Assuring Non-fraudulent Transactions in Cash on Delivery by Introducing Double Smart Contracts
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
The adoption of decentralized cryptocurrency plat-forms is growing fast, thanks to the implementation of Blockchain technology and smart contracts. It encourages the novel frame-works in a wide range of applications including finance and payment methods such as cash on delivery. However, a large number of smart contracts developed for cash on delivery suffer from fraudulent transactions which enable malicious participants to break the signed contracts without sufficient penalties. A shipper will involve in the system and place a mortgage to ensure reliability. A buyer also pledges an amount of money when making the order. Our process not only ensures the interests of a seller but also prevents a fraud shipper. The penalties will be made in two scenarios: (i) the buyer refuses to receive the commodities without any reliable reasons; and (ii) the shipper attempts to make any modification on the delivered goods during transportation. To help developers create more secure and reliable cash on delivery system, we introduce double smart contracts, a framework rooted in Blockchain technology and Ethereum, to tackle those mentioned problems. We also contribute our solution as an open source software that developers can easily add to their implementation to enhance functionality.
Authors and Affiliations
Ngoc Tien Thanh Le, Quoc Nghiep Nguyen, Nguyen Ngoc Phien, Nghia Duong-Trung, Thai Tam Huynh, The Phuc Nguyen, Ha Xuan Son
NEB in Analysis of Natural Image 8 × 8 and 9 × 9 High-contrast Patches
In this paper we use the nudged elastic band tech-nique from computational chemistry to investigate sampled high-dimensional data from a natural image database. We randomly sample 8 × 8 and 9 × 9 high-contrast patches of...
Computer Science Approach to Philosophy: Schematizing Whitehead’s Processes
Diagrams are used in many areas of study to depict knowledge and to assist in understanding of problems. This paper aims to utilize schematic representation to facilitate understanding of certain philosophical works; spe...
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
The transmission of the encryption voice over IP is challenging. The voice is recorded, eavesdropping, change and theft voice, etc. The voice over IP is encrypted by using Advance Encryption Standard (AES) Algorithm. AES...
Evaluating Mobile Phones and Web Sites for Academic Information Needs
In the last decade, there has been an exponential growth in use of mobile phones among people. Smart phone invention has digitized life of a common man especially after introduction of 3G/4G technology. People are used t...
High Performance Speed Sensorless Control of Three-Phase Induction Motor Based on Cloud Computing
Induction motor is a cast of alternating current motor where charge endures allotted to the rotor close-at-hand deputation of conductive charge. These motors are broadly applied in industrial claim due to they are arduou...