Design of a distributed personal information access control scheme for secure integrated payment in NFC

Jungho Kang, Jong Hyuk Park, Sangkee Suk

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

At the center of core technologies for a future cyber world, such as Internet of Things (IoT) or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC)-based electronic payments. Near-field Communication (NFC) integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user's consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM) that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.

Original languageEnglish
Pages (from-to)935-948
Number of pages14
JournalSymmetry
Volume7
Issue number2
DOIs
StatePublished - 2015

Keywords

  • Access control
  • Distributed file system
  • Future cyber world
  • Hadoop
  • NFC eco-system
  • Personal-information

Fingerprint

Dive into the research topics of 'Design of a distributed personal information access control scheme for secure integrated payment in NFC'. Together they form a unique fingerprint.

Cite this