37
Fraud Resilient for Micro Payments Using Coin Management

micro payments using coin

Embed Size (px)

Citation preview

Page 1: micro payments using coin

Fraud Resilient for Micro Payments

Using Coin Management

Page 2: micro payments using coin

CONTENTS

ABSTRACT

INTRODUCTION

EXISTING SYSTEM

DIS ADVANTAGES

PROPOSED SYSTEM

ADVANTAGES

MODULES

HARDWARE REQUIREMENTS

SOFTWARE REQUIREMENTS

REFERENCES

Page 3: micro payments using coin

Abstract

Online shopping payment scheme is one of the popular in recent

years. During payment process the attackers aim to stealing the

customer data by targeting the Point of Sale (PoS) system.

Increasing malware that can steal card data as soon as they are

read by the device.

The proposed work is to provide secure fully off-line work is

interactivity between multiple client - server.

Providing an exhaustive Coin Management in framing and creating

On Mobile Move Coins.

Page 4: micro payments using coin

Introduction

Credit and debit card data stealing is most

popular problem in cybercrime.

The FRoDO introduces a secure off physical

unclonable function.

FRoDO introduces coin element and identity

element.

The main benefit is a simpler, faster, and more

secure interaction between the involved

actors/entities.

Page 5: micro payments using coin

Existing System

In the present method, the approach describes FRoDO,

a at ease off-line micro-cost solution that's resilient to

PoS information breaches.

FRoDo presents a constant structure in developing and

preservation of coins.

The FroDO solution cannot improves over up to the

moment procedures in phrases of flexibility and

protection required by using user.

Page 6: micro payments using coin

Dis-Advantages

The system implemented called FRoDO, was built using a static

coin architecture which are easier to hack.

Current FroDo Does not provides Coins Management.

FroDo is a weak prevention strategy based on data obfuscation and

did not address the most relevant attacks aimed at threatening

customer sensitive data, thus being vulnerable to many advanced

attack techniques.

Page 7: micro payments using coin

Proposed System

Project can be extended with Coin Management

in framing and creating On Mobile Move Coins.

Project is extended with UmcFrodo (User

Management of Coins with Fraud Resilient

Device for Off-line micro-Payments).

Extended Frodo provides coin management as

need of user requirements.

Page 8: micro payments using coin

Advantages

UMFroDo provides On Mobile Coins Management.

UMFroDo is provides prevention strategy based on data

obfuscation and address the most relevant attacks.

Creating on Mobile Coins provides user in generating and

managing coins when needed.

Page 9: micro payments using coin

Modules

System Construction Module

Identity Element

Coin Element

Attack Mitigation

Shopping Module

Page 10: micro payments using coin

System Construction Module

In the first module, develop the System

Construction module with the various entities:

Vendor, User, FRoDO, PUF, Attacker.

This process is developed completely on

Offline Transaction process. Develop the

system with user entity initially.

Page 11: micro payments using coin

Identity Element

FRoDO does not require any special hardware

component apart from the identity and the coin

element that can be either plugged into the

customer device or directly embedded into the

device.

Similarly to secure elements, both the identity

and the coin element can be considered

tamperproof devices with a secure storage and

execution environment for sensitive data

Page 12: micro payments using coin

Coin Element

In this module, develop Coin Element.

The Key Generator is used to compute on-the-

fly the private key of the coin element.

The Cryptographic Element used for

symmetric and asymmetric cryptographic

algorithms applied to data received in input

and send as output by the coin element;

Page 13: micro payments using coin

Attack Mitigation

The read-once property of the erasable PUF

used in this solution prevents an attacker from

computing the same coin twice.

Even if a malicious customer creates a fake

vendor device and reads all the coins, it will

not be able to spend any of these coins due to

the inability to decrypt the request of other

vendors.

Page 14: micro payments using coin

Shopping Module

Designed Shopping Module with payment

gateway Interface.

At payment, Frodo Coin Concept is connected

for payments.

User can use coins at payment gateway

interface.

Page 15: micro payments using coin

Hardware Requirements

System : Pentium IV 2.4 GHz or More

Hard Disk : 40 GB

RAM : 2 GB

Page 16: micro payments using coin

Software Requirements

Operating System : Windows XP/7/8

Language : Java

Front End : JSP

Database : My-SQL

Page 17: micro payments using coin
Page 18: micro payments using coin
Page 19: micro payments using coin
Page 20: micro payments using coin
Page 21: micro payments using coin
Page 22: micro payments using coin
Page 23: micro payments using coin
Page 24: micro payments using coin
Page 25: micro payments using coin
Page 26: micro payments using coin
Page 27: micro payments using coin
Page 28: micro payments using coin
Page 29: micro payments using coin
Page 30: micro payments using coin
Page 31: micro payments using coin
Page 32: micro payments using coin
Page 33: micro payments using coin
Page 34: micro payments using coin

Conclusion

In this project we have introduced FRoDO that is, to the best of our

knowledge, the first data-breach-resilient fully off-line micropayment

approach.

The security analysis shows that FRoDO does not impose

trustworthiness assumptions. Further, FRoDO is also the first

solution in the literature where no customer device data attacks can

be exploited to compromise the system.

This has been achieved mainly by leveraging a novel erasable PUF

architecture and a novel protocol design. Furthermore, our proposal

has been thoroughly discussed and compared against the state of

the art.

Our analysis shows that FRoDO is the only proposal that enjoys all

the properties required to a secure micro-payment solution, while

also introducing flexibility when considering the payment medium

(types of digital coins).

Page 35: micro payments using coin

Future Scope

Finally, some open issues have been identified

that are left as future work. In particular, we

are investigating the possibility to allow digital

change to be spent over multiple off-line

transactions while maintaining the same level

of security and usability

Page 36: micro payments using coin

References

[1] Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini:

“Fraud Resilient Device for Off-Line Micro-Payments,” in Ieee Transactions

On Dependable And Secure Computing, Vol. 13, No. 2, March/April 2016.

[2] R. L. Rivest, “Payword and micromint: Two simple micropayment

schemes,” in Proc. Int. Workshop Security Protocols, 1996, pp. 69–87.

[3] S. Martins and Y. Yang, “Introduction to bitcoins: A pseudoanonymous

electronic currency system,” in Proc. Conf. Center Adv. Stud. Collaborative

Res., 2011, pp. 349–350.

[4] Verizon, “2014 data breach investigations report,” Verizon, Tech. Rep.,

2014, http://www.verizonenterprise.com/DBIR/2014/

[5] T. Micro, “Point-of-sale system breaches, threats to the retail and

hospitality industries,” University of Zurich, Department of Informatics,

2010.

Page 37: micro payments using coin

THANK U