An Enriched Information Security Framework from Various Attacks in the IoT

Authors

  • Mohammad Salman Husain PG Scholar, Department of Computer Sc. & Engineering, Integral University, Lucknow India, Author
  • Mohammad Haroon Associate Professor, Department of Computer Sc. & Engineering, Integral University, Lucknow India Author

Keywords:

Information Security, IoT, Computer Security, E-commerce, Authentication

Abstract

Security in various E-commerce Applications  includes an efficient framework in Information Security  especially in Computer Security, Data Security and other  online transactions in E-commerce applications. Security in  E-Commerce application plays an important role for the  secure and scalable transaction which includes various  dimensions such as security-integrity, Confidentiality, Non repudiation, Privacy etc. Hence for the Security of Online  Transactions in E-Commerce based application various  Security algorithms are implemented. Although these  Security algorithms are efficient and provides Security from  various attacks but Data Storage during the transactions and  Computational time of the algorithms is also important. The  existing architecture proposed for the security of online e transactions in web applications provides security from  different attacks and is efficient in terms of computational  parameters, but there are certain issues which need to be  overcome such as: Security Prevention from different attacks  during Online Transactions in Web Mining especially in E 

commerce Applications, Increase use of Computational Cost  at the Client and Server Side. The Proposed framework  provides Security prevention from various attacks especially  in IoT. The methodology implemented here works on the  basis of authenticating the validity of the User by allocating  a challenge value and hope that our proposed framework will  be more effective and efficient. 

Downloads

Download data is not yet available.

References

Xun Yi,“Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System”, 4th International Conference. Network and System Security (NSS), 2011.

N. Kuruwitaarachchi, P.K.W. Abeygunawardena, L.Rupasingha & S.W.I.Udara, “A Systematic Review of Security in Electronic CommerceThreats and Frameworks”, Global Journal of Computer Science and Technology: E Network, Web & Security Volume 19 Issue 1 Version 1.0, 2019.

Haya Alshehri, Farid Meziane, "The Influence of Advanced and Secure E-Commerce Environments on Customers Behaviour: The Case of Saudis in the UK," in 12th International Conference for Internet Technology and Secured Transactions, 2017.

Jiang Huiping. “Strong password authentication protocols”,4th International Conference Distance Learning and Education (ICDLE),2010.

Dr. Happy Agrawal, Moon Moon Lahiri, “Gender Influenced Online Shopping Behavior among College Students”, Purakala (UGC Care Journal), Vol-31-Issue 55-June -2020

J. Katz, R. Ostrovsky, and M. Yung: “Efficient And Secure Authenticated Key Exchange Using Weak Passwords”. Journal of the ACM, 57(1):78–116, 2009.

Shuo Zhai,“Design and implementation of password based identity authentication system”, 2010

International Conference Computer Application and System Modeling (ICCASM), 2010.

Harold Nguegang Tewamba, Jean Robert Kala Kamdjoug, Georges Bell Bitjoka, Samuel Fosso Wamba, Nicolas Nkondock Mi Bahanag, “Effects of Information Security Management Systems on Firm Performance”, American Journal of Operations Management and Information Systems, volume 4(3): pp. 99-108, 2019.

S. Wanga, Z. Cao, K.-K. Choo, and L. Wang, "An improved identitybased key agreement protocol and its security proof," An International Journal of Information Sceinces, vol. 179, pp. 307-318, January. 2009.

Puspa Indahati Sandhyaduhita, "Supporting and Inhibiting Factors of E-Commerce Adoption: Exploring the Sellers Side in Indonesia," in International Conference on Advanced Computer Science and Information Systems, 2016.

D. XiaoFei and M. ChuanGui, "Cryptoanalysis and Improvements of Cross-Realm C2C PAKE Protocol,"WASE09, procedings of IEEE, International Conference on Information Engineering, pp. 193-196, 2009.

Abdul Gaffar Khan, “Electronic Commerce: A Study on Benefits and Challeges in an Emerging Economy,” Global Journal of Management and Business Research: B Economics and Commerce, vol. 16, no. 1, 2016

Somdech Rungsrisawat, Thanaporn Sriyakul, Kittisak Jermsittiparsert, “The Era of e-Commerce & Online Marketing: Risks Associated with Online Shopping”, International Journal of Innovation, Creativity and Change, Volume 8, Issue 8, 2019.

Cong Cao, Jun Yan, Mengxiang Li, "The Effects of Consumer Perceived Different Service of Trusted Third Party on Trust Intention: An Empirical Study in Australia," in 14th IEEE International Conference on e

Business Engineering, 2017.

Somdech Rungsrisawat, Watcharin Joemsittiprasert, Kittisak Jermsittiparsert, “ Factors Determining Consumer Buying Behaviour in Online Shopping”, International Journal of Innovation, Creativity and Change, Volume 8, Issue 8, 2019.

Pu, Q.,”An improved two-factor authentication protocol”. In: 2010 International Conference on Multimedia and Information Technology (MMIT). vol. 2, pp. 223– 226. Ieee, 2010.

Xu, J., Zhu, W., Feng, D.:” An improved smart card based password authentication scheme with provable security”. Computer Standards & Interfaces 31(4), 723– 728, 2009.

Abdullah, Madihah Mohd Saudi and Nor Badrul Anuar, “Mobile Botnet Detection: Proof of Concept”, 2014 IEEE 5th Control and System Graduate Research Colloquium, 2014.

Ghada El Haddad, Esma Aimeur, Hicham Hage, "Understanding Trust, Privacy and Financial Fears in Online Payment," in 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, 2018.

"Trends in e-commerce & digital fraud: Mitigating the risks," EKN, 2017.

Nik Alif Amri Nik Hashim et. al, “Internet Shopping: How the Consumer Purchase Behaviour is Impacted by Risk Perception”, Test Engineering and Management, Published by: The Mattingley Publishing Co., Inc., Volume 59 Issue 6s Page Number: 1014- 1021, 2019.

Downloads

Published

2020-07-04

How to Cite

An Enriched Information Security Framework from Various Attacks in the IoT . (2020). International Journal of Innovative Research in Computer Science & Technology, 8(4), 271–277. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13227