
communication cost of new users and redundant 
keys (joining and leaving) are 
1log +n
α
and n
α
log ,  n is the number  of 
users and 
 is the degree of the key tree. The 
cost in the proposal is as follows:  
1log +
⎟
⎠
⎞
⎜
⎝
⎛
i
n
α
   (14) 
and 
⎟
⎠
⎞
⎜
⎝
⎛
i
n
α
log     (15) 
Where, i is the number of branches. 
¾  The proposal provides strong data integrity 
which shows that the messages were generated 
from the claimed users and are not modified in 
transmission by group members or external 
adversaries. This specification supports this 
requirement based on the strict authentication 
and through the use of a one-way hash function. 
Each generated hashed message has a unique 
value so that any change to the message will 
produce a different value and will cause the 
verification process to fail.  
¾  The proposal provides user identification and 
record tracing. 
o  The generated hashed value in conjunction 
with the combination of unique ID and GK 
can assure the identity of the originator of 
the message. Also, the use of a one-way 
hash function provides a high degree of 
certainty that the message was generated by 
M. A similar mechanism is used in the 
response messages that sent back to M from 
the GC, thus providing a high degree of 
certainty that the response is indeed from 
the GC. It is therefore a strong proof that 
messages were transmitted by M and GC  
o  Each transmission performed by users will 
be recorded in the system by the generated 
h(v). The recorded parameters will provide 
a complete tracking mechanism to identify 
users and their activities. Therefore, users 
cannot deny the actions they performed in 
the system. 
 
5 CONCLUSION 
This paper proposes a new structure which can 
detect fraud by dynamically combining IK and GK.  
The new structure has the ability to identify users, 
manage them into groups, trace their activities and 
verify their authorization level. It also applies 
restricted access control and employs security 
policies which assign and manage different rules and 
privileges for users that may belong to same group. 
REFERENCES 
Angiulli, F.; Basta, S.; Pizzuti, C.; Feb. 2006: "Distance-
based detection and prediction of outliers " Knowledge 
and Data Engineering, IEEE Transactions on Digital 
Object Identifier 10.1109/TKDE.2006.29 Volume 18,  
Issue 2,  Feb. 2006 Page(s):145 – 160 
Donal O'Mahony, Michael Peirce, and Hitesh Tewari. 
Electronic Payment Systems for E-Commerce. Artech 
House, 2001. Second edition. 
Ghosh, S.; Reilly, D.L, "Credit card fraud detection with a 
neural-network", 1994, IEEE System Sciences,. 
Vol.III: Information Systems: Decision Support and 
Knowledge-Based Systems, Proceedings of the 
Twenty-Seventh Hawaii International Conference on , 
Volume: 3, pp.621-630, 4-7 Jan. 1994 
Harney H., Andrea Colegrove and Patrick McDaniel. 
"Principles of Policy in Secure Groups" . Proceedings 
of Network and Distributed Systems Security 2001. 
Internet Society, February 2001. San Diego, CA 
Harney H. and Muckenhirn C., 1997 “Group Key 
Management Protocol (GKMP) Architecture” RFC 
2094, 
Jan C, Jean-Marc Piveteau, and Markus Stadler. An 
Efficient Fair Payment System. In Proceedings of the 
3rd ACM Conference on Computer and 
Communications Security, pages 88{94, March 1996. 
Jon M. Peha, Ildar M. Khamitov, "PayCash: 2003, a 
secure efficient Internet payment system", Proceedings 
of the 5
th
 international conference on Electronic 
commerce, Pittsburgh, Pennsylvania, pp.125-130, 
Joris C, Valentin Dem, Danny De Cock, Bart Preneel, and 
Joos Vandewalle. 2002, On the Security of Today's 
Online Electronic Banking Systems. Computers & 
Security, 21(3):253{265, 
Medvinsky, G. & Neuman, B. C. (1993). Netcash: A 
design for practical electronic currency on the internet. 
Proceedings Of First ACM Conference On Computer 
and Communication Security, ACM. 
Patiwat P, "Money in electronic commerce: digital cash, 
electronic fund transfer, and Ecash", 1996 
Communications of the ACM, Volume 39, Issue 6, 
pp.45-50, 
Ren, D.; Rahal, I.; Perrizo, W.; 2004 "A vertical outlier 
detection algorithm with clusters as by-product" Tools 
with Artificial Intelligence, 2004. ICTAI 2004. 16th 
IEEE International Conference on Digital Object 
Identifier 10.1109/ICTAI.2004.22, 15-17 Nov. 2004 
Page(s):22 - 29  
Rodeh O.,et al.,"Optimized Group Rekey for Group 
Communication Systems" Network and Distributed 
System Security 2000, San Diego, CA , February 2000 
A NEW GROUP KEY MANAGEMENT STRUCTURE FOR FRAUDULENT INTERNET BANKING PAYMENTS
DETECTION
61