18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• should not require manual dispute resolution in case of unfair behavior by<br />

one party,<br />

• each party should be assured that the item he is about to receive is indeed the<br />

correct one,<br />

• should not require the active involvement of an online trusted third party,<br />

• should ensure anonymity for the customer and optionally for the merchant.<br />

Fair exchange: Ideally fair exchange requires that either both the parties involved in<br />

the transaction receive each other’s items or none do. However, researchers have<br />

often used the term in a weaker sense: the protocol gathers enough evidence during<br />

execution so that, in case one party behaves unfairly and obtains the other’s item. If a<br />

dispute occurs, a judge looks at the evidence and delivers his judgment. The dispute<br />

resolution is performed after the protocol execution, that is, after the customer has<br />

obtained his product or the merchant his money. However, such “after-the-fact”<br />

protection may be inadequate in an e-commerce environment where the customer and<br />

the merchant may be unreachable after the transaction (R & R, 2001).<br />

Avoiding manual dispute resolution: The need for manual dispute resolution, when<br />

one party behaves unfairly, does not arise if protocols provide true fair exchange –<br />

under all circumstances either both the parties receive each other’s items or none do.<br />

Protocols providing true fair exchange typically use an online trusted third party. The<br />

third party receives the information from each party involved in the e-commerce<br />

transaction and then forwards it to the other party. As a result if any party misbehaves<br />

or prematurely quits, no harm is caused to the other party.<br />

Ensuring correct item will be received: Before exchanging the items, each party must<br />

have the confidence that the item he is about to receive from the other party will<br />

indeed be the correct one. The use of an online trusted third party helps to meet this<br />

requirement as well. Although using a trusted third party helps meet some<br />

requirements, the third party is a source of bottleneck for these protocols. Not only is<br />

the performance of the third party an issue, but also its vulnerability to denial of<br />

service attacks.<br />

Reducing involvement of the third party: Several protocols have been proposed that<br />

do not use the third party unless a problem, such as, a party misbehaving or<br />

prematurely aborting, occurs. Such protocols are termed optimistic. Most of these<br />

protocols do not ensure true fair exchange.<br />

No existing e-commerce protocol that we know of satisfies all of these requirements<br />

simultaneously. There are a lot of things to develop in the e-commerce protocols. This<br />

is why the research community works with de software companies to obtain the ideal<br />

protocol, accepted by all.<br />

4. PROTOCOL’S VERIFICATION<br />

In the analysis of conventional communication protocols (G & L, 2001), three kinds<br />

of techniques have been applied to this problem:<br />

• Inference-construction methods are utilizing modal logics similar to those<br />

that have been developed for the analysis of the evolution of knowledge and<br />

belief in distributed systems. These methods are widely used and a number of<br />

~ 492 ~

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!