Secure Architecture for Electronic Commerce Applications Running over the Cloud
DOI:
https://doi.org/10.21015/vtse.v11i1.1391Abstract
E-commerce and mobile commerce are two new business methodologies that utilize the cloud. A new technology called cloud computing uses the Internet to process and store data from a network of distant computers that are dispersed around the globe. Any online transaction must have security as a necessary component. Therefore, one of the main issues with the cloud is security. If electronic commerce's security is breached, customers can lose trust in it. An unauthorized individual should not have access to or be able to intercept a customer's personal information while it is being transmitted. Data integrity is a major problem since personal information shouldn't be changed before, during, or even after it is at rest on the network. The suggested solution ensures the protection of personal data and the avoidance of security problems. We have developed a solution in this study to address issues with privacy, confidentiality, and the integrity of data stored in the cloud, among other security-related issues. The suggested method employs over-encryption that is double encryption, to avoid the various security issues. It can be inferred from the results that ECC (secp256r1) utilised less time for encryption operation as compared to others asymmetric algorithms with small dispersion from means and recorded results behaviour of data is consistent because data point tends to be very close, Decryption operation ElGamal during of time was smaller than ECC and RSA with small consistent behaviour.
References
T. Ramalingeswara Rao, Pabitra Mitra, Ravindara Bhatt, A. Goswami, "The Big Data system, components, tools, and technologies: a survey," in Springer Knowledge and Information Systems, vol. 54, no. 1, pp. 145-196, 2018. doi: 10.1007/s10115-018-1248-0.
H. M. Deitel, P. J. Deitel and S. E. Santry, "Advanced Java 2 Platform, How to Program," Prentice Hall, Upper Saddle River, New Jersey, 2001.
P. Ghazizadeh, R. Mukkamala and S. Olariu, "Data Integrity Evaluation in Cloud Database-as-a-Service," in IEEE Ninth World Congress on Services, pp. 606-613, 2013. doi: 10.1109/SERVICES.2013.100. DOI: https://doi.org/10.1109/SERVICES.2013.40
P. Metri and G. Sarote, "Privacy Issues and Challenges in Cloud Computing," in International Journal of Advanced Engineering Sciences and Technologies, vol. 5, no. 1, pp. 001-006, 2011. ISSN: 2230-7818.
K. Patel, "Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files," in Springer International Journal of Information Technology, vol. 11, no. 4, pp. 437-445, 2019. doi: 10.1007/s41870-018-0271-4.
M. Agoyi and D. Seral, "SMS Security: An Asymmetric Encryption Approach," in IEEE Sixth International Conference on Wireless and Mobile Communications, pp. 222-226, 2010. doi: 10.1109/ICWMC.2010.87. DOI: https://doi.org/10.1109/ICWMC.2010.87
L. Dai and Q. Zhou, "A PKI-based Mechanism for Secure and Efficient Access to Outsourced Data," in Proceedings of International Conference on Networking and Digital Society, pp. 1-4, 2010. doi: 10.1109/ICNDS.2010.40.
S. Sanka, C. Hota, and M. Rajarajan, "Secure Data Access in Cloud Computing," in Proceedings of IEEE International Conference on Communications (ICC), pp. 1-5, 2010. doi: 10.1109/ICC.2010.5502384. DOI: https://doi.org/10.1109/IMSAA.2010.5729397
Z. Xu, C. Wang, Q. Wang, K. Ren, and L. Wang, "Proof-carrying Cloud Computation: the Case of Convex Optimization," in IEEE INFOCOM 2013 - IEEE Conference on Computer Communications, pp. 2831-2835, 2013. doi: 10.1109/INFOCOM.2013.6567032. DOI: https://doi.org/10.1109/INFCOM.2013.6566845
J. Peng, X. Zhang, Z. Lei, B. Zhang, W. Zhang, and Q. Li, "Comparison of Several Cloud Computing Platforms," in Proceedings of IEEE Second International Symposium on Information Science and Engineering (ISISE), pp. 791-794, 2009. doi: 10.1109/ISISE.2009.213. DOI: https://doi.org/10.1109/ISISE.2009.94
H. M. Deitel, P. J. Deitel, and S. E. Santry, "Advanced Java 2 Platform, How to Program," Prentice Hall, Upper Saddle River, New Jersey, 2001.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY