Pseudonym and Privacy Using Quantum Key Distribution (QKD) in E-business

被引:0
|
作者
Setapa, Sharipah [1 ]
Abd Aziz, Norazah [1 ]
Khalid, Mohd Aminudin Mohd [1 ]
Zaba, Muhammad Reza [1 ]
Abd Kadir, Azimah [1 ]
机构
[1] Univ Sains Malaysia, Comp & Commun Engn, Bangi, Malaysia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2011年 / 11卷 / 08期
关键词
Privacy; Pseudonym; untraceable; linkable;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pseudonym ID now play important role in electronic e-commerce and e-service. For e-business payment gateway is the key to establish and serve customer need and payment. Customer will communicate without using their true identity in order to protect privacy. In spite of this, there is certain weakness in pseudonym because it is traceable and linked it with a user true identity. In classical way to generate a pure random number is impossible since the program was used is deterministic. QKD technique guarantees a secure communication with a pure randomly identical key between two parties. This paper focus on the pseudonym ID by using QKD to make the identity of user is untraceable and less linkable from the perspective of user identity privacy.
引用
收藏
页码:151 / 155
页数:5
相关论文
共 10 条
  • [1] Privacy Protecting in E-Business Using Reasoning
    Peng, Tao
    Jiang, Minghua
    Hu, Ming
    2009 IITA INTERNATIONAL CONFERENCE ON SERVICES SCIENCE, MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 374 - 377
  • [2] Protecting the Privacy Based on Reasoning in E-Business Using Anonymous
    Peng, Tao
    Jiang, Minghua
    Hu, Ming
    2009 INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY, VOL III, PROCEEDINGS,, 2009, : 232 - 235
  • [3] Networking security and privacy strategies in e-business
    Tsai, N
    Ching, RKH
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 70 - 73
  • [4] Privacy-based computation model in e-business
    Aburukba, Raafat
    Masaud-Wahaishi, AbdulMutalib
    Ghenniwa, Hamada
    Shen, Weiming
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2009, 47 (17) : 4885 - 4906
  • [5] ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector
    Vlachos, Vasileios
    Katevas, Gerasimos
    Katsidimas, Ioannis
    Kerimakis, Emmanouil
    Nikoletseas, Sotiris
    Panagiotou, Stefanos
    Spirakis, Paul
    25TH PAN-HELLENIC CONFERENCE ON INFORMATICS WITH INTERNATIONAL PARTICIPATION (PCI2021), 2021, : 362 - 368
  • [6] Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business
    Yee, George
    Korba, Larry
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2005, 1 (01) : 54 - 69
  • [7] FEATURES OF E-BUSINESS AND E-COMMERCE WITH A REFLECTION ON PRIVACY IN THE DIGITAL AGE
    Noninska, Irina
    Romansky, Radi
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2023, 15 (03): : 115 - 126
  • [8] Multi-level authentication for security in cloud using improved quantum key distribution
    Kumar, Ashutosh
    Verma, Garima
    NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2024,
  • [9] Efficient Mobile Security for E Health Care Application in Cloud for Secure Payment Using Key Distribution
    Saranya, A.
    Naresh, R.
    NEURAL PROCESSING LETTERS, 2023, 55 (01) : 141 - 152
  • [10] Efficient Mobile Security for E Health Care Application in Cloud for Secure Payment Using Key Distribution
    A. Saranya
    R. Naresh
    Neural Processing Letters, 2023, 55 : 141 - 152