A Study on Security of Mobile Commerce in Cloud

碩士 === 國立中興大學 === 資訊管理學系所 === 100 === As more and more wireless devices are connected to the Internet, many have computed that mobile commerce will blossom soon, just like e-commerce booming in recent years. In addition, many services can be conducted on the mobile platform, such as Short Message Se...

Full description

Bibliographic Details
Main Authors: Hsiao-Chi Chiang, 江小琪
Other Authors: Iuon-Chang Lin
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/33525042739546941614
Description
Summary:碩士 === 國立中興大學 === 資訊管理學系所 === 100 === As more and more wireless devices are connected to the Internet, many have computed that mobile commerce will blossom soon, just like e-commerce booming in recent years. In addition, many services can be conducted on the mobile platform, such as Short Message Service (SMS) advertising. The mobile commerce is growing fast because it is more cost effective, personalized, and real time delivery capabilities. Moreover, with the rapid growth of Internet and mobile networks, cloud computing has become a prevalent trend in distributed computing systems, such as web services and cloud services. People can easily access remote computing resource and various services provided by third-party service provider. Therefore, cloud computing also can be applied in mobile commerce. In this study, we discuss the characteristics and requirements for data communication and security in mobile computing environment. This research first focus on protecting user’s privacy and proposing an efficient shopping protocol based on message authentication code (MAC) in ubiquitous commerce. In addition, the mobile commerce also can be applied in electronic cash and mobile coupons, so we proposed an e-cash payment system based on proxy blind signature can give change by cloud to cover divisibility and a secure sharing m-coupon scheme that a user can use the mobile device to share the sharable m-coupons to his/her friend through the cloud. At last, there are security and performance analyses to measure the effect of each scheme in this research.