Abstract
Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends or family of a buyer are interested in the same commodity or service, they can often buy at a lower price by buying in volume. This concept is referred to as group buying. Although the profit on a single commodity decreases for a merchant, the overall profits are increased due to volume. Traditionally, buyers and merchants trade through a group buying service company. However, sometimes transaction disputes arise. This might happen because a buyer has already paid through a group buying service company but has not received the merchandise or because a merchant has delivered merchandise to a buyer but has not been paid. Transaction disputes arise. We propose a fair group buying system. The proposed scheme uses secure computing theory to meet the security requirements such as mutual authentication, integrity of transaction data and anonymity of buyer. We propose a fair and secure group buying system based on arbitration computing mechanism to provide a comprehensive method for arbitrating an appeal. We create a win/win situation for the buyers, the merchants and the group buying service companies.
Similar content being viewed by others
References
Burrows M, Abadi M, Needham R (2007) A logic of authentication. ACM Trans Comput Syst 8(1):18–36
Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72
Bloom B (1970) Space/time tradeoffs in hash coding with allowable errors. Commun ACM 13(7):422–426
Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel. Electron. CommerRes Appl 10(3):279–287
Chung WY, Chen L (2012) Group-buying e-commerce in China. IT Prof 14(4):24–30
Daemen J, Rijmen V (2002) The design of rijndael: AES—the advanced encryption standard. Springer, New York
ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4):469–472
Feng ZN, Zhu YM, Zhang Q, Ni LM, Vasilakos AV (2014) TRAC: truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In: IEEE INFOCOM 2014—IEEE conference on computer communications, 1231–1239
Gilt City (2015) https://www.giltcity.com/. Accessible 18 Nov 18 2015
GOMAJI (2015) http://www.gomaji.com/. Accessible 18 Nov18 2015
Ihergo (2015) http://www.ihergo.com/. Accessible 18 Nov 2015
ITU (2015) http://www.itu.int/en/pages/default.aspx/. Accessible 18 Nov 2015
Jing Q, Vasilakos AV, Wan JF, Lu JW, Qiu DH (2014) Security of the Internet of things: perspectives and challenges. Wirel. Netw 20(8):2481–2501
Juhuasuan (2015) http://ju.taobao.com/. Accessible 18 Nov 18 2015
Lee JS, Lin KS (2013) An innovative electronic group-buying system for mobile commerce. Electron Commerce Res Appl 12:1–13
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card remote user password authentication scheme. J Netw Comput Appl 36:1365–1371
Liu BY, Bi J, Vasilakos AV (2014) Toward incentivizing anti-spoofing deployment. IEEE Trans Inf Forensics Secur 9(3):436–450
Mashayekhy L, Nejad MM, Grosu D, Vasilakos AV (2014) Incentive-compatible online mechanisms for resource provisioning and allocation in clouds. In: 2014 IEEE international conference on cloud computing, pp 312–319
Mashayekhy L, Nejad MM, Grosu D, Vasilakos AV (2016) An online mechanism for resource allocation and pricing in clouds. IEEE Trans Comput 65(4):1172–1184
Menezes A, Oorschot PV, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca Raton
Ni L, Chen GL, Li JH (2012) Escrowable identity-based authenticated key agreement protocol with strong security. Comput Math Appl 65(9):1339–1349
Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Schnorr CP (1991) Efficient signature generation for smart cards. J Cryptol 4:161–174
SISGO (2015) http://www.sisgo.com.tw/. Accessible 18 Nov 18 2015
Song H (2011) The B2C group-buying model on the Internet. In: Proceedings of 2011 \(2^{{\rm nd}}\) international conference on artificial intelligence, management science and electronic commerce (AIMSEC). Beijing, China, pp 7335–7340
Tan Z (2012) A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments. J Netw Comput Appl 35:1839–1846
Tsvetovat M, Sycara K, Chen Y, Ying J (2001) Customer coalitions in the electronic marketplace, lecture notes in computer science; vol 2003, agent-mediated electronic commerce III, current issues in agent-based electronic commerce systems (includes revised papers from AMEC 2000 Workshop), pp 121–138
Twongo (2015) http://www.twongo.com/. Accessible 18 Nov 2015
Wang YL, Chen LS, Leung HF, Hu CY, Chen BJ (2015) Fairness in secure computing protocols based on incentives. Soft computing. Springer, New York. doi:10.1007/s00500-015-1974-0
Wei LF, Zhu HJ, Cao ZF, Jia WW, Vasilakos AV (2010) SecCloud: bridging secure storage and computation in Cloud. In: 2010 IEEE 30th international conference on distributed computing systems workshops, pp 52–61
Wei LF, Zhu HJ, Cao ZF, Dong XL, Jia WW, Chen YL, Vasilakos AV (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for Internet of Things. J Netw Comput Appl 42:120–134
Yan Z, Li XY, Wang MJ, Vasilakos AV (2015) Flexible data access control based on trust and reputation in cloud computing. IEEE Trans Cloud Comput. doi:10.1109/TCC.2015.2469662
Yan Z, Ding WX, Niemi V, Vasilakos AV (2016) Two schemes of privacy-preserving trust evaluation. future Gener Comput Syst 62:175–189
Yang HM, Zhang YX, Zhou YZ, Fu XM, Liu H, Vasilakos AV (2014) Provably secure three-party authenticated key agreement protocol using smart cards. Comput Netw 58:29–38
Yipit (2015) http://yipit.com/. Accessible 18 Nov 2015
Zhang H, Li B, Jiang HB, Liu FM, Vasilakos AV, Liu JC (2013) A Framework for Truthful online auctions in cloud computing with heterogeneous user demands. In: 2013 Proceedings IEEE INFOCOM, pp 1510–1518
Acknowledgments
This research was supported by the National Science Council, Taiwan, R.O.C., under contract number MOST 103-2632-E-324-001-MY3, MOST 104-2221-E-324-012, MOST 105-2221-E-324-007 and MOST 105-2622-E-212-008 -CC2.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Chen, CL., Deng, YY. A fair and secure group buying system based on arbitration computing mechanism. Soft Comput 22, 119–135 (2018). https://doi.org/10.1007/s00500-016-2313-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-016-2313-9