Integrating Asymmetric Cryptographic Digital Wallet for Online Services in Nigeria

Full Text (PDF, 950KB), PP.29-40

Views: 0 Downloads: 0

Author(s)

Theresa Olubukola Omodunbi 1,* Ayomide S. Akindutire 2 Tolulope Moyosore Awoyelu 3 Rhoda N. Ikono 1 Ishaya P. Gambo 1

1. Department of Computer Science and Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria

2. Canadian Wealth Inc., Calgrary, Alberta, Canada

3. Department of Computer Sciences, Ajayi Crowther University, Oyo, Nigeria

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2023.03.03

Received: 10 Oct. 2022 / Revised: 26 Nov. 2022 / Accepted: 27 Dec. 2022 / Published: 8 Jun. 2023

Index Terms

Data security, Cryptography, Digital wallet, Cryptocurrency, encryption, decryption

Abstract

Online stores have integrated one or more payment gateways on their website to facilitate the transaction of goods and services. In the Nigerian case, many physical stores are moving online. However, there is a gap in the payment methods which have slowed down business due to limited payment methods, charges incurred on gateways, and insecurity of websites. This paper is tailored towards the security of online transactions, reduced credit card usage and yet accentuation of cashless policy in Nigeria. Inline with the above stated, this paper proposed a secured digital wallet using cryptography to proffer a solution to exposing confidential information to different sites and curb fraudulent actions. By means of qualitative and quantitative research approach, data on user transactions were collected through google survey forms on how often they make transactions, 91.3% shop online but only 48.1% shop very often and 55% of sample questioned security of online payment, from the quantitative facts above, a larger percent of people who uses financial tools in their shopping activities have more security concern which this study solely aim at. In response to the corncern in the preceeding clauses, a mathematical model was formulated to generate keys for the wallet using an asymmetric cryptography scheme to improve the security process while using an online service. Furthermore, wallet referred in this paper uses the fund preload techniques which limits how often users needs to swipe their credit card for an handshake with the commercial banks, the end goal thus strengthen the Nigeria cashless policy. This paper generated encryption and decryption keys from the extension of the Euclid theorem and implemented a system that can generate keys for fund and asset transfer with the crypto service. The system was tested using unit testing and alpha and beta testing to assert the aims of the research. The result showed that digital wallet usage reduces the exposure of sensitive information on funds and allows using the account on different sites.

Cite This Paper

Theresa Olubukola Omodunbi, Ayomide S. Akindutire, Tolulope Moyosore Awoyelu, Rhoda N. Ikono, Ishaya P. Gambo, "Integrating Asymmetric Cryptographic Digital Wallet for Online Services in Nigeria", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.15, No.3, pp. 29-40, 2023. DOI:10.5815/ijieeb.2023.03.03

Reference

[1]P. Jinimol, “A Study on E-Wallet,” Int. J. Trend Sci. Res. Dev., vol. Volume-2, no. Issue-4, pp. 358–361, 2018, doi: 10.31142/ijtsrd12936.
[2]M. Olsen, J. Hedman, and R. Vatrapu, “E-wallet properties,” in 2011 10th International Conference on Mobile Business, 2011, pp. 158–165.
[3]Forum, “Mobile and Digital Wallets: US Landscape and Strategic Considerations for Merchants and Financial Institutions,” no. January, pp. 1–50, 2018, [Online]. Available: https://www.uspaymentsforum.org/wp-content/uploads/2018/01/Mobile-Digital-Wallets-WP-FINAL-January-2018.pdf.
[4]C. Eckstein, “Preventing data leakage : A risk based approach for controlled use of administrative and access,” North Bethesda, Maryland, 2015.
[5]A. Ali and Z. Hudaib, “E-payment Security Analysis In Depth,” Int. J. Comput. Sci. Secur., vol. 8, no. 8, pp. 14–24, 2014.
[6]F. Maqsood, M. Ahmed, M. M. Ali, and M. A. Shah, “Cryptography: a comparative analysis for modern techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 6, pp. 442–448, 2017.
[7]M. Barakat, C. Eder, and T. Hanke, “An introduction to cryptography,” Timo Hanke RWTH Aachen Univ., pp. 1–145, 2018.
[8]S. Tayal, N. Gupta, P. Gupta, D. Goyal, and M. Goyal, “A review paper on network security and cryptography,” Adv. Comput. Sci. Technol., vol. 10, no. 5, pp. 763–770, 2017.
[9]N. Stephenson, Cryptonomicon. Random House, 2012.
[10]V. Ahuja, Network and Internet security. Academic Press Professional, Inc., 1996.
[11]A. Sarkar, S. R. Chatterjee, and M. Chakraborty, “Role of Cryptography in Network Security,” in The" Essence" of Network Security: An End-to-End Panorama, Springer, 2021, pp. 103–143.
[12]H. C. A. Van Tilborg, An introduction to cryptology, vol. 52. Springer Science \& Business Media, 2012.
[13]M. Milutinović, “Cryptocurrency,” Ekonomika, vol. 64, no. 1, pp. 105–122, 2018, doi: 10.5937/ekonomika1801105m.
[14]C. Rose, “The evolution of digital currencies: Bitcoin, a cryptocurrency causing a monetary revolution,” Int. Bus. \& Econ. Res. J., vol. 14, no. 4, pp. 617–622, 2015.
[15]U. Mukhopadhyay, A. Skjellum, O. Hambolu, J. Oakley, L. Yu, and R. Brooks, “A brief survey of cryptocurrency systems,” in 2016 14th annual conference on privacy, security and trust (PST), 2016, pp. 745–752.
[16]G. M. Caporale, L. Gil-Alana, and A. Plastun, “Persistence in the cryptocurrency market,” Res. Int. Bus. Financ., vol. 46, no. February, pp. 141–148, 2018, doi: 10.1016/j.ribaf.2018.01.002.
[17]G. Nair and S. Sebastian, “Blockchain technology; centralised ledger to distributed ledger,” Intl Res J Eng Technol, vol. 4, pp. 2823–2827, 2017.
[18]G. Hileman and M. Rauchs, “Global cryptocurrency benchmarking study,” Cambridge Cent. Altern. Financ., vol. 33, pp. 33–113, 2017.
[19]B. A. Forouzan and D. Mukhopadhyay, Cryptography and network security. Mc Graw Hill Education (India) Private Limited, 2015.
[20]R. M. Starr, “11 - THE STRUCTURE OF EXCHANGE IN BARTER AND MONETARY ECONOMIES,” in General Equilibrium Models of Monetary Economies, R. M. Starr, Ed. Academic Press, 1989, pp. 129–143.
[21]W. S. Jevons, Money and the Mechanism of Exchange, vol. 17. D. Appleton, 1876.
[22]B. Ul, R. F., A. Mehraj, A. Ahmad, and S. Assad, “A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 5, pp. 256–271, 2017, doi: 10.14569/ijacsa.2017.080532.
[23]M. A. Ali, B. Arief, M. Emms, and A. van Moorsel, “Does the online card payment landscape unwittingly facilitate fraud?,” IEEE Secur. \& Priv., vol. 15, no. 2, pp. 78–86, 2017.
[24]T. Omodunbi, A. Bolaji, T. Awoyelu, and K. Taiwo, “Revamping Traditional Markets: Theoretical Framework for Linking Food Vendors to Consumers in Nigeria using Mobile Phones and Mobile Application,” vol. 7, no. 4, 2019, doi: 10.22624/AIMS/DIGITAL/V7N4P8.
[25]R. E. Holtfreter, “Latest debit card fraud schemes.” Sep. 2006.
[26]N. Manworren, J. Letwat, and O. Daily, “Why you should care about the Target data breach,” Bus. Horiz., vol. 59, no. 3, pp. 257–266, 2016.
[27]M. K. McGee, “A New In-Depth Analysis of Anthem Breach - BankInfoSecurity.” Jan. 2017.
[28]“Consumer-perceived risk in e-commerce transactions,” Commun. ACM, vol. 46, no. 12, pp. 325–331, 2003.
[29]A. Bergström, “Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses,” Comput. Human Behav., vol. 53, pp. 419–426, 2015.
[30]Y. Wang, C. Hahn, and K. Sutrave, “Mobile payment security, threats, and challenges,” Proc. 2016 2nd Conf. Mob. Secur. Serv. MOBISECSERV 2016, 2016, doi: 10.1109/MOBISECSERV.2016.7440226.
[31]T. Watanabe, Y. Omori, and others, “Online consumption during the covid-19 crisis: Evidence from Japan,” Covid Econ., vol. 38, no. 16, pp. 218–252, 2020.
[32]P. Dannenberg, M. Fuchs, T. Riedler, and C. Wiedemann, “Digital transition by COVID-19 pandemic? The German food online retail,” Tijdschr. voor Econ. en Soc. Geogr., vol. 111, no. 3, pp. 543–560, 2020.
[33]R. A. Gbadeyan and F. P. B. – Mensah, “Social Media Marketing Strategies for Small Business Sustainability: a Study on Selected Online Shoppers in Cape Coast, Ghana,” FUTA J. Manag. Technol., vol. 1, no. 1, pp. 84–99, 2016, doi: 1.1/fjmt.2016/v1n1p8.
[34]A. Salodkar, K. Morey, and M. Shirbhate, “Electronic wallet,” Int. Res. J. Eng. Technol., vol. 2, no. 09, pp. 975–977, 2015.
[35]M. A. Hassan and Z. Shukur, “Review of digital wallet requirements,” in 2019 International Conference on Cybersecurity (ICoCSec), 2019, pp. 43–48.
[36]M. Geerling, “E-commerce: A merchant’s perspective on innovative solutions in payments,” J. Payments Strateg. \& Syst., vol. 12, no. 1, pp. 58–67, 2018.
[37]M. Bosamia and D. Patel, “Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures,” Int. J. Comput. Sci. Eng., vol. 7, no. 1, pp. 810–817, 2019, doi: 10.26438/ijcse/v7i1.810817.
[38]A. G. González, “PayPal: The legal status of C2C payment systems,” Comput. Law Secur. Rep., vol. 20, no. 4, pp. 293–299, 2004, doi: 10.1016/S0267-3649(04)00051-2.
[39]E. P. Stringham, “The PayPal Wars,” Rev. Austrian Econ., vol. 21, no. 1, pp. 99–101, 2008.
[40]L. Daunton, “Paypal confirms users may have been affected by security breach - Consumer \& Society,” CONSUMER & SOCIETY. Jan. 2020.
[41]D. Herfors, “Challenges of PayPal,” pp. 1–17, 2017.
[42]J. D. M. Stamp, “QuickPay Online Payment Protocol,” Comb. SOA BPM Technol. Cross-System Process Autom., p. 223, 2008.
[43]H. R. El-Taj and R. Alhadhrami, “CryptoQR System based on RSA,” Int. J. Comput. Sci. Inf. Secur., vol. 18, no. 6, 2020.
[44]B. Kaliski, “The mathematics of the RSA public-key cryptosystem,” RSA Lab., 2006.
[45]J. Galt, “Report: Crypto QR code hacking on the rise,” Yahoo Finance. Sep. 2019.
[46]I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous distributed e-cash from bitcoin,” in 2013 IEEE Symposium on Security and Privacy, 2013, pp. 397–411.
[47]“An examination of the flaws in the Zerocoin protocol | Binance Research,” Binance Research (Etienne). .
[48]T. Ruffing, P. Moreno-Sanchez, and A. Kate, “P2P Mixing and Unlinkable Bitcoin Transactions,” 2017, doi: 10.14722/ndss.2017.23415.
[49]S. Ahamad, M. Nair, and B. Varghese, “A survey on crypto currencies,” Proc. Fourth Int. Conf. Adv. Comput. Sci., pp. 42–48, 2013, [Online]. Available: http://searchdl.org/public/conference/2013/AETACS/131.pdf.
[50]L. S. Hill, “Cryptography in an algebraic alphabet,” Am. Math. Mon., vol. 36, no. 6, pp. 306–312, 1929.