp 312–319

  • Mashayekhy L, Nejad MM, Grosu D, Vasilakos AV (2016) An online mechanism for resource allocation and pricing in clouds. IEEE Trans Comput 65(4):1172–1184

    Article  MathSciNet  MATH  Google Scholar 

  • Menezes A, Oorschot PV, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    Book  MATH  Google Scholar 

  • Ni L, Chen GL, Li JH (2012) Escrowable identity-based authenticated key agreement protocol with strong security. Comput Math Appl 65(9):1339–1349

    Article  MathSciNet  Google Scholar 

  • Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  MATH  Google Scholar 

  • Schnorr CP (1991) Efficient signature generation for smart cards. J Cryptol 4:161–174

    Article  MATH  Google Scholar 

  • SISGO (2015) http://www.sisgo.com.tw/. Accessible 18 Nov 18 2015

  • Song H (2011) The B2C group-buying model on the Internet. In: Proceedings of 2011 \(2^{{\rm nd}}\) international conference on artificial intelligence, management science and electronic commerce (AIMSEC). Beijing, China, pp 7335–7340

  • Tan Z (2012) A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments. J Netw Comput Appl 35:1839–1846

    Article  Google Scholar 

  • Tsvetovat M, Sycara K, Chen Y, Ying J (2001) Customer coalitions in the electronic marketplace, lecture notes in computer science; vol 2003, agent-mediated electronic commerce III, current issues in agent-based electronic commerce systems (includes revised papers from AMEC 2000 Workshop), pp 121–138

  • Twongo (2015) http://www.twongo.com/. Accessible 18 Nov 2015

  • Wang YL, Chen LS, Leung HF, Hu CY, Chen BJ (2015) Fairness in secure computing protocols based on incentives. Soft computing. Springer, New York. doi:10.1007/s00500-015-1974-0

  • Wei LF, Zhu HJ, Cao ZF, Jia WW, Vasilakos AV (2010) SecCloud: bridging secure storage and computation in Cloud. In: 2010 IEEE 30th international conference on distributed computing systems workshops, pp 52–61

  • Wei LF, Zhu HJ, Cao ZF, Dong XL, Jia WW, Chen YL, Vasilakos AV (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386

    Article  Google Scholar 

  • Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for Internet of Things. J Netw Comput Appl 42:120–134

  • Yan Z, Li XY, Wang MJ, Vasilakos AV (2015) Flexible data access control based on trust and reputation in cloud computing. IEEE Trans Cloud Comput. doi:10.1109/TCC.2015.2469662

  • Yan Z, Ding WX, Niemi V, Vasilakos AV (2016) Two schemes of privacy-preserving trust evaluation. future Gener Comput Syst 62:175–189

  • Yang HM, Zhang YX, Zhou YZ, Fu XM, Liu H, Vasilakos AV (2014) Provably secure three-party authenticated key agreement protocol using smart cards. Comput Netw 58:29–38

    Article  Google Scholar 

  • Yipit (2015) http://yipit.com/. Accessible 18 Nov 2015

  • Zhang H, Li B, Jiang HB, Liu FM, Vasilakos AV, Liu JC (2013) A Framework for Truthful online auctions in cloud computing with heterogeneous user demands. In: 2013 Proceedings IEEE INFOCOM, pp 1510–1518

Download references

Acknowledgments

This research was supported by the National Science Council, Taiwan, R.O.C., under contract number MOST 103-2632-E-324-001-MY3, MOST 104-2221-E-324-012, MOST 105-2221-E-324-007 and MOST 105-2622-E-212-008 -CC2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Ling Chen.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, CL., Deng, YY. A fair and secure group buying system based on arbitration computing mechanism. Soft Comput 22, 119–135 (2018). https://doi.org/10.1007/s00500-016-2313-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-016-2313-9

Keywords

Navigation