An Enriched Information Security Framework from Various Attacks in the IoT
Keywords:
Information Security, IoT, Computer Security, E-commerce, AuthenticationAbstract
Security in various E-commerce Applications includes an efficient framework in Information Security especially in Computer Security, Data Security and other online transactions in E-commerce applications. Security in E-Commerce application plays an important role for the secure and scalable transaction which includes various dimensions such as security-integrity, Confidentiality, Non repudiation, Privacy etc. Hence for the Security of Online Transactions in E-Commerce based application various Security algorithms are implemented. Although these Security algorithms are efficient and provides Security from various attacks but Data Storage during the transactions and Computational time of the algorithms is also important. The existing architecture proposed for the security of online e transactions in web applications provides security from different attacks and is efficient in terms of computational parameters, but there are certain issues which need to be overcome such as: Security Prevention from different attacks during Online Transactions in Web Mining especially in E
commerce Applications, Increase use of Computational Cost at the Client and Server Side. The Proposed framework provides Security prevention from various attacks especially in IoT. The methodology implemented here works on the basis of authenticating the validity of the User by allocating a challenge value and hope that our proposed framework will be more effective and efficient.
Downloads
References
Xun Yi,“Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System”, 4th International Conference. Network and System Security (NSS), 2011.
N. Kuruwitaarachchi, P.K.W. Abeygunawardena, L.Rupasingha & S.W.I.Udara, “A Systematic Review of Security in Electronic CommerceThreats and Frameworks”, Global Journal of Computer Science and Technology: E Network, Web & Security Volume 19 Issue 1 Version 1.0, 2019.
Haya Alshehri, Farid Meziane, "The Influence of Advanced and Secure E-Commerce Environments on Customers Behaviour: The Case of Saudis in the UK," in 12th International Conference for Internet Technology and Secured Transactions, 2017.
Jiang Huiping. “Strong password authentication protocols”,4th International Conference Distance Learning and Education (ICDLE),2010.
Dr. Happy Agrawal, Moon Moon Lahiri, “Gender Influenced Online Shopping Behavior among College Students”, Purakala (UGC Care Journal), Vol-31-Issue 55-June -2020
J. Katz, R. Ostrovsky, and M. Yung: “Efficient And Secure Authenticated Key Exchange Using Weak Passwords”. Journal of the ACM, 57(1):78–116, 2009.
Shuo Zhai,“Design and implementation of password based identity authentication system”, 2010
International Conference Computer Application and System Modeling (ICCASM), 2010.
Harold Nguegang Tewamba, Jean Robert Kala Kamdjoug, Georges Bell Bitjoka, Samuel Fosso Wamba, Nicolas Nkondock Mi Bahanag, “Effects of Information Security Management Systems on Firm Performance”, American Journal of Operations Management and Information Systems, volume 4(3): pp. 99-108, 2019.
S. Wanga, Z. Cao, K.-K. Choo, and L. Wang, "An improved identitybased key agreement protocol and its security proof," An International Journal of Information Sceinces, vol. 179, pp. 307-318, January. 2009.
Puspa Indahati Sandhyaduhita, "Supporting and Inhibiting Factors of E-Commerce Adoption: Exploring the Sellers Side in Indonesia," in International Conference on Advanced Computer Science and Information Systems, 2016.
D. XiaoFei and M. ChuanGui, "Cryptoanalysis and Improvements of Cross-Realm C2C PAKE Protocol,"WASE09, procedings of IEEE, International Conference on Information Engineering, pp. 193-196, 2009.
Abdul Gaffar Khan, “Electronic Commerce: A Study on Benefits and Challeges in an Emerging Economy,” Global Journal of Management and Business Research: B Economics and Commerce, vol. 16, no. 1, 2016
Somdech Rungsrisawat, Thanaporn Sriyakul, Kittisak Jermsittiparsert, “The Era of e-Commerce & Online Marketing: Risks Associated with Online Shopping”, International Journal of Innovation, Creativity and Change, Volume 8, Issue 8, 2019.
Cong Cao, Jun Yan, Mengxiang Li, "The Effects of Consumer Perceived Different Service of Trusted Third Party on Trust Intention: An Empirical Study in Australia," in 14th IEEE International Conference on e
Business Engineering, 2017.
Somdech Rungsrisawat, Watcharin Joemsittiprasert, Kittisak Jermsittiparsert, “ Factors Determining Consumer Buying Behaviour in Online Shopping”, International Journal of Innovation, Creativity and Change, Volume 8, Issue 8, 2019.
Pu, Q.,”An improved two-factor authentication protocol”. In: 2010 International Conference on Multimedia and Information Technology (MMIT). vol. 2, pp. 223– 226. Ieee, 2010.
Xu, J., Zhu, W., Feng, D.:” An improved smart card based password authentication scheme with provable security”. Computer Standards & Interfaces 31(4), 723– 728, 2009.
Abdullah, Madihah Mohd Saudi and Nor Badrul Anuar, “Mobile Botnet Detection: Proof of Concept”, 2014 IEEE 5th Control and System Graduate Research Colloquium, 2014.
Ghada El Haddad, Esma Aimeur, Hicham Hage, "Understanding Trust, Privacy and Financial Fears in Online Payment," in 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, 2018.
"Trends in e-commerce & digital fraud: Mitigating the risks," EKN, 2017.
Nik Alif Amri Nik Hashim et. al, “Internet Shopping: How the Consumer Purchase Behaviour is Impacted by Risk Perception”, Test Engineering and Management, Published by: The Mattingley Publishing Co., Inc., Volume 59 Issue 6s Page Number: 1014- 1021, 2019.