Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/9537
Title: | Trusted integration of cloud-based NFC transaction players |
Authors: | Pourghomi, P Saeed, MQ Ghinea, G |
Keywords: | GSM authentication;Mobile transaction;Near Field Communication;Security |
Issue Date: | 2014 |
Publisher: | Institute of Electrical and Electronics Engineers Inc. |
Citation: | 2013 9th International Conference on Information Assurance and Security, IAS 2013, 2014, pp. 6 - 12 |
Abstract: | Near Field Communication (NFC) is a short range wireless technology that provides contactless transmission of data between devices. With an NFC enabled device, users can exchange information from one device to another, make payments and use their NFC enabled device as their identity. As the main payment ecosystem players such as service providers and secure element issuers have crucial roles in a multi-application mobile environment similar to NFC, managing such an environment has become very challenging. One of the technologies that can be used to ensure secure NFC transaction is cloud computing which offers wide range of advantages compare to the use of a Secure Element (SE) as a single entity in an NFC enabled phone. This approach provides a comprehensive leadership of the cloud provider towards managing and controlling customer's information where it allows the SE which is stored within an NFC phone to deal with authentication mechanisms rather than storing and managing sensitive transaction information. This paper discusses the NFC cloud Wallet model which has been proposed by us previously [1] and introduces a different insight that defines a new integrated framework based on a trusted relationship between the vendor and the Mobile Network Operator (MNO). We then carry out an analysis of such a relationship to investigate different possibilities that arise from this approach. |
URI: | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6947745 http://bura.brunel.ac.uk/handle/2438/9537 |
DOI: | http://dx.doi.org/10.1109/ISIAS.2013.6947745 |
ISBN: | 978-1-4799-2989-4 |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Fulltext.pdf | 230.57 kB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.