
the value of each payment mean. This verification 
requires the involvement of a trusted third party. In 
addition, the payee can directly redeem the payment 
means or use the same token for another payment, if 
the micropayment mechanism allows asking for a 
delegation authorization. In this case, every payee in 
the network should verify the chain followed by the 
payment mean since it has to be spent by the first 
payer (Obaidat and Boudriga, 2007).  
Consequently, micropayment still requires the 
definition of appropriate security measures, which 
could become complicated according to the number 
of the payers and the nature of the payment means 
and payment chains. Further, it does not define 
mechanisms allowing to conclude distributed 
payment or pay distributed applications. This kind of 
applications is widely needed in the 4G networks, 
which are characterized by the inter-operability of 
different heterogeneous access networks composing 
different types of networks with diverse underlying 
protocols. Therefore, when accessing a service 
provided on 4G networks, a node can be served 
simultaneously by various service providers 
belonging to different networks. Further, resources 
may vary dynamically during service provision 
according to the requestor’s node and the service 
provider’s mobility. The study of these issues 
becomes more interesting when we know that a node 
can not identify all the resources contributing to 
service provision. Thus, all these factors should be 
taken into account during the design of payment 
protocols. A significant example of 4G distributed 
applications can be built through the study of the 
characteristics of GRIDs. 
Grids present an attractive area of application 
characterized by large scale resource sharing and 
innovative distributed applications. They enable the 
sharing and coordinated use of resources in dynamic 
collaborations. Resource sharing is not limited to file 
exchange; it can provide on-demand access to all 
kinds of computational resources. For Grids, the 
sharing of resources is highly controlled. In fact, 
resource providers and consumers need to negotiate 
in real time resource sharing arrangements including 
the nature, the security and the policies of the share. 
Thus, GRID presents an interesting dynamic 
architecture. In fact, the construction of a service is 
done in real time without a prior knowledge of any 
contributing node. Further, the first requester ignores 
the manner with which his request is handled. 
However, a network administrator can retrace the 
service architecture. These features could be found 
in micropayment and thus they would be used in our 
system.  
In this paper, we propose a secure micropayment 
scheme based on the Grid paradigm. Our scheme 
takes into consideration the nature of the distributed 
application and resources sharing. In fact, it defines 
mechanisms allowing to freely manage 
micropayment means at different nodes of the 
network. Thus, a consumer may allow providers to 
re-assign new values and re-use micropayment 
means for other purposes. In addition, in Grid 
environment, a consumer does not need to have 
knowledge about resource providers or service 
architecture. Consequently he cannot identify to 
whom he should pay. In our scheme, we also present 
a solution to pay unknown parties without using 
anonymous means since we should be able to trace 
payment operations. Further, we use the architecture 
of GRID services to define a security model for 
micropayment, which allows protecting the involved 
parties in a distributed manner.  
The remaining of this paper is organized as 
follows: Section 2 presents the main features and 
shortcomings of micropayment schemes. Section 3 
introduces the multi-party micropayment scheme 
and defines the generation and the distribution 
mechanisms. Section 4 presents the related 
verification and tracing mechanisms. Section 5 
shows some applications of the micropayment 
scheme. Section 6 generalizes the micropayment 
scheme for other application fields. Section 7 
discusses the security features of the proposed 
scheme. Finally, Section 8 concludes the paper. 
2  MICROPAYMENT SCHEMES  
In this section, we will introduce the main 
micropayment schemes proposed in the literature. 
We will focus on the advantages and the drawbacks 
presented by each method for payment efficiency 
and security. Micro-payments schemes are useful in 
all those scenarios where many payments of small 
amount of money are expected. During the mid 
nineties a significant amount of research has focused 
on developing micro-payments protocols: Millicent 
(Manasse, 1995), MicroMint and PayWord are 
among the most famous examples (Rivest and 
Shamir, 1996). 
In recent years, a strong need for new payments 
proposals has given new energy to the micro 
payment concept. Micali and Rivest have revisited 
the PayWord protocol and the Rivest's Lottery 
approach (Micali and Rivest, 2002), solving some 
existing problems. In fact, one of the major 
problems with payments of small amounts is that the 
bank's processing cost can be much higher than the 
transferred value. The most convincing solution is to 
aggregate small payments in fewer larger payments. 
Other problems, such as the computational time 
ICE-B 2007 - International Conference on e-Business
138