Secure Architecture for Electronic Commerce Applications Running over the Cloud

Authors

  • Mujeeb-ur- Rehman Jamali Institute of Mathematics and Computer Science, University of Sindh Jamshoro
  • Shahmurad Chandio Institute of Mathematics and Computer Science, University of Sindh Jamshoro Pakistan
  • Nadeem Ahmed Kanasro Department of Computer Science, Sindh University Campus, Larkana, Pakistan

DOI:

https://doi.org/10.21015/vtse.v11i1.1391

Abstract

E-commerce and mobile commerce are two new business methodologies that utilize the cloud. A new technology called cloud computing uses the Internet to process and store data from a network of distant computers that are dispersed around the globe. Any online transaction must have security as a necessary component. Therefore, one of the main issues with the cloud is security. If electronic commerce's security is breached, customers can lose trust in it. An unauthorized individual should not have access to or be able to intercept a customer's personal information while it is being transmitted. Data integrity is a major problem since personal information shouldn't be changed before, during, or even after it is at rest on the network. The suggested solution ensures the protection of personal data and the avoidance of security problems. We have developed a solution in this study to address issues with privacy, confidentiality, and the integrity of data stored in the cloud, among other security-related issues. The suggested method employs over-encryption that is double encryption, to avoid the various security issues. It can be inferred from the results that ECC (secp256r1) utilised less time for encryption operation as compared to others asymmetric algorithms with small dispersion from means and recorded results behaviour of data is consistent because data point tends to be very close, Decryption operation ElGamal during of time was smaller than ECC and RSA with small consistent behaviour.

References

T. Ramalingeswara Rao, Pabitra Mitra, Ravindara Bhatt, A. Goswami, "The Big Data system, components, tools, and technologies: a survey," in Springer Knowledge and Information Systems, vol. 54, no. 1, pp. 145-196, 2018. doi: 10.1007/s10115-018-1248-0.

H. M. Deitel, P. J. Deitel and S. E. Santry, "Advanced Java 2 Platform, How to Program," Prentice Hall, Upper Saddle River, New Jersey, 2001.

P. Ghazizadeh, R. Mukkamala and S. Olariu, "Data Integrity Evaluation in Cloud Database-as-a-Service," in IEEE Ninth World Congress on Services, pp. 606-613, 2013. doi: 10.1109/SERVICES.2013.100. DOI: https://doi.org/10.1109/SERVICES.2013.40

P. Metri and G. Sarote, "Privacy Issues and Challenges in Cloud Computing," in International Journal of Advanced Engineering Sciences and Technologies, vol. 5, no. 1, pp. 001-006, 2011. ISSN: 2230-7818.

K. Patel, "Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files," in Springer International Journal of Information Technology, vol. 11, no. 4, pp. 437-445, 2019. doi: 10.1007/s41870-018-0271-4.

M. Agoyi and D. Seral, "SMS Security: An Asymmetric Encryption Approach," in IEEE Sixth International Conference on Wireless and Mobile Communications, pp. 222-226, 2010. doi: 10.1109/ICWMC.2010.87. DOI: https://doi.org/10.1109/ICWMC.2010.87

L. Dai and Q. Zhou, "A PKI-based Mechanism for Secure and Efficient Access to Outsourced Data," in Proceedings of International Conference on Networking and Digital Society, pp. 1-4, 2010. doi: 10.1109/ICNDS.2010.40.

S. Sanka, C. Hota, and M. Rajarajan, "Secure Data Access in Cloud Computing," in Proceedings of IEEE International Conference on Communications (ICC), pp. 1-5, 2010. doi: 10.1109/ICC.2010.5502384. DOI: https://doi.org/10.1109/IMSAA.2010.5729397

Z. Xu, C. Wang, Q. Wang, K. Ren, and L. Wang, "Proof-carrying Cloud Computation: the Case of Convex Optimization," in IEEE INFOCOM 2013 - IEEE Conference on Computer Communications, pp. 2831-2835, 2013. doi: 10.1109/INFOCOM.2013.6567032. DOI: https://doi.org/10.1109/INFCOM.2013.6566845

J. Peng, X. Zhang, Z. Lei, B. Zhang, W. Zhang, and Q. Li, "Comparison of Several Cloud Computing Platforms," in Proceedings of IEEE Second International Symposium on Information Science and Engineering (ISISE), pp. 791-794, 2009. doi: 10.1109/ISISE.2009.213. DOI: https://doi.org/10.1109/ISISE.2009.94

H. M. Deitel, P. J. Deitel, and S. E. Santry, "Advanced Java 2 Platform, How to Program," Prentice Hall, Upper Saddle River, New Jersey, 2001.

Downloads

Published

2023-03-26

How to Cite

Jamali, M.- ur-. R., Chandio, S., & Kanasro, N. A. (2023). Secure Architecture for Electronic Commerce Applications Running over the Cloud. VFAST Transactions on Software Engineering, 11(1), 51–60. https://doi.org/10.21015/vtse.v11i1.1391