A phase model for e-commerce business models and its
application to security assessment.
[Documento Completo]
Manfred Hauswirth, Mehdi Jazayeri
and Markus Schneider
M.Hauswirth@infosys.tuwien.ac.at
M.Jazayeri@infosys.tuwien.ac.at
markus.schneider@darmstadt.gmd.de
TUV-1841-00-04 June 5, 2000
Technical University of Vienna
Information Systems Institute
Distributed Systems Group
New e-commerce business models attempt to exploit information
technol-ogy to overcome the limitations of traditional business
models. The usual motivation is to lower costs by improving the
efficiency of business pro-cesses.
One of of the basic requirements for the success of these busi-ness
models is security mechanisms against theft or other fraud. Early
e-commerce systems used customized security solutions. With the
rapid increase in the numbers of such systems, however, developing
customized security mechanisms for each system is not a viable
solution. Another rea-son against the use of customized security
solutions is the complexity of the new business models and their
continuous evolution. The complexity of the models stems from an
increase in the number of roles and interac-tions. The simple
customer-vendor model is often augmented by a large number of
third-party intermediaries, complicating the overall security as-sessment
of e-commerce business models. To address these problems, this
paper presents a simple approach to understanding e-commerce
business models by phases in business processes and roles and
interactions in each phase. A concrete business model is defined
by mapping it onto a certain sequence of phases. We use our model
to categorize several new business models of current interest to
the business community. We then analyze the specific security
requirements of these business models and highlight poten-tial
threat scenarios and describe their solutions. The contribution of
the paper is in the decomposition approach for e-commerce business
models and its application to the systematic assessment of their
security require-ments.
Keywords: E-commerce, modeling, security assessment.c
_
2000, Distributed Systems Group, Technical University of Vienna
Argentinierstr. 8/184-1
A-1040 Vienna, Austria
phone: +43 1 58801-4470
fax: +43 1 5058453
URL: http://www.infosys.tuwien.ac.at/
2.A phase model for e-commerce business models and its application
to security assessment _
Manfred Hauswirth _ , Mehdi Jazayeri _ and Markus Schneider _
_
Technical University Vienna, Information Systems Institute,
Argentinierstr. 8, A-1040 Vienna, Austria
_
GMD - German National Research Center for Information Technology,
Institute for Secure Telecooperation,
Dolivostr. 15, D-64293 Darmstadt, Germany
_
m.hauswirth|m.jazayeri
_
@infosys.tuwien.ac.at,
markus.schneider@darmstadt.gmd.de
Abstract. New e-commerce business models attempt to exploit
information technology to overcome the limitations of traditional
business models. The usual motivation is to lower costs by
improving the efficiency of business processes. One of of the
basic requirements for the success of these business models is
security mechanisms against theft or other fraud. Early e-commerce
systems used customized security solutions. With the rapid
increase in the numbers of such systems, however, developing cus-tomized
security mechanisms for each system is not a viable solution.
Another reason against the use of customized security solutions is
the complexity of the new business models and their continuous
evo-lution. The complexity of the models stems from an increase in
the number of roles and interactions. The simple customer-vendor
model is often augmented by a large number of third-party
intermediaries, complicating the overall security assessment of e-commerce
business models. To address these prob-lems, this paper presents a
simple approach to understanding e-commerce business models by
phases in business processes and roles and interactions in each
phase. A concrete business model is defined by mapping it onto a
certain sequence of phases. We use our model to categorize several
new business models of current interest to the business community.
We then analyze the specific security require-ments of these
business models and highlight potential threat scenarios and
describe their solutions. The contribution of the paper is in the
decomposition approach for e-commerce business models and its
application to the systematic assessment of their security
requirements.
1 Introduction
The Internet has become the most relevant platform for e-commerce.
Vendors and customers of various market segments are trading via
the Internet using a number of different business models.
Additional new business models emerge due to the dynamics in e-commerce
and new demands in the electronic markets. Of course, the main
goal of doing business is to make profit under the assumption that
every involved party respects the rules that are defined by the
legal framework (if such a framework already exists and if it is
applicable to the trans-national character of e-commerce). As in
real life this assumption is clearly too idealistic: Experience
shows that e-commerce suffers from the same possible threats, such
as theft or fraud, as non-electronic business. Even worse the
possibilities of the electronic environment sometimes make it
easier to commit illegal actions at a larger scale. The new
business models, however, can only be successful if their
technical design and implementation are done in a secure way to
prevent threats. Thus, beside base technologies, such as exchange
formats, interaction protocols, and payment systems, security is a
main issue in e-commerce [15].
In early e-commerce systems the business models were quite simple.
Typically they were electronic re-implementations
of traditional models with a small number of involved roles, for
example, customer-vendor,
customer-vendor-bank. These systems used customized security
solutions and considered mainly
peer-to-peer security, i.e., security issues between two
communication partners (2-party security). With the
rapid explosion of such systems, developing security mechanisms
from scratch each time is no longer a
_
This work was supported in part by the European Commission under
contract IST-1999-10288, project OPELIX (Open Personalized
Electronic Information Commerce System)..2 Hauswirth et al.
viable solution. Additionally, 2-party security cannot easily be
generalized to n interacting parties (n-party security), because
with the number of interacting parties also a much higher number
of security threats is possible (for example, by collusions
between parties).
This is especially true because the newbusiness models are complex
and evolving because they are based on the business cooperation
between several partners. The complexity derives from an increase
in the number of roles and interactions. The simple customer-vendor
model has been augmented by a large number of intermediaries and
suppliers. The new business processes frequently have a higher
complexity and have no corresponding analogs in the real world,
i.e., they are not re-implementations of traditional business
models. Furthermore, new techniques such as sophisticated user
profiling are introduced. A security model must apply to all roles
and interactions and support the integration of specific security
solutions based on the specific requirements of the e-commerce
business model.
As in the tangible world e-business is done in phases:
advertising, negotiation (ends with a contract), ordering,
payment, and delivery (relevant mainly for businesses involving
intangible goods). Depending on the concrete business model phases
may be left out or their order may be changed. For example,
payment could be done before or after delivery. The business
models themselves are defined by mapping these phases onto the
parties interacting in a business model, i.e., which parties
interact in which phase of the model.
With the new business models, which involve more parties and more
complex interaction, and the upcom-ing
domain of i-commerce (trading of intangible goods such as
information or software), new security
problems arise for which technical solutions exist but have
received little attention so far. Secure and trust-worthy
commercial relationships require a better understanding of the
risks and how they can be addressed technically. Once an attack is
successful and becomes public, the harm resulting from the loss of
reputation can be much higher than possible direct monetary losses
caused by the attack. To prevent successful attacks the important
questions to be answered are:
· What are the potential security holes of the new business
models?
· What are the differences for these business models from a
security point of view if dealing with tangible and intangible
goods?
· Can these problems be solved under simple assumptions in the
trust model?
· Can these problems be solved under harder assumptions in the
trust model (for example, colluding partners)?
· What are the security methods to solve these problems?
A systematic and general approach to discover all possible
problems and scenarios has not been defined so
far. At the moment security analysis of business models is done ad
hoc and heavily depends on intuition and experience. Answers to
the previous questions can only be given for the new business
models in a general form. Specific variants of business models may
yield new security problems. This paper presents a phases model
for e-commerce systems which is applied in a systematic approach
to assess the security of an e-commerce business model and
discusses techniques to overcome possible threats. Section 2
presents the phases model. We describe the involved business roles
and the exchanged artifacts. Then we break down the business
process into phases (advertising, negotiation, ordering, payment,
and delivery) and describe them. The actual business models are
derived by mapping the phases onto the roles that interact in a
certain phase and the sequence in which the phases occur. At the
end of this section we classify the currently relevant business
models in terms of our model. As a prerequisite for a security
analysis of business models Section 3 describes the security
threats to be considered. Section 4 then maps the security threats
onto the business process phases (and thus onto the business
models), analyzes possible threats for each phase and presents
security mechanisms to overcome them. This allows us to define the
security threats for a specific business model and how they can be
addressed. Finally Section 5 rounds out the paper with our
conclusions.
2 Modeling the Business Process
According to [18] a business model for e-commerce is defined as
· an architecture for the product, service and information flows,
including a description of the various
business actors and their roles;.A phase model for e-commerce
business models and its application to security assessment 3
· a description of the potential benefits for the various business
actors; and
· a description of the sources of revenues.
In this section we define a general model for e-commerce business
models according to this definition. The definition will be done
in several steps: First we will describe the involved business
actors and their possible roles and the exchanged artifacts. Then
we will define and describe the phases every business model may
involve including the possible services, information flows,
benefits for the business actors and sources of revenues. In the
final step we map these phases onto the currently relevant
business models and describe them in terms of our model. The
definition of business models in terms of phases simplifies the
investigation of security threats that will be done in Section 4.
Additionally the phase model facilitates to cover all possible
business models even if they are currently not used.
2.1 Business Roles and Artifacts
Every possible business model can be modeled with three business
roles: customers, providers, and inter-mediaries.A customer
requests services or products from providers or intermediaries,
expects the delivery of the requested product or service, and
possibly has to pay for it. A provider generates and offers
products or services to customers and intermediaries, delivers
them according to the negotiated business terms, and may require
payment for them. An intermediary offers services to customers,
providers, and intermediaries and possibly offers products to
customers or other intermediaries. A concrete business model can
involve any number of any of these roles but at least must consist
of a customer and a provider. The services and products an
intermediary offers can be manifold. It can provide search and
retrieval services, advertise products or services, group, order,
enhance, or aggregate information products, or pro-vide mediation,
negotiation, delivery, security, or payment services. The
underlying idea is that customers, providers, or intermediaries
can delegate certain functionalities to specialized intermediaries
so that they do not have to address certain issues themselves
(e.g., a credit card company offers electronic payment services
for customers and providers).
In the trading (business) process between these actors the
following main artifacts are produced, used, exchanged, and
modified [7]:
Request: defines a service or product a party is interested in;
sent from a customer or intermediary to a provider or intermediary
Offer: defines a service or product of a provider or intermediary
(including legal terms and prices); sent from a provider or
intermediary to a customer or intermediary Order: if a party is
satisfied with an offer (possibly after a negotiation phase) an
order is placed with the offering party; sent from a customer or
intermediary to a provider or intermediary Product: goods
(service, information, material goods, tangible or intangible)
which are traded in a busi-ness model; sent from a provider or
intermediary to a customer or intermediary A detailed description
of the above terminology and a business and domain model for
information com-merce are given in [7]. Additional optional
artifacts required in special types of models will be described
together with the models in which they are required.
2.2 Business Process Phases
A typical business model consists of a combination (of a subset)
of the following phases: advertising, negotiation, ordering,
payment, delivery.
Advertising: A party publishes descriptions of the available
products to enable other parties to discover
products of their interest and browse through available offers.
Offers may be legally binding or not. Adver-tising
can be implemented in many different ways. For example, offers
could be published on a web server waiting for parties to access
them, they can be actively distributed via mailing lists or push
systems, or they can be gathered by an active search component
(mobile agents) which was equipped with a searching party’s
criteria.
Negotiation: Once a party has found a product of interest it can
start negotiating the business terms and
possibly the properties of the product. In the simplest case no
negotiation takes place at all (because the.4 Hauswirth et
al.provider’s offers are not negotiable or because the customer is
satisfied with the offer) and the requesting party accepts the
offer. Independently of the concrete negotiation process the
negotiation phase ends with an agreement between the involved
parties as a necessary prerequisite for the following phases.
Negotiation and advertising can trigger each other mutually: If no
agreement can be reached a party can request new offers or the
party issuing the original offer can send new offers.
Ordering: After an agreement on the product and the business terms
has been reached, a party may order the product. If the agreement
is legally binding, we call it a contract. Payment: If a product
requires payment, then monetary values must be exchanged, i.e.,
some kind of payment occurs. We consider payment from a high-level
point of view due to the arbitrary ways it can be done: It may
involve credit card interactions, a bonus point system,
micro-payments, or real money transfers, and heavily depends on
the applied payment model. For example, the full price of the
product could be paid at once or in rates, a flat-fee may be paid
for a service, or a pay-per-use fee may be due for each use of a
product. Since these models involve very different concerns we
address the conceptual superset of their security issues but do
not go into detail with the applied payment systems and assume
that the payment transaction itself is secured in a feasible way.
Delivery: In this phase the involved product is delivered to the
requesting parties. Security in the delivery phase heavily depends
on the nature of the product. For tangible goods the security
precautions well-known from non-electronic commerce systems apply.
For intangible goods, however, new security issues must be taken
into consideration. For example, intangible goods such as programs
or documents may be duplicated by a malicious party and
distributed or sold without the knowledge or consent of the
copyright holder (copyright infringement, fraud); a party may have
the permission of the copyright holder for licensed production but
pays the license fee for a subset of the copies only; the product
could be tampered with on its way to the receiving party; or the
product may never reach the intended recipient due to theft or
simply because of technical problems (network failure, system
crash). These scenarios require special consideration to obtain
security standards for intangible goods which are comparable to
tangible goods. The security problems of intangible goods and an
approach to address them are presented in [8]. The possible
business models are derived from the above phases by mapping them
onto the roles that interact in a certain phase and the sequence
in which the phases occur. For example, if advertising is mapped
onto the customer and the intermediary, but all other phases are
done directly between the customer and the provider, as shown in
Figure 2, then this defines the associated partner business model.
2.3 The Incremental Business Phases Model
In the following we consider an incremental business process in
which the provider gradually delegates
phases (i.e., functionality) to the intermediary. This simplifies
the presentation but does not exclude other
models or violate the general applicability of the approach
because it facilitates to model the superset of
possible security concerns and abstracts from the initiating
party: If a phase is skipped then the security
concerns defined for that phase do not apply; if a phase is
performed by the provider instead of the inter-mediary
(as in our incremental model) then the involved security issues
were discussed in a previous step of the incremental model and
must be applied; and if the initiative in a phase is reversed,
then the security issues can easily be derived from the original
phase in the incremental model. Depending on the applied business
model the sequence of phases may differ from the sequence in the
incremental model as discussed below. For example, the advertising
and negotiation phases will occur in the order given below and the
sequence of the following phases may be changed. In another
business model a product might be delivered to a party without
prior advertising, negotiation, and ordering, on the basis of a
party’s profile. In such a model, the receiving party may test the
product; send it back if it is not interesting, or in case it is,
enter into the negotiation and payment phases afterwards. Some
business models may require payment to follow the successful
delivery of the product.
In principle any sequence of the phases is possible depending on
the business model. We use the incre-mental
model as a special configuration without constraining generality
to enable easier assessment of the
security concerns. Also the number of intermediaries involved may
differ. For each phase in the process a
dedicated intermediary may be used. For example, one intermediary
may be in charge of advertising, nego-tiation,
and ordering, payment may be done via the services of a credit
card company, and delivery would.A phase model for e-commerce
business models and its application to security assessment 5
be provided by a specialized logistics company. However, this does
not have an impact on the general applicability of our model.
Figure 1 shows the simplest model (UML sequence diagram [14])
where all interactions occur directly between the customer and the
provider (for clarity reasons the UML diagrams are not complete
but focus on the main interactions and data flows).
Customer
deliver product
· negotiate business terms
order product
pay product
Provider
advertize product
Fig. 1. Direct model: customer and provider do not employ an
intermediary
At the moment this model is used frequently. It involves 2-party
security issues only which are well inves-tigated
and standard solutions exist for all phases. However, it is likely
to diminish in importance, because it requires the full set of
functionalities for all phases at the customer and the provider
which may yield “heavy” applications and may necessitate
considerable installation efforts on the customer side (if the
phases are supported by software and do not simply rely on the
user filling out web forms and thus driving the process via the
input data). This model is typically known as e-shop model or
portal, if the portal is focussed on the products of one provider.
Since many of the terms denoting such models are rather fuzzy,
overloaded, and imprecise we introduce our own terminology with
exact definitions and then relate this terminology to the common
current terms (this may be a m:n mapping). In our terminology we
call the model given in Figure 1 the direct model of e-commerce.
In the direct model the provider is in full control of the whole
process at the cost of having to provide all required
functionality. The sources of revenue are clear since only the
provider and no intermediaries are involved.
The current trend in e-commerce goes towards the
separation-of-concerns paradigm in which specialized
intermediaries gradually take over part of the functionality
(phases). The benefit for the provider in these models is that it
can delegate parts of the process and need not implement it and
pays the intermediary for the service(s) it provides. The customer
may also benefit because the models may allow the customer to
compare prices and products, combine them, or simply order them at
a single location. In the first model—the A model—shown in Figure
2 the intermediary takes over the advertising phase from the
provider.
Customer
advertize product
Provider
· negotiate business terms
order product
pay product
deliver product
Intermediary
Fig. 2. A model: intermediary advertises
To be able to do advertising for a provider (typically one
intermediary will do this for many providers)
the intermediary needs marketing information from the provider.
Marketing information can be of very
different quality. For example, it may be a description of the
provider or individual products, or a product
catalog (with or without pricing information). We summarize this
class of artifacts under the term catalog..6 Hauswirth et al.On
the basis of the catalog’s information the intermediary can
advertise the products of the provider in many ways. For example,
(parts of) the catalog can be put on the intermediary’s web sever,
sent to customers and other intermediaries via email, push
systems, or ICE [20], and entered into search engines. The A model
is applied frequently in current e-commerce applications.
Successful sites like Amazon.com are based on this model:
Amazon.com advertises the books and CDs of various publishers on
its web site and via links that third-parties can put on their web
sites which refer to Amazon.com’s web site or specific parts
(products). The A model corresponds to (process) portals [16] such
as Amazon.com and/or associated partner programs such as
Amazon.com’s [1].
In the AN model shown in Figure 3 the intermediary provides
negotiation service additionally to advertising.
Customer
· negotiate business terms
Provider
order product
pay product
deliver product
Intermediary
advertize product
Fig. 3. AN model: intermediary advertises and negotiates
For the negotiation service the provider must supply the
intermediary with an additional artifact—the pric-ing and discount
model. This model should enable the intermediary to negotiate with
the customer in a meaningful way on behalf of the provider.
Depending on the complexity and completeness of this model,
negotiation can reach from simple discounts for ordering a higher
number of products up to sophisticated models based on customer
history, customer classification, order size, payment procedure,
etc. This heavily depends on the amount of information a provider
wants to disclose to the intermediary. Figure 4 shows the ANO
model in which the intermediary also does order processing on
behalf of the provider additionally to advertisement and
negotiation.
Customer
order product
Provider
· negotiate business terms
Intermediary
pay product
forward order
deliver product
advertize product
Fig. 4. ANO model: intermediary advertises, negotiates, and
processes orders
In this model the intermediary additionally requires an order
specification artifact from the provider where the provider
defines the attributes and requirements for a syntactically and
semantically correct order. With this information at hand the
intermediary can request all required information from the
customer to create and send a correct order that the provider will
accept. Figure 4 does not define whether each order is sent
immediately to the provider: It is also possible that the
intermediary collects orders and sends them to the provider in one
message (maybe once a day).
The ANO model and the following ones additionally allow the
intermediary to provide higher-level ser-vices
to the customer. The intermediary may offer combined or syndicated
products which the customer.A phase model for e-commerce business
models and its application to security assessment 7
may order. This (combined) order may be split by the intermediary
into sub-orders for several providers (in-cluding
itself) to accomplish the overall order. In this case several
providers may interact with the customer in the payment and
delivery phases (if these phases are not covered by the
intermediary). Figure 4 depicts the ANOP model in which the
intermediary provides a payment service on behalf of the provider
additionally to advertisement, negotiation, ordering.
Customer
advertize product
Provider
· negotiate business terms
Intermediary
order product
pay product
forward order
forward payment
deliver product
Fig. 5. ANOP model: intermediary advertises, negotiates, and
processes orders and payment Due to the number of available
payment services the intermediary may also act as a payment
gateway in this configuration. Any combination of payment services
and payment processes can be used here. For example, the customers
may pay the intermediary using a micro-payment protocol such as
Millicent and the intermediary accomplishes payment with its
providers via a macro-payment protocol such as SET after having
accumulated a large number of customer payments to keep SET
transaction costs low. This separation frees the customer and the
provider to support a large number of different payment
mechanisms. Finally, Figure 6 shows the ANOPD model in which the
intermediary also takes over the delivery and thus is the single
interaction partner of the customer on behalf of the provider.
Customer
advertize product
Provider
· negotiate business terms
Intermediary
order product
pay product
forward order
forward payment
[intermediary does not have product]
deliver product
deliver product
Fig. 6. ANOPD model: intermediary advertises, negotiates,
processes orders and payment, and delivers Typical delivery
mechanisms are (as in all other configurations): download (the
customer gets a user name and a password and can download the
product from a web or FTP site), email (the product is mailed to
the customer), push (the customer receives the product via a push
system; this is useful for products which evolve over time such as
news or stock quotes), or physical shipment via courier services.
The last case is relevant especially if tangible goods (CDs,
books, furniture, wine, etc.) must be shipped. This type of
shipment is outside the scope of our model.
Additionally the intermediary may act as a delivery gateway. For
example, the intermediary may provide
a uniform delivery service for its customers via WWW download and
have multiple different delivery
channels for its providers including licensed production. This may
dramatically simplify delivery for the
customer and still support the use of sophisticated delivery
mechanisms between the intermediary and its
providers. Several delivery arrangements are possible in the ANOPD
model: The intermediary may request.8 Hauswirth et al.the product
from the provider every time it needs to deliver it; the
intermediary may have the product on stock and request a certain
quantity from the provider only if its stock goes below a certain
threshold, or the intermediary may be licensed to “produce” the
product (licensed production). Production in this context actually
means that the intermediary may add a valid serial number to the
product or has been provided with the unfinished product and some
software to create the final product. In any of those delivery
arrangements new security problems are introduced. Since the
intermediary physically has the product, it may produce unlicensed
copies and sell them. This is a general problem with intangible
goods and will be discussed in Section 4. A possible solution for
part of this problem is the application of double fingerprinting
by the producer and the intermediary.
The ANOPD model also allows the intermediary to act in a new role.
It can combine products of several providers autonomously and
create, offer, and sell combined products. For example, the
intermediary may combine stock quotes with analyses and sell this
new kind of information. Thus the intermediary becomes a kind of
provider itself (value-adding reseller, content syndicator).
However, it is unclear where to exactly draw the line between an
intermediary and a provider in this case.
As stated at beginning of this section phases in the incremental
model may be left out in order not to constrain its generality. As
an example, we also consider the ANOD model where the delivery is
taken over by the intermediary while payment still is done between
the customer and the provider and evaluate its security in Section
4. We have chosen this example because of its high relevance in
real configurations. For example, the provider may not have enough
network bandwidth to efficiently distribute its information goods
to a high number of consumers while the intermediary has but it
may not want to hand over payment to the intermediary. In this
case the ANOD model would be applied.
2.4 Mapping of Business Models
In the previous section we have already identified some
correspondences of our model with well-known e-commerce models and
architectures. The e-shop model and portal (for one provider)
correspond to the direct model. A (process) portal and the
associated partner model can be mapped onto the A model. Several
others, such as (process) vortex, dynamically trading processes,
third-party marketplace, (value-adding) reseller, or virtual
communities, require special consideration since no simple 1:1
mapping can be defined for them.
The (process) vortex architecture [16] is similar to a portal. The
difference is that in a vortex marketplace
the interactions between customers and providers occur through a
third-party (the intermediary). A vor-tex
would correspond to the AN model and the subsequent models
(depending on the service level of the
vortex). The dynamically trading processes model [16] extends the
vortex model. In this model neither
business processes nor the set of possible interactions are
predefined. Instead a unique process can be dy-namically
constructed on a per customer basis [16]. Dynamically trading
processes have the same mapping as the vortex since they only add
higher flexibility to the vortex model but do not extend it
otherwise. A third-party marketplace architecture can be mapped
onto all our models other than the direct model and denotes a wide
range of architectures. Depending on the services that an
intermediary provides it defines a more advanced marketplace. The
(value-adding) reseller and (content) syndicator models correspond
to our ANOPD model whereas the concept of virtual communities is
orthogonal to our models and simply depends on whether such a
service is provided by the intermediary or producer.
3 Security Threats and Solutions
Security is widely understood as a key point for the acceptance of
e-commerce. Parties that are involved in
business relationships gain security by applying technical and
organizational means. Before the design of
a secure system the business model has to be analyzed to identify
what has to be protected against which
potential attacker and which parts need not be secured because the
parties trust each other. The result is
the trust model which is the basis for any further steps. To
enable an analysis, we have to consider the
capabilities, skills, and time the attacker is assumed to have.
Then critical points have to be determined,
the values for all involved parties and the possibilities for
dishonest parties to achieve advantages illegally
must be identified. Other problems with dishonest parties to be
regarded concern the infliction of losses.A phase model for
e-commerce business models and its application to security
assessment 9
to other parties, e.g., denial of service. In such cases, the
advantages are indirect: causing problems for a competitor can
have positive influence on the attacker’s own business. Another
aspect to be considered in a trust model are potential collusions
of involved parties. Even if security concepts resist attacks that
were performed by individual attackers they can become
dramatically insecure if attackers exploit their common power. In
reality, the strength and restrictiveness of the trust model to be
chosen is not only driven by security aspects. Because security
can often be expensive, the expenditure for security has to be
compared with expected losses caused by certain security holes. If
security costs exceed the estimated losses, security solutions
cannot be justified economically.
Security methods can be classified into those providing prevention
of attacks (e.g., encryption for conceal-ment
of information) and those for detection of attacks (e.g.,
verification of message integrity or verification
of signature forgery). Furthermore, consequences for attackers
have to be defined clearly. This must be ac-complished
by laws and regulations within a legal framework since technical
security is not sufficient for a
secure business environment. Additionally, an arbitrator is needed
who has the authority to impose these
consequences based on the evaluation of some evidence provided by
the detection mechanisms. A party
which is in conflict with party
can convince an arbitrator of
’s fault only if it can present an evidence
which can be only created by party
. Presenting information that can also be created by other
parties,
e.g.,
, is insufficient for this purpose. Therefore, the technical
design must include special mechanisms whenever a business
interaction requires convincing means to prevent malicious parties
from infringing the business or legal rules. Additionally, trusted
third parties (TTP) such as certification authorities or time
stamping authorities, are frequently necessary in security
concepts. These concepts either always use TTPs or the TTPs are
used only when some party cheats.
Actions of malicious parties which should be prevented in business
processes are categorized under the summarizing terms privacy
infringement and fraud.
Privacy infringement: This category denotes actions by which
malicious parties intend to find out in-formation
about other parties. Such attacks can hardly be detected by the
victims. Considering a business relation we have to distinguish if
the privacy infringement is performed by a party which is involved
in the business relation or which does not participate in the
business relation. Inside a business relation the involved
partners in general have to reveal information to each other to a
certain degree. For example, a customer may have to provide name
and address, the knowledge of a customer’s buying preferences can
be exploited for identifiable customer profiles for data mining
and direct marketing purposes, or the offering party may have to
reveal its price model which could be interesting for a
competitor. Studies have shown that users want to reveal as little
personal information as possible because they fear loss of privacy
and potential misuse [6, 19].
Two approaches exist for avoiding misuse of personal data such as
collecting, processing or passing it to other parties: regulation
by legal framework, e.g., [4], and technologies which constrain or
fully avoid unauthorized insight into personal data. Solely
relying on legal framework is an insufficient protection since
this is equivalent to trusting that other parties will follow the
rules. Furthermore, in an international context the legal
framework is still very heterogeneous. Technologies that hide
personal data from interacting business partners are not developed
so far as to be used in real trading scenarios. Technologies which
provide anonymity exist and can be used to surf the Internet or to
hide all identifiable information from the communication partner
in emails, e.g., [5, 13, 17], but can not be used in business
relations that are based on contracts.
Beside this intra-business protection also protection against
parties not participating in the business rela-tionship
must be considered. E.g., a wiretapper who is interested in what a
specific person buys or howoften a vendor sells a specific
product. This problem can be easily solved by exchanging encrypted
messages. Several encryption methods and ways for exchanging
cryptographic keys can be used here [9].
_ Fraud: In this classification fraud covers different intentions
of malicious parties that can either be inside
or outside the business relationship. It comprises masquerading of
parties, manipulation of messages, re-pudiation
of binding agreements, and theft of goods. Secure systems must be
able to detect such attacks
immediately and they should provide the victim with enough
evidence to identify the malicious party un-doubtedly
to convince an arbitrator.
In masquerading attacks, malicious parties claim to have some
other party’s identity. The motivation for
masquerading in business relationships may be for profit or simply
being detrimental to others. Examples
are sending messages with forged sender address, or using services
and charging it to some other party’s.10 Hauswirth et al.account.
The solution to this well-known problem is authentication, where
we have to distinguish between data origin authentication and
entity authentication. Data origin authentication provides the
receiver of a message with the identity of the party which
originated the message. However, this does not prevent an attack
in which a malicious party copies an authenticated message and
resends it later claiming the identity of the originator. This
security hole can be fixed by applying entity authentication which
guarantees both the identity of the communication partner and that
he was really sending the received message. Authentication methods
can also be classified according to whether they can be used as
evidence to convince a third party or not. If they can be used
they already have the quality for the introduction of
non-repudiation, as will be discussed below. E.g., a message
authentication code (MAC) would be no sufficient evidence to
convince third parties undoubtedly that a message originated from
a claiming party, whereas a digitally signed message would [9].
Manipulation of messages is another security problem in business
relationships that has to be prevented. E.g., an attacker that is
not involved in the business relationship could increase the
prices in offers on their way to a customer to dissuade him/her.
The motivation to manipulate messages is also simply being
detrimental to others or for profit. To prevent manipulation
methods for verifying the integrity of exchanged messages are
applied. Again we can distinguish two cases: Is it sufficient to
detect manipulation at all or should the detection also provide
sufficient evidence to convince a third party of the integrity and
validity of a document? In the second case this additionally means
that the originator of a valid document cannot claim that the
document was changed at a later time. This already touches the
problem of repudiation of binding agreements. In business
relations agreements are often binding. E.g., a party should not
be able to claim not having placed a certain order if it actually
did, or it should not be possible that a party falsely claims
having received an order from another party. In both cases, the
ordering party would repudiate what the receiver claims. A
conflict in which a party repudiates having agreed to some
business details requires evidence that can be used to convince a
third party or to identify the dishonest party. A solution to this
problem are unforgeable digital signatures as first sketched in
[3]. A digital signature of a message is a number which depends on
a secret key that is only known to the signer, and on the content
of the message that is signed. The validity of the signature can
be verified easily by everyone using the signer’s public key and
without knowing the secret.
Whenever commercial goods are traded the the possibility of theft
must be considered. This problem is well-known in the tangible
world and measures are taken to avoid it. In the area of
i-commerce dealing with intangible goods the situation is
different and much more complicated. Digital goods can be copied
easily at nearly no costs and without loss of quality. An original
and its copies are identical and cannot be distinguished. Illegal
copying and redistribution of intangible goods is hard to detect
because in contrast to theft in the tangible world the original is
still available to its rightful owner afterwards. Two approaches
exist to cope with this piracy problem: preventive methods using
tamper-resistant hardware and repressive methods based on
fingerprinting the intangible goods.
The approach based on special tamper-resistant hardware modules
has shown its limitations because of
practical and effectiveness reasons. Although fingerprinting
cannot make copying data technically impos-sible,
it can prevent malicious parties from redistributing information
goods. The goal of fingerprinting is to embed invisibly some
information into each copy to make it unique [10]. This
information can be used later to identify the buyer of a copy. If
an illegal copy is found the seller can trace the copy back to the
buyer who has redistributed the copy. Fingerprints in information
goods have to fulfill several requirements: They should not harm
the functionality or representation of the data they are embedded
in, buyers or a certain number of colluding buyers must not be
able to locate the marks, marks must not be deleted by processing
and compression, and must not be corrupted by embedding new
fingerprints. If it is sufficient for a seller to know which buyer
has redistributed an illegal the seller can fingerprint each sold
copy on his own. But if he also wants an evidence for a third
party to proof that an illegal copy was redistributed by a
specific buyer, then the seller is not allowed to know the
fingerprinted copy at the time of selling it. If the seller would
have the fingerprinted copy he/she could illegally distribute it
after having sold it to an honest buyer and then claim that this
buyer has redistributed it. On the other hand, he must be able to
identify the buyer if he finds a copy one day at an unexpected
party. These properties are provided by asymmetric fingerprinting
as described in [11, 12]. Unfortunately, the case in which a
malicious buyer redistributes an asymmetrically fingerprinted copy
cannot be distinguished from the case in which some other party
steals an asymmetrically fingerprinted copy from an honest buyer.
_.A phase model for e-commerce business models and its application
to security assessment 11
The methods very briefly described above are the basic technical
means to avoid privacy infringement and fraud in business
processes. Beside these technical means also organizational means
and the careful assignment of responsibilities in
organizations—which are beyond the scope of this paper—are
necessary [2].
4 A Security View on Business Processes
In this section we show security problems in complex business
processes involving three parties. The well-known direct model of
two interacting parties (provider and costumer) need not be
discussed: The application of digital signatures in offers and
orders makes them verifiable for authenticity, integrity and
non-repudiation purpose, and secure payment systems and copyright
protection (e.g. fingerprinting) exist (intangible goods). Our
discussion of security issues in 3-party models describes possible
solutions—we do not claim that the presented solutions are the
only ones.
In the discussion of the models we assume as little trust as
possible and that security is based on technical means. We also
address the issue of non-repudiation, which is required to obtain
binding messages, wher-ever possible. In general, we assume that
all communication shown in the following subsections will be
encrypted to prevent external parties from wiretapping.
In the following, we discuss the A, AN, ANO, ANOP, and ANOD
models. In all these models, three parties are involved for the
execution of the 5 phases. Since in the ANOPD model requires only
2 parties interact in these phases the basic security issues are
already covered as in the direct model.
4.1 The A Model
In this model the intermediary
_
only performs advertising on behalf of the provider . If
_
’s marketing
efforts are successful, the costumer
_
starts to negotiate with . Therefore, has to provide its catalog
at
_
’s disposal before
_
can start marketing.
has a validity period starting at time
__
and ending at
__
which have to be communicated to
_
. For reasons of authentication, integrity verification, and
conflict
resolution by third parties, creates a digital signature
_____ ____ _ ______¢
that depends on
,
_
,
__
, and
__
, and passes the signature to
_
. After positive verification of the signature,
_
creates
___¡_ __________¢ and replies it to . This signature is a
confirmation that
_
really received
and is informed about the
validity period. The signature also depends on so that no other
party
ˆ
providing the same products can
claim having a confirmation of
_
. If distributes different catalogs
and
to different intermediaries
_ _
and
_ _
,
_ _
and
_ _
should be prevented from exchanging the catalog. Therefore, ’s
signature depends
on the receiver
_
. Both parties, and
_
, should store the received signatures because they can be used as
evidences in case of intentional malicious actions by some party.
The evidences can be verified by a third
party (e.g., an arbitrator) to identify a dishonest party. E.g.,
since has stored
___¡_ __________¢
,
_
cannot
advertise expired offers and afterwards claim that required this.
Having received ’s catalog,
_
can start with the marketing activities. In general, and
_
can cooperate
in two ways: (1) pays a constant amount of money to
_
for its advertising service, or (2) pays a
commission to
_
for each sale resulting from
_
’s advertising activities. From a security point of view the
first case is not interesting. and
_
have a contract that guarantees
_
a fixed income. The second case is
more attractive for since it motivates
_
to do good advertising and needs not check if or how
_
is doing
its job.
Whenever
_
gives any advertising information to
_
it should be digitally signed. This is necessary for
several reasons: (1) it can be used for an integrity check; (2) it
can be used as proof if
_
does not work
properly; and (3) it can be used for the authentication of
_
and for the assignment of the commission.
The third point is essential in this model. The identity of
_
has to be forwarded by
_
to while negotiating
or ordering. Then, knows which intermediary deserves the
commission. Therefore, the information ref-erencing
_
as the intermediary has to be be protected against modification by
a malicious party
ˆ _
that could
replace the reference to
_
by a reference to itself: A digital signatures of
_
could be deleted and replaced by
a new signature of another parties. The strategies to avoid this
attack depend on the power of the assumed
adversary. In case the adversary is an external party that tries
to replace
_
’s signature by its own signature, it
suffices to encrypt the communication between
_
and
_
. In the case that the adversary has the power of
_
’s.12 Hauswirth et al.
Internet service provider, the situation is more complicated. Here
_
should ask
_
to confirm that its signed
advertisement has reached
_
properly. If
_
does not receive
_
’s confirmation, it may become distrustful.
In reality, there are several examples in which the information
for the identification of the intermediary is transmitted without
protection.
The low protection level in real business relationships may be due
to further weak assumptions which
are inherent in the A model: In the A model
_
must trust . Since
_
does not see any order or contract
negotiated between
_
and ,
_
does not know if
_
really buys and how much it spends there. Thus
_
has
to trust that is honest and provides
_
with proper sales information. Of course,
_
could ask
_
for a signed
and unique purchase confirmation which indicates the price and
also holds a signed and unique receipt
from . But it is questionable if such a scheme would work in
practice because
_
gains no benefit from
its additional work. Even if such a scheme was introduced, could
collude with
_
to achieve a win-win
situation by offering goods at a lower price if
_
did not inform
_
about the purchase.
So far we have only described the potential for any kind of fraud
in the A model. The second issue to
consider is privacy infringement. As long as
_
gets no information if
_
and are doing business with each
other there are no data concerning
_
that can be collected, processed, or used by
_
for other purposes. Even
if
_
receives information specifying how much money
_
spends while doing business with it does not
know which products
_
is buying.
In summary the A model has some advantages in the area of privacy
protection: While providers get insight into the personal data of
costumers, no other parties can learn about the costumers’
interests or collect personal data of the customer. The A model is
based on a trusted relation between the intermediary and the
provider. The intermediary should not cooperate with the provider
if it does not trust the provider. Thus, it is questionable if the
A model should be applied for ad-hoc business cooperations. On the
other hand, introducing security instead of trust would have a
negative impact on potential privacy infringements.
4.2 The AN Model and the ANO Model
In these models the intermediary
_
performs advertising and negotiation. In the ANO model,
_
is also
responsible for forwarding the order as a signed contract to . In
the AN model the ordering is done by
_ himself. In both models provides
_
with a pricing and discount model
ÿ½²
, in addition to the catalogue
, to enable negotiation by
_
. Both,
and
ÿ½²
, and their validity periods have to be signed by
similarly to the signing described in the A model to avoid the
attacks described above. The same applies to
the advertising phase: All advertising messages should be
digitally signed by
_
. If
_
is interested in some
product, it can start to negotiate about the final price or other
negotiable properties. All messages that are
exchanged in the negotiation phase before the final contract
should be protected against modification and
also be checked if they are created and sent by the claiming
party. If both negotiating partners finally agree
and
_
intends to purchase they finish the negotiation with a binding
contract. Therefore,
_
and
_
sign the
contract which includes all the relevant business parameters such
as description of the good, price, identity
of both
_
and
_
, date, constraints for delivery, and more. This will be done by
filling in and signing a
contract or order form which is provided by . In the AN model, the
contract is sent to by
_
, while
in the ANO model it is sent by
_
and forwarded by
_
. The contract and the signature can be verified by
and additionally it can check whether
_
followed the rules of the
ÿ½²
. If not, for example, because
_
’s
offered price was to low, can can prove
_
’s fault by showing
_
’s confirmation signature on the
ÿ½²
and
_
’s signature on the contract. If
_
did act properly it can nullify any false accusation through ’s
signature
on the
ÿ½²
and the contract signed by
_
and
_
.
In the ANO model, after having forwarded the signed contract,
_
requires to send the commission. All
contracts have to be uniquely identifiable (e.g., by a unique
number or timestamp) because copies of the
same contract will not be accepted by . This prevents an
intermediary from sending a contract multiple
times. Upon receipt of the commission,
_
must send a confirmation of having received it for each specific
contract to . This confirmation protects against multiple
commission claims for the same contract. If
a malicious
_
requests the commission multiple times and refuses to send the
payment confirmation
can prove the money transaction via a trustworthy payment
authority. Thus
_
can be forced to send the
payment confirmation. As long as has no evidence that proves the
payment of the commission it will
lose a conflict with
_
and has to pay the commission. Since
_
has a proof for every good sold as a result.A phase model for
e-commerce business models and its application to security
assessment 13
of
_
’s activities, this model also works even if
_
does not trust . There is also no obvious possibility for a
collusion between and
_
as in the previous model.
In the AN model, after
_
has sent the signed contract to ,
_
waits for the commission from . Having
received it,
_
has to confirm the receipt of each payment as in the ANO model. In
AN model, it is still
possible that
_
changes its mind after having signing the contract—of which
_
holds a copy—and does not
send the signed contract as an order to . In this case,
_
would wait a certain time for the commission, and
then would inquire about the commission. At this stage,
_
cannot know if
_
did not send the contract
or if tries to cheat or simply failed to send the commission to
_
. In all cases
_
can show a copy of the
contract to , and as long as has no confirmation from
_
for the payment of the commission for that
specific contract, would have to pay. In case that
_
changed its mind and did not send the contract to
, can use the copy of the contract provided by
_
and deliver the goods which
_
has confirmed in the
contract. This model also works if
_
does not trust . But in case of not receiving the commission in
time,
he does not know whose fault— ’s or
_
’s—it was. The delivery and payment in both models are handled
between
_
and as in the well-known direct model and thus requires no further
discussion.
Regarding privacy aspects, the properties of the AN and the ANO
model are equivalent. In both models
_
gains considerable insight into the costumers’ personal data,
their interests and activities.
_
knows all
products
_
is interested in and how much it is willing to pay for them. This
knowledge not only derives
from the interaction with
_
during marketing, negotiation, and contracting: Since
_
has access to the
ÿ½² it can categorize customers probably enriched with further
properties that can be critical from a privacy
protection point of view. Since
_
can also act as an intermediary for several providers
__°°°_ ˜
it can
aggregate and concentrate lots of personal data which can be of
high relevance for
_
’s own core business.
Summarizing the properties of the AN and the ANO models, we see
that there is a larger potential for
privacy infringement but a much more balanced trust model for the
business process. The AN and ANO
models can be applied even if there is no trust between
_
and . To build up such a business relationship
it is not even necessary that they know each other. However, since
_
has the possibility to change its mind after signing a binding
contract which implies some further workflow for conflict
resolution, the ANO model seems to be preferable.
4.3 The ANOP model
The ANOP model is similar to the ANO model. The difference is that
_
is also involved in the payment
process.
_
sends the payment to
_
after ordering. Thus,
_
can directly withhold the commission it is entitled
to. The rest of the money is forwarded to together with the order
and the signed contract. Having received
this artifacts can deliver the ordered good(s) to
_
. To enable proper cooperation in the ANOP model, the
same prerequisites as in the ANO model have to be fulfilled (e.g.,
provision of
and
ÿ½²
). The security requirements for the early phases in this model
are clear by the discussion of the previous models.
Let us suppose now that
_
has received the signed order from
_
and
_
replied the confirmation to it.
Since
_
receives the money directly from
_
in the ANOP model, there is no necessity for
_
to collect
evidences in order to proof its claim for the commission resulting
from its activities. Upon the receipt of
the payment,
_
has to confirm the receipt to
_
with a digital signature referencing undeniably the payment
to the unique order. Thus,
_
gets an undeniable proof that it paid for a certain order if some
conflict arises
later. Of course, a dishonest
ˆ _
could try to cheat by claiming the money transfer without actually
having
done it and accuse
_
of not having sent the confirmation. Similarly, a dishonest
ˆ _
could refuse to send
the confirmation to
_
after receipt of the money and request the money again. All these
problems can be solved easily with the help of the involved
payment authorities that have registered all money transactions.
To illustrate this, consider the case that
_
claims that
_
did not pay after the placement of the order.
_ would react by claiming that it paid but did not receive a
confirmation from
_
. In this situation it is not clear who tries to cheat. This
problem can be solved easily by means of trustworthy payment
authorities.
Suppose that
_
has paid and a malicious
ˆ _
tries to cheat by claiming that
_
did not pay and does not reply
the payment confirmation. In this case
_
can get a confirmation from its payment authority that proves
the payment. With this confirmation
ˆ _
is forced to send the payment confirmation. In the other case in
which a dishonest
ˆ _
did not pay the requested amount it can never get a confirmation
of an honest payment
authority. Being unable to get such a confirmation would force
ˆ _
to pay. Afterwards
_
will confirm the.14 Hauswirth et al.
receipt of the payment. Thus the intervention of a trustworthy
payment authority assures that
_
receives the
payment and
_
receives the confirmation in both cases.
After deducting the commission,
_
forwards the rest of the payment to with a clear and an undeniable
reference to the concerned order. The unique order containing
_
’s address and the description of the ordered
good(s) which is also signed by
_
can be send in parallel to the payment or before. Thus, knows
where
the ordered good(s) have to be delivered to. If
_
later denies having sent the message, can use the
accompanying evidence as proof against
_
. In any case, the receipt of the undeniable order and the receipt
of the payment have to be confirmed undeniably to
_
by . Thus cannot claim later having received
different data. Since both and
_
hold evidences, i.e., signed confirmations, about the exchanged
messages all responsibilities for intentional or unintentional
faults can be assigned easily. Other problems concerning payment
and confirmation can be solved with the help of payment
authorities as already described above.
After has verified all data it has received from
_
it can deliver the ordered goods to
_
. In case
_ complains that it did not receive the goods, the dishonest party
can be identified (e.g.,
ˆ _
did not forward the
money and order, or
ˆ
received the money but did not deliver the goods) because this
party does not have the necessary evidences.
From the privacy point of view the ANOP model is comparable with
the ANO model. Here
_
also gains
considerable insight into
_
’s personal data.
_
can learn the same things about
_
as in the ANO model.
Like in the ANO model, the ANOP model is based on a balanced trust
model. The ANOP model can
be applied even if there is no mutual trust between
_
and . One advantage of the ANOP model over
the ANO model is that potential doubtful intermediaries can be
convinced easier to participate in such
business cooperations. They obtain money directly from the
costumer and do not have to wait for their
commission from the provider. Conversely there is no risk for the
producer, since it can keeps the good(s)
until receiving the money. The ANOP model seems to be attractive
if cannot fulfill some requirements
concerning payment, e.g., accepts only one or a few payment
systems while
_
offers a variety of payment
systems.
4.4 The ANOD model
In the ANOD model
_
performs the delivery of the ordered good after the reception of
the order while
_
transfers the payment to . Therefore, has to provide
_
with the ordered good(s) in advance. Let us
assume that the earlier phases are secured as in the ANO model and
both
_
and
_
hold a signed copy of the
order. In the ANOD model
_
knows exactly how much was sold resulting from its activities and
also has un-deniable
proofs from all the orders it received that are signed by the
costumers. Thus there is no possibility
for a dishonest
ˆ
to claim that it sold less products via
_
’s activities. Therefore,
_
non-repudiably forwards each received order to and waits for a
confirmation that has received a copy of each specific order.
(Later, we will also need the forwarding of the order and the
confirmation of receipt for copyright protec-tion.
There these non-repudiable messages are used for informing about
the identity of legal buyers.)
Thereby, knows which costumer ordered which product at what price
via which intermediary. Mean-while,
_
can send the payment to accompanied with its order. Upon receipt
of the payment sends a
confirmation of receipt to
_
. If a dishonest
ˆ _
refuses to send his payment can enforce the payment by
using the copy of the order with
ˆ _
’s signature. Problems related to dishonest claims concerning
payment and the confirmation can be solved via trustworthy payment
authorities as explained in the ANOP model.
Further security aspects concerning the provision of goods to
_
and delivery depend on the kind of goods.
In this context we classify them as tangible or intangible. In
case of tangible goods, has to provide each
piece to
_
physically. After the receipt of the order
_
can deliver the good(s) itself or by via a delivery
service if the ordered good(s) are on stock. In both cases,
_
confirms the receipt of the good(s) and replies
the confirmation to
_
so that
_
later cannot claim that
_
did not deliver.
_
or the delivery service do not hand
over the tangible good(s) if they do not receive a confirmation by
_
. Thus, as long as
_
has no confirmation
of delivery from
_
it is enforced to deliver. For the sake of simplicity assume that
the delivery service
is trustworthy. If
_
refuses to pay and claims that
_
did not deliver the good(s) asks
_
to show
_
’s
confirmation of delivery. If
_
is dishonest and
_
provides with
_
’s confirmation of delivery can force
_
to pay. If
_
cannot show
_
’s confirmation can force
_
to deliver.
In the case of intangible goods they can be delivered
electronically. We assume that
_
holds one copy of
each intangible information product in its database which it uses
to create the copies of the products to.A phase model for
e-commerce business models and its application to security
assessment 15
be delivered. If delivery is done electronically a dishonest
ˆ _
can receive the good(s) without replying a
confirmation and claim that it never received the good(s)s from
_
. In this situation it is not possible for
to decide who—
_
or
_
· cheats. A malicious
ˆ _
could refuse to pay. In this case, would ask
_
to send
the good(s) or to send the same copy again as before. Even if
_
delivered the good(s) before it requires no
costs for
_
to send the same copy multiple time which is in contrast to the
case of tangible good(s). If such
a conflict arises the delivery could be done under the observation
of or any other trustworthy party. Thus
_
can be forced to pay.
A serious problem with intangible goods stems from piracy and the
infringement of copyright. Since dig-ital goods can be copied at
no costs without loss of quality, illegal copies are very
attractive for pirates.
Since the ANOD model comprises three parties— ,
_
, and
_
· that trade with digital goods, and since
two parties—
_
and
_
· can deal with illegal copies, a special special protection
mechanism is needed.
This mechanism should help to identify the party—
_
or
_
· which has distributed illegal copies of ’s
good(s). Furthermore, the identifying information must also be
sufficient to convince third parties of the identity of the
malicious party. Therefore the marked copy which is distributed
legally has to be unknown to the distributor. If not the
distributor could give a copy to some other party and accuse the
legal receiver having redistributed it. The mechanism to overcome
these problems is offered by the double application of asymmetric
fingerprinting.
The concept of asymmetric fingerprinting of digital good(s) was
already presented in the previous sec-tion.
In the following we restrict our discussion to those kind of
intangible goods to which asymmetric
fingerprinting can be applied, e.g., multimedia content. In a
first step, while provides its product to
_
,
the product is marked by asymmetric fingerprinting. If
_
redistributes this product legally to
_
upon
_
’s
order, the copy which is delivered gets a second asymmetric
fingerprint. Furthermore,
_
informs that
_ ordered a copy of a specific good by forwarding
_
’s order, and confirms the receipt of this information as
described above. It is required that the two asymmetric
fingerprints do not interfere with each another.
If finds a copy of a digital good at some
ˆ _
it can check by the information provided by
_
if
ˆ _
is a legal
buyer of the good. If
ˆ _
is not known as a legal buyer can analyze the copy and prove to
third parties
that it stems from
_
’s copy. Here the first asymmetric fingerprint in the copy is
exploited. But even if some
illegal copy turns up which can be traced back to
_
it is not clear at this time which party is malicious. There
are two possibilities: (1)
_
is malicious, because he has redistributed an illegal copy to
ˆ _
. This implies that
_
has not informed that
ˆ _
is a legal buyer. Or (2)
_
has delivered a legal copy to a malicious
_
which
has redistributed an illegal copy to
ˆ _
.
If
_
acted honestly it has informed about the identity of the legal
buyer
_
. Now,
_
can analyze the copy
found by and prove to third parties that it stems from
_
’s copy. Furthermore,
_
has ’s confirmation that
_
informed him about
_
to be a legal buyer. This proves that
_
is honest. Additionally, can verify itself
if
_
is known to him as a legal buyer. In this case,
_
will be accused for redistribution of illegal copies.
Here the second asymmetric fingerprint in the copy is exploited.
If
_
cannot prove to third parties that the
found copy once belonged to a certain customer who was announced
to by
_
to be a legal buyer,
_
will
be accused.
Concerning privacy problems, the ANOD model shows the same
properties as the previously considered ANO and ANOP model.
To summarize the ANOD model we see that it is also based on a more
balanced trust model. There are no
special or one-way trust prerequisites that are necessary for the
model. Like in the ANO and the ANOPcase,
the ANOD model can also be applied if there is no mutual trust
between
_
and . Since the intermediary
is responsible for delivery and has access to the digital goods,
this model requires special mechanisms
to cope with copyright protection problems. Here it also has to be
considered that the costs for copyright
protection and possibly necessary conflict resolution must be in
relation to the value of the traded goods. To
be worth the effort the additional costs caused by these
mechanisms must be much lower than the costs of
the goods. This implies that the value of the traded goods has an
impact on the applicability of the ANOD
model. Besides ,
_
gains considerable insight into
_
’s personal data. The ANOD model is attractive when a special
delivery arrangement is required that can not be provided by ,
e.g., delivery of large data packages when only has access to
limited network bandwidth..16 Hauswirth et al.
4.5 Comparison of the Models
In the previous sections we have discussed different business
models involving 3 parties from a security point of view. We have
analyzed the potential for privacy infringement and fraud for
these models and have shown the minimal mechanisms to secure them.
The discussion shows that model with better privacy protection
have more potential for fraud (A model) and vice versa (AN, ANO,
ANOP, and ANOD mod-els).
The A model can only be applied reasonably if the intermediary
trusts the provider. In contrast the
AN, ANO, ANOP, and ANOD model do not require mutual trust between
intermediary and provider. This
distinction may considerably influence the decision whether two
parties start a business cooperation with-out
knowing each other. In the ANOP and ANOD models, the intermediary
offers special functionalities
(payment, delivery) to the provider. These models are attractive
if the provider cannot fulfill special re-quirements
related to these functionalities. The A, AN, ANO, and ANOP model
are applicable to tangible and intangible goods, whereas in the
ANOD model precautions for securing intangible goods (copyright
infringement) are required. The value of the traded intangible
goods has an impact on the applicability of the ANOD model.
5 Conclusions
The success of business models in e-commerce depends on how well
they support secure business interac-tions
among the business actors. Due to the complexity of the new
models, which involve a higher number of roles and interactions,
security must be based on a systematic analysis that clearly
exposes the possible threats and supports an overall security
assessment of the intended model before it is deployed. On the
basis of such analysis, it is possible to apply, combine, or
augment standard security mechanisms to achieve the required level
of security.
In this paper we have presented a systematic approach for the
assessment of business model security. As the basis for a security
analysis we have broken down the business process into 5 phases:
advertising, negotiation, ordering, payment, and delivery. We have
presented a 3-party model (customer, intermedi-ary, provider) for
modeling interactions in e-commerce business models, described
their possible roles in the phases, and the exchanged artifacts.
We the mapped this generally applicable unified model onto the
common e-business models and concepts.
We analyzed the security concerns of each phase with respect to
mappings of the phases onto the different parties in our model.
This analysis facilitates overall security assessment of specific
business models. The 5-phases/3-party model allows a designer to
classify a business model and assess its security. We have
analyzed business processes on a conceptual level, discussed their
security problems, and have provided conceptual proposals for
addressing the security issues if technically possible. As a main
result of our security analysis we have demonstrated the impact of
assigning different phases to different partners on the security
level that is objectively achievable. The level of security that
can be achieved depends on the party that performs a certain
phase. For example, different security levels are possible
depending on whether negotiation is done by the intermediary or
the provider. As a result, depending on which party performs a
given phase, different security mechanisms must be applied. In
some models, correct operation depends on trust and cannot be
secured in an objective way, i.e., some parties must always be
honest for the model to work. For example, the A model—portal,
associated partners—can only work correctly if the intermediary is
trustworthy (but no mechanism exists to enforce this). In several
other models we have analyzed, objective security is possible.
This distinction may heavily influence the choice of possible
business partners since it defines whether a business party can
potentially defraud another party or such fraud may be prevented
by security mechanisms. If a 2-party business model is extended to
an n-party model then the security issues cannot be addressed by
solely applying standard security mechanisms such as
authentication, signatures, or secure payment methods. Instead the
overall security of the n-party model heavily depends on the
assignment of phases among the partners. Additional security
issues emerge depending on a concrete assignment even as the
security issues of a 2-party model must still be addressed
adequately.
Our results showthat many intrinsic security issues exist in
common e-business models which are addressed
only to a limited extent in current e-business sites. Assessment
of these problems and the application of.A phase model for
e-commerce business models and its application to security
assessment 17
adequate solutions may determine the success of e-business sites
in the long run. Such assessment may be made systematically on the
basis of our phase model.
References
1. Amazon.com Associates Program, Amazon.com, 2000,
http://www.amazon.com/exec/obidos/subst/associates/
join/associates.html/ref=as gw sf/104-2151277-1127609
2. Ross Anderson: Why Cryptosystems Fail, Communications of the
ACM, Vol. 37, No. 11, November 1994
3. W. Diffie, M. Hellman: New Directions in Cryptography, IEEE
Transactions in Information Theory Vol. 22, No.
6, 1976
4. Directive 95/46/EC of the European Parliament and of the
Council of 24 October 1995 on the Protection of Individuals with
the Regard to the Processing of Personal Data and on the Free
Movement of such Data, Official
Journal of the European Communities, No. L281, November, 1995,
5. D. Goldschlag, M. Reed, P. Syverson: Hiding Routing
Information, Proceedings, Information Hiding, Springer
Verlag, LNCS 1174, 1996
6. D. Hoffman, T. Novak, M. Peralta: Building Consumer Trust
Online, Communications of the ACM, April 1999,
Vol. 42, No. 4
7. M. Jazayeri, I. Podnar, A Business and Domain Model for
Information Commerce, Technical report TUV-1841-00-02, Technical
University of Vienna, Distributed Systems Group, May 2000,
http://www.infosys.tuwien.ac.at/
reports/repository/TUV-1841-00-02.ps
8. D. Konstantas, J.-H. Morin: Trading digital intangible goods:
the rules of the game, Proceedings of the Hawai’i International
Conference On System Sciences, January 4-7, 2000, Maui, Hawaii
9. A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied
Cryptography, CRC Press, 1997
10. F. Petitcolas, R. Anderson, M. Kuhn: Information Hiding - A
Survey, Proceedings of the IEEE, Vol. 87, No. 7,
July 1997
11. B. Pfitzmann, M. Schunter: Asymmetric Fingerprinting,
Eurocrypt ’96, LNCS 1070, Springer Verlag, 1996
12. B. Pfitzmann, M. Waidner: Asymmetric Fingerprinting for Larger
Collusions, Proceedings, 4th ACM Conference on Computer and
Communications Security, Zurich, 1997
13. M. Reed, P. Syverson, D. Goldschlag: Anonymous Connections and
Onion Routing, IEEE Journal on Selected Areas in Communications –
Special Issue on Copyright and Privacy Protetction, 16(4), May
1998
14. J. Rumbaugh, I. Jacobson, G. Booch: Unified Modeling Language
Reference Manual, Object Technology Series,
Addison-Wesley, Reading, Mass. and London, 1999
15. D. Schoder, R.E. Strauss, P. Welchering: Electronic Commerce
Enquˆ ete 1997/98, Survey on the Business of Elec-tronic
Commerce for Companies in the German Speaking Area, Stuttgart:
Konradin, Executive Research Report,
1998
16. A.P. Sheth, W. van der Aalst, I.B. Arpinar: Processes Driving
the Networked Economy, IEEE Concurrency, Vol.7,
No.3, 1999
17. P. Syverson, M. Reed, D. Goldschlag: Private Web Browsing,
Journal of Computer Security, Vol. 5, No. 3, 1997
18. P. Timmers: Business Models for Electronic Commerce, EM –
Electronic Markets, Vol.8, No.2, 1998
19. H. Wang, M. Lee, C. Wang: Consumer Privacy Concerns about
Internet Marketing, Communications of the ACM,
March 1998 / Vol. 41, No. 3
20. A.N. Webber, A.C. O’Connell, A.B. Hunt, A.R. Levine, A.L.
Popkin, A.G. Larose: The Information and Con-tent Exchange (ICE)
Protocol, World Wide Web Consortium (W3C), 26 Oct. 1998,
http://www.w3.org/TR/1998/
NOTE-ice-19981026
..[Documento Completo]
|