the value of each payment mean. This verification
requires the involvement of a trusted third party. In
addition, the payee can directly redeem the payment
means or use the same token for another payment, if
the micropayment mechanism allows asking for a
delegation authorization. In this case, every payee in
the network should verify the chain followed by the
payment mean since it has to be spent by the first
payer (Obaidat and Boudriga, 2007).
Consequently, micropayment still requires the
definition of appropriate security measures, which
could become complicated according to the number
of the payers and the nature of the payment means
and payment chains. Further, it does not define
mechanisms allowing to conclude distributed
payment or pay distributed applications. This kind of
applications is widely needed in the 4G networks,
which are characterized by the inter-operability of
different heterogeneous access networks composing
different types of networks with diverse underlying
protocols. Therefore, when accessing a service
provided on 4G networks, a node can be served
simultaneously by various service providers
belonging to different networks. Further, resources
may vary dynamically during service provision
according to the requestor’s node and the service
provider’s mobility. The study of these issues
becomes more interesting when we know that a node
can not identify all the resources contributing to
service provision. Thus, all these factors should be
taken into account during the design of payment
protocols. A significant example of 4G distributed
applications can be built through the study of the
characteristics of GRIDs.
Grids present an attractive area of application
characterized by large scale resource sharing and
innovative distributed applications. They enable the
sharing and coordinated use of resources in dynamic
collaborations. Resource sharing is not limited to file
exchange; it can provide on-demand access to all
kinds of computational resources. For Grids, the
sharing of resources is highly controlled. In fact,
resource providers and consumers need to negotiate
in real time resource sharing arrangements including
the nature, the security and the policies of the share.
Thus, GRID presents an interesting dynamic
architecture. In fact, the construction of a service is
done in real time without a prior knowledge of any
contributing node. Further, the first requester ignores
the manner with which his request is handled.
However, a network administrator can retrace the
service architecture. These features could be found
in micropayment and thus they would be used in our
system.
In this paper, we propose a secure micropayment
scheme based on the Grid paradigm. Our scheme
takes into consideration the nature of the distributed
application and resources sharing. In fact, it defines
mechanisms allowing to freely manage
micropayment means at different nodes of the
network. Thus, a consumer may allow providers to
re-assign new values and re-use micropayment
means for other purposes. In addition, in Grid
environment, a consumer does not need to have
knowledge about resource providers or service
architecture. Consequently he cannot identify to
whom he should pay. In our scheme, we also present
a solution to pay unknown parties without using
anonymous means since we should be able to trace
payment operations. Further, we use the architecture
of GRID services to define a security model for
micropayment, which allows protecting the involved
parties in a distributed manner.
The remaining of this paper is organized as
follows: Section 2 presents the main features and
shortcomings of micropayment schemes. Section 3
introduces the multi-party micropayment scheme
and defines the generation and the distribution
mechanisms. Section 4 presents the related
verification and tracing mechanisms. Section 5
shows some applications of the micropayment
scheme. Section 6 generalizes the micropayment
scheme for other application fields. Section 7
discusses the security features of the proposed
scheme. Finally, Section 8 concludes the paper.
2 MICROPAYMENT SCHEMES
In this section, we will introduce the main
micropayment schemes proposed in the literature.
We will focus on the advantages and the drawbacks
presented by each method for payment efficiency
and security. Micro-payments schemes are useful in
all those scenarios where many payments of small
amount of money are expected. During the mid
nineties a significant amount of research has focused
on developing micro-payments protocols: Millicent
(Manasse, 1995), MicroMint and PayWord are
among the most famous examples (Rivest and
Shamir, 1996).
In recent years, a strong need for new payments
proposals has given new energy to the micro
payment concept. Micali and Rivest have revisited
the PayWord protocol and the Rivest's Lottery
approach (Micali and Rivest, 2002), solving some
existing problems. In fact, one of the major
problems with payments of small amounts is that the
bank's processing cost can be much higher than the
transferred value. The most convincing solution is to
aggregate small payments in fewer larger payments.
Other problems, such as the computational time
ICE-B 2007 - International Conference on e-Business
138