IJITCS Vol. 8, No. 1, 8 Jan. 2016
Cover page and Table of Contents: PDF (size: 393KB)
Full Text (PDF, 393KB), PP.67-73
Views: 0 Downloads: 0
Business to Business e-commerce, keyless cryptography, caser cryptography, security framework, authentication, data integrity
Business to Business e-commerce is adopted by more and more companies all over the world. Many companies will be involved in doing business over internet among them some will act as manufacturer and other as suppliers of the sub products. Here we are going consider two types of hackers, the hackers who are outside the organization and the hackers present within the organization. The problem is how to identifying authentic supplier and to see that after authentication the data integrity, here we consider it as the number of sub product to be manufactured that should reach the authentic supplier in the presence of hacker within the organization. There is need for designing trusted security framework. In this paper we are designing a security framework which runs double securing algorithm by using keyless cryptography algorithm for finding the authentic supplier and to see that the order of sub product to be manufactured reaches correct supplier for this caser cryptography algorithm is used. The authentication solves the problem of outside hackers and uses of caser cryptography solve the problem of hacker within the organization. The double securing algorithm is implemented on MATLAB, CPU time is calculated to known the time taken to run the security mechanism.
Samara Mubeen, Srinath N.K., Subramanya K.N., "Double Securing from Hackers in B2B E-commerce", International Journal of Information Technology and Computer Science(IJITCS), Vol.8, No.1, pp.67-73, 2016. DOI:10.5815/ijitcs.2016.01.08
[1]Casassa Mont M. and Brown, “Pastel Project: Trust Management, monitoring and policy driven authorization framework for E-services in internet based B2B environment” HPL 2001.
[2]Hardik Nariya and Chirag Gobel, “E-commerce system: a review on security challenges and Indian perspectives”, Journal of Information Knowledge and Research, 2013, vol 2, issues 2, pp: 451-457.
[3]Mohammad Ali Hussain," A study of information security in E-commerce application” International Journal of Computer Engineering Science, 2013, vol 3, issues 3, pp: 1-9.
[4]Nada M.A. and Al-Sammy,” E-commerce Security”, International Journal of Computer Science and Network Security, 2008,vol 8, issue 5, pp 340-344.
[5]Raducanu Razvan and Omusaru Edvard,” On security of E-commerce”, Recent Advance in mathematics and computer in Business, Economics, Biology and Chemistry, ISSN 1790-2769.
[6]Seven Wohlgemuth et.al. “Security and Privacy in business networking Electronic Market”, 2014, pp: 81-88.
[7]Shazia Yasin et.al, “Cryptography based security: a review of security challenge and perspective”, Journal of Information Knowledge and Research, vol 2, issue 2, pp: 451-457.
[8]Thedosis Toiakis and George sthephanides, “The concept of security and trust in electronic payment”, Jornal of Computer Secuirty, 2005, pp: 10-15.
[9]Zoran V. and Milorad, “Simulation Analysis of protected B2B E-commerce process”, Comsis vol 3, issue 1, pp: 78-91.
[10]Prakash Kuppaswamy, Saeed Q.Y. Al-Khalvali,” Hybrid Encryption/ Decryption Technique using new public key and symmetric key Algorithm”, MIS Review, vol 19, issue 2, 2014, pp: 1-13.
[11]Farah Hanna Zawaideh, “E-commerce Secure Transfer based on embedded DSP”, International Journal of Latest Research in Science and Technology”, vol 2, issue 2, pp: 124-128, April 2013.
[12]Akhilesh Dwivedi et.al, “A Cryptography algorithm analysis for security threats of semantic E-commerce web for electronic payment transaction system”, Advances in computing and information technology, pp: 367-378, 2013.
[13]Pita Jarupunphol and Wipawan Buathong, “Secure Electronic Transactions (SET): A case of Secure System Project failures”, International Journal of Engineering and Technology, vol 5, issue 2, April 2013.
[14]Raghav Gautam and Sukhwinder Singh, “Network Security issues in E-commerce”, International Journal of Advanced research in Computer Sceince and Software Engineering”, volume 4, issue, 3, March 2014, pp: 130-132.
[15]Pradnya B. Rane et.al, “Authentication and Authorization: Tool for E-commerce security”, Engineering Science and Technology: An International Journal, volume 2, issue 1, 2012.
[16]Elminaam, D.S.A., Kader, H.M.A. and Hadhoud, M.M., “Evaluating the performance of symmetric encryption algorithms”, International Journal of Network Security, Vol. 10, No. 3, pp. 213-219, 2010.
[17]Kuppuswamy, P. and Al-Khalidi, S.Q.Y., “Implementation of Security through simple symmetric key algorithm based on modulo 37”, International Journal of Computers & Technology, Vol. 3, No. 2, pp. 335-338, 2012.
[18]Ramaraj, E., Karthikeyan, S. and Hemalatha, M., “A design of security protocol using hybrid encryption technique”, International Journal of the Computer, the Internet and Management, Vol. 17, No. 1, pp. 78-86, 2009.
[19]Trust Services: A Trust Infrastructure for E-Commerce, Adrian Baldwin et al, Trusted E-Services Laboratory, HP Laboratories Bristol, HPL-2001-198, August 2001.
[20]Bakos, J.Y., Brynjolfsson, E., “From vendors to partners: Information technology and incomplete contracts in buyer–supplier relationships”, Journal of Organizational Computing, volume 3, pp: 301–328, 1993.
[21]Khalid Haseeb et.al. “Secure E-commerce Protocol”, International Journal of Computer Science and Security, Vol. 5, issue. 1, pp.742-751, April 2011.
[22]S. R. S. Kesh and S. Nerur, "A Framework for Analyzing E-Commerce Security," Information Management and Computer Security, volume 10, issue 4, pp. 149-158.
[23]J. J. Amador, and R. W. Green, "Symmetric-Key Block Cipher for Image and Text Cryptography", International Journal of Imaging and Technology, Vol. 15, issue. 3, pp. 178-188, 2005.
[24]C.-S. Laih, and K. Y. Chen, "Generating visible RSA public keys for PKI", International Journal of Information Security, Volume 2, issue 2, Springer-Verlag, Berlin, pp. 103-109, 2004.
[25]Izumi M et.al., “A new approach for implementing the MPL method toward higher SPA resistance”, International Conference on Availability, Reliability and Security, pp. 181—186, March 2009.
[26]Hu J, Xi Z, Jennings A, Lee HYJ, Wahyudi D,” DSP application in e-commerce security”, Processing of IEEE International Conference on Acoustics, Speech, and Signal, pp. 1005—1008, 2001.
[27]Prakash Kuppuswami, peer mohmmad appa, dr.saeed Q. Y. Al khalidi, “A new efficient digital signature scheme algorithm based on Block cipher” IOSR journal of computer engineering ISSN: 2278-0661, vol.7, pp. 47-52, nov-dec2012.
[28]Neetesh sexena and Narendra S. Chaudhary “secure Encryption with the digital signature Approach for short message services”, IEEE, 2012.
[29]Kaur Ranveer and Amandeep Kaur, “Digital Signature”, IEEE2012 International conference on Computing Science, 2012.
[30]Junling Zhang “A study on Application of digital Signature Technology”, international Conference on Networking and Digital society, IEEE 2010.
[31]J. Daemen and V. Rijmen, “Rijndael: the advanced encryption standard,” Dr. Dobb's Journal, vol. 26, no. 03, pp. 137-139, 2001.
[32]Karima Mahdi, Raida Elmansouri, Allaoua Chaoui, “On transforming business patterns to labeled Petri nets using graph grammars”, International Journal of Information Technology and Computer Science, vol. 5, no. 02, pp. 15-27, 2013.
[33]Mutlaq B.Alotaibi, “E-commerce Adoption in Saudi Arabia: an assessment of International, Regional and Domestic web presence”, International Journal of Information Technology and Computer Science, vol. 5, no. 02, pp. 42-56,2013.
[34]Rath Jairak, Prasong Praneetpolgrang, Nivet Chirawichitchai, A Roadmap for Establishing trust management strategy in E-commerce services using quality based assessment”, International Journal of Information Engineering and Electronic Business, Vol.6, No.5, PP.1-9, 2014, DOI:10.5815/ijieeb.2014.05.01.
[35]Prema Kumar Balaramma, Kalpana Kosalram, “E-commerce Evaluation and E-Business Trends”, International Journal of Information Engineering and Electronic Business, Vol.4, No.5, pp. 9-16, October 2012.