CFP last date
20 January 2025
Reseach Article

An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System

by Princewill Aigbe, andrew Onibere
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 18
Year of Publication: 2015
Authors: Princewill Aigbe, andrew Onibere
10.5120/21803-5112

Princewill Aigbe, andrew Onibere . An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications. 122, 18 ( July 2015), 32-39. DOI=10.5120/21803-5112

@article{ 10.5120/21803-5112,
author = { Princewill Aigbe, andrew Onibere },
title = { An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 18 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number18/21803-5112/ },
doi = { 10.5120/21803-5112 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:00.021864+05:30
%A Princewill Aigbe
%A andrew Onibere
%T An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 18
%P 32-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The introduction electronic commerce has created new financial needs that in many cases cannot be effectively fulfilled by the traditional payment systems. The success of electronic commerce business depends on the credibility of the available electronic payment systems. Electronic cash payment is one electronic payment systems developed to settle payments electronically, but suffers the problem of double-spending fraud. This paper identifies the possible causes of double-spending fraud and presents techniques to mitigate this type of fraud. These techniques involve the modification of existing electronic cash payment system, and a demonstration of the modified system to determine its double-spending fraud resistant capability.

References
  1. Chaum, D. , (1982). Blind signature for untraceable payments. Proceeding of the Annual International Cryptology conference on Advances in Cryptology (CRYTO'82), Santa Barbara, California.
  2. Chaum, D. , Fiat A. , Naor M. (1988). Untraceable Electronic Cash payments. Proceeding of the 8th Annual International Cryptology conference on Advances in Cryptology (CRYTO'88), Santa Barbara, California.
  3. Brands, S. (1993). An efficient off-line electronic cash system in wallets with observers. Proceeding of the 13th Annual International Cryptology conference on Advances in Cryptology (CRYTO'88), Santa Barbara, California.
  4. Osipkor, E. , Hopper, N. , and Kin, Y. (2007). Combating double-spending using co-operative P2P systems. 27th International conference on distributed computing systems (ICDCS '07), IEEE computer society.
  5. Elaalim, K. O. , and Yang, S. (2010). Electronic cash system with double-spending tracing based on elliptic curve cryptography. Journal of Computational information Systems, 6(9), 2949 – 2957.
  6. Nashidi, T. , Miyazaki, S. , and Sakurai, K. (2011). Security analysis of E-Cash systems with malicious insider. Journal of Wireless mobile Networks, Ubiquittous Computing, and Depending Applications, 3(2), 55 – 71.
  7. Ziba, E. , and Mehdi, E. (2011). A new untraceable off-line electronic cash system. Electronic Commerce and Applications, 10, 59 – 66.
  8. Yanling, H. , Haibin, W. , Xuguanf, C. , and Xia, L. (2014). Efficient divisible E-cash based on the P-Signature. International Journal of Multimedia and Ubiquitous Engineering, 9(10), 153 – 168.
  9. Colouris, G. , Dolkimore, J. , and Kindberg, T. (2001). Distributed Systems: Design and Concepts (3rd ed. ). Addison Wesley Publishers, Boston.
  10. Omrani, L. , Rafinezhad, Z. , and Keyvanpour, M. (2011). A function-based framework for classification and evaluation of mutual exclusion algorithms in distributed systems. International Journal of Computer Science and Security (IJCSS), 5(2), 890 – 908.
  11. Bertier, M. , Arantes, L. , and Sens, P. (2006). Hierarchical token based mutual exclusion algorithms. IEEE Intemational Symposium on Cluster Computing and the Grid, 539 - 546.
  12. Swaroop, A. , and Singh, K. (2007). A study of token-based algorithms for distributed mutual exclusion. International Review on Computers and Software (I. RE. CO. S), 2(4).
  13. Gupta, A. , Reddy, B. , Udayan, G. , and Ashish, K. (2012). A permission-based clustering mutual exclusion algorithms in mobile ad-hoc networks. International Journal of Engineering Research and Applications, 2(4), 019 – 026.
  14. Chokhani, E. , Carlisle, A. , and Lloyd, S. (2010). Internet X. 509 Public Key Infrastructure: Certificate Policy and Certification Practices Framework. Orion Security Solutions, Inc.
  15. Lenstra A. , and Verheul E. (2005). Selecting Cryptographic Key Sizes. Journal of Cryptology, 14.
  16. Stevens, M. (2012). Attacks on hash functions and applications. IpaskampDrukkers, Amsterdam.
Index Terms

Computer Science
Information Sciences

Keywords

eCash algorithm registration certificate double-spending fraud resistant capability merchant real time entity public key infrastructure subscriber registration authority.