ABSTRACT
With recent significant development in e-commerce services, most major portal sites have gained popularity by setting up cybermalls. However, these cybermalls provide acknowledgment of order only by e-mail. Since the evidential capacity of e-mail is low from the viewpoint of digital forensics, we propose a method for preserving records of transactions for both customers and service providers by generating hysteresis signatures using cellular phones. The main feature of this method is the ability to prevent or detect falsification and deletion of records and to save evidence of a transaction without using any special device. We describe the proposed method and discuss its application to the ecommerce system we developed..
- Ministry of Economy, Trade and Industry. 2001. Annotation of the Act on Special Provisions to the Civil Code Concerning Electronic Consumer Contracts and Electronic Acceptance Notice. http://www.meti.go.jp/english/information/data/IT-policy/pdf/ECannotation.pdfGoogle Scholar
- Ozaki, K., Uda, R., Tojo, A. 2005. A Mutual Authentication System with Public Key Cryptosystem on A Cellular Phone. In Proceedings of the Computer Security Symposium 2005 (Matsuyama, Japan, Oct. 26--28, 2005), 535--540. (Japanese).Google Scholar
- Tanaka, M., Teshigawara, Y. 2005. User Authentication and Personal Information Input Methods by Making Use of a Matrix Code Reader on Mobile Phones. In Proceedings of the Computer Security Symposium 2005 (Matsuyama, Japan, Oct. 26--28, 2005), 691--696. (Japanese).Google Scholar
- Tanaka, M., Teshigawara, Y. 2006. Consideration on Applications of A User Authentication Method by Utilizing Mobile Phones. In Proceedings of the Workshop on Interactive Systems and Software 2006 (Morioka, Japan, Dec. 6--8, 2006), 157--158. (Japanese).Google Scholar
- Tanaka, M., Teshigawara, Y. 2007. A Personal Information Protection Method for Web Applications by Utilizing a Mobile Phone Based on a Ring Topology Information Transfer Model. IEICE Transactions on Information and Systems, D, Vol.J90-D, No.2, 373--383. (Japanese).Google Scholar
- Tanaka, M., Teshigawara, Y. 2008. A User Authentication Method by Making Use of a Matrix Code Reader on Mobile Phones. IPSJ Journal, Vol.49, No.7, 2425--2439. (Japanese).Google Scholar
- Ashino, Y., Sasaki, R. 2008. Proposal and Evaluation of Digital Forensic System Using Security Device and Hysteresis Signature. IPSJ Journal, Vol.49, No.2, 999--1008. (Japanese).Google Scholar
- Schneier, B. and Kelsey, J. 1998. Cryptographic Support for Secure Logs on Untrusted Machines. The 7th USENIX Security Symposium Proceedings (San Antonio, Texas, Jan. 26--29, 1998), 53--62. Google ScholarDigital Library
- Susaki, S. Matsumoto, T. 2002. Alibi Establishment for Electronic Signatures. IPSJ Journal, Vol.43, No.8, 2381--2393. (Japanese).Google Scholar
- NTT DoCoMo, Inc. 2000. i-mode Java Content Developer's Guide -Functional Descriptions- Release 1.1.Google Scholar
Recommendations
Identity-based undetachable digital signature for mobile agents in electronic commerce
To enable mobile agents signing securely on potentially malicious hosts in electronic commerce and other applications, we proposed the definition and security notion of identity-based undetachable digital signature schemes. More importantly, we proposed ...
Maintaining electronic commerce systems: the legal issues
Electronic commerce over the Internet is growing at an increasing pace worldwide. Maintenance of electronic commerce systems is thus becoming an increasingly important IT activity. In this paper the legal issues concerned with the maintenance of ...
Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level
SADFE '10: Proceedings of the 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic EngineeringAbstract: Revolution in Internet and ease in use of latest technology is significantly increasing the use of latest technology worldwide, day by day. Advancement in digital devices such as computers and cell phones also helped the people to work both ...
Comments