communication cost of new users and redundant
keys (joining and leaving) are
1log +n
α
and n
α
log , n is the number of
users and
is the degree of the key tree. The
cost in the proposal is as follows:
1log +
⎟
⎠
⎞
⎜
⎝
⎛
i
n
α
(14)
and
⎟
⎠
⎞
⎜
⎝
⎛
i
n
α
log (15)
Where, i is the number of branches.
¾ The proposal provides strong data integrity
which shows that the messages were generated
from the claimed users and are not modified in
transmission by group members or external
adversaries. This specification supports this
requirement based on the strict authentication
and through the use of a one-way hash function.
Each generated hashed message has a unique
value so that any change to the message will
produce a different value and will cause the
verification process to fail.
¾ The proposal provides user identification and
record tracing.
o The generated hashed value in conjunction
with the combination of unique ID and GK
can assure the identity of the originator of
the message. Also, the use of a one-way
hash function provides a high degree of
certainty that the message was generated by
M. A similar mechanism is used in the
response messages that sent back to M from
the GC, thus providing a high degree of
certainty that the response is indeed from
the GC. It is therefore a strong proof that
messages were transmitted by M and GC
o Each transmission performed by users will
be recorded in the system by the generated
h(v). The recorded parameters will provide
a complete tracking mechanism to identify
users and their activities. Therefore, users
cannot deny the actions they performed in
the system.
5 CONCLUSION
This paper proposes a new structure which can
detect fraud by dynamically combining IK and GK.
The new structure has the ability to identify users,
manage them into groups, trace their activities and
verify their authorization level. It also applies
restricted access control and employs security
policies which assign and manage different rules and
privileges for users that may belong to same group.
REFERENCES
Angiulli, F.; Basta, S.; Pizzuti, C.; Feb. 2006: "Distance-
based detection and prediction of outliers " Knowledge
and Data Engineering, IEEE Transactions on Digital
Object Identifier 10.1109/TKDE.2006.29 Volume 18,
Issue 2, Feb. 2006 Page(s):145 – 160
Donal O'Mahony, Michael Peirce, and Hitesh Tewari.
Electronic Payment Systems for E-Commerce. Artech
House, 2001. Second edition.
Ghosh, S.; Reilly, D.L, "Credit card fraud detection with a
neural-network", 1994, IEEE System Sciences,.
Vol.III: Information Systems: Decision Support and
Knowledge-Based Systems, Proceedings of the
Twenty-Seventh Hawaii International Conference on ,
Volume: 3, pp.621-630, 4-7 Jan. 1994
Harney H., Andrea Colegrove and Patrick McDaniel.
"Principles of Policy in Secure Groups" . Proceedings
of Network and Distributed Systems Security 2001.
Internet Society, February 2001. San Diego, CA
Harney H. and Muckenhirn C., 1997 “Group Key
Management Protocol (GKMP) Architecture” RFC
2094,
Jan C, Jean-Marc Piveteau, and Markus Stadler. An
Efficient Fair Payment System. In Proceedings of the
3rd ACM Conference on Computer and
Communications Security, pages 88{94, March 1996.
Jon M. Peha, Ildar M. Khamitov, "PayCash: 2003, a
secure efficient Internet payment system", Proceedings
of the 5
th
international conference on Electronic
commerce, Pittsburgh, Pennsylvania, pp.125-130,
Joris C, Valentin Dem, Danny De Cock, Bart Preneel, and
Joos Vandewalle. 2002, On the Security of Today's
Online Electronic Banking Systems. Computers &
Security, 21(3):253{265,
Medvinsky, G. & Neuman, B. C. (1993). Netcash: A
design for practical electronic currency on the internet.
Proceedings Of First ACM Conference On Computer
and Communication Security, ACM.
Patiwat P, "Money in electronic commerce: digital cash,
electronic fund transfer, and Ecash", 1996
Communications of the ACM, Volume 39, Issue 6,
pp.45-50,
Ren, D.; Rahal, I.; Perrizo, W.; 2004 "A vertical outlier
detection algorithm with clusters as by-product" Tools
with Artificial Intelligence, 2004. ICTAI 2004. 16th
IEEE International Conference on Digital Object
Identifier 10.1109/ICTAI.2004.22, 15-17 Nov. 2004
Page(s):22 - 29
Rodeh O.,et al.,"Optimized Group Rekey for Group
Communication Systems" Network and Distributed
System Security 2000, San Diego, CA , February 2000
A NEW GROUP KEY MANAGEMENT STRUCTURE FOR FRAUDULENT INTERNET BANKING PAYMENTS
DETECTION
61