DESIGN AND DEVELOPMENT OF AN E-COMMERCE
SECURITY USING RSA CRYPTOSYSTEM
Abstract
E-commerce has presented a new way of doing transactions all over
the world using internet. The success of ecommerce depends greatly on how its
information technology is used. Over the years the rate at which ecommerce
sensitive information is sent over the internet and network has increased
drastically. It is for this reason that every company wants to ensure that its
ecommerce information is secured. There is need for ecommerce information
transmitted via the internet and computer networks to be protected. There is
substantial growth in the areas of credit card fraud and identity theft because
the internet is a public network with thousands of millions of users. Amongst
users are crackers or hackers that carry out the credit card fraud and identity
theft in numerous ways facilitated by poor internet security; a concern
regarding the exchange of money securely and conveniently over the internet
increases. The criticality, danger, and higher priority importance of any
e-commerce money transfer makes it a hot area of research interest in modern
computer science and informatics. E-commerce industry is slowly addressing
security issues on their internal networks but security protection for the
consumers is still in its infancy, thus posing a barrier to the development of
e-commerce. There is a growing need for technological solutions to globally secure
ecommerce transaction information by using appropriate data security
technology. The technology solution proposed for solving this security problem
is the RSA cryptosystem. This research paper focuses on securing ecommerce
information sent through the computer network and internet using RSA
cryptography. It elucidates the implementation of RSA algorithm and shows that
ecommerce security powered with RSA cryptography is very important in ecommerce
transaction. While many attacks exist, the system has proven to be very secure.
Chapter One
Introduction
1.1 Background
of the study
E-commerce or electronic commerce is trading in product or
services conducted via computer networks such as the internet. It is considered
to be the sales aspect of e-business consisting of the exchange of data to
facilitate the financing, payment and security of business transactions.
E-commerce refers to a wide range of online business activities for products
and services. High degree of confidence needed in authenticity and privacy of
such transactions can be difficult to maintain where they are exchanged over an
unsecured public network such as the Internet. E-commerce also pertains to any
form of business transaction in which the parties interact electronically
rather than by physical exchanges or direct physical contact. A security
objective is the contribution to security that a system is intended to achieve.
Security has emerged as an increasingly important issue in the development and
success of an E-commerce organization. Gaining access to sensitive information
and replay are some common threats that hackers impose to E-commerce systems.
Trojan horse programs launched against client systems pose the greatest threat
to e-commerce because they can bypass or subvert most of the authentication and
authorization mechanisms used in an ecommerce transaction. Privacy has become a
major concern for consumers with the rise of identity theft and impersonation
and any concern for consumers must be treated as a major concern for e-Commerce
providers. E-commerce security has its own particular nuances and is one of the
highest visible security components that affect the end user through their
daily payment interaction with business. E-commerce shares security concerns
with other technologies in the field. Privacy concerns have been found,
revealing a lack of trust in a variety of contexts, including commerce,
electronic health records, e-recruitment technology and social networking, and
this has directly influenced users. Security is one of the principal and
continuing concerns that restrict customers and organizations engaged with
ecommerce. The e-commerce industry is slowly addressing security issues on
their internal networks. There are guidelines for securing systems and networks
available for the ecommerce systems personnel to read and implement. Educating
the consumer on security issues is still in the infancy stage but will prove to
be the most critical element of the e-commerce security architecture. A.
Background Study The success or failure of an e-commerce operation hinges on
myriad of factors, including but not limited to the business model, the team,
the customers, the investors, the product, and the security of data
transmissions and storage. Data security has taken on heightened importance
since series of high-profile "cracker" attacks have humbled popular
Web sites resulting in the impersonation of Microsoft employees for the
purposes of digital certification and the misuse of credit card numbers of
customers at business-to-consumer (B2C) e-commerce destinations. Security is on
the mind of every e-commerce entrepreneur who solicits, stores, or communicates
any sensitive information.
1.2 STATEMENT OF
PROBLEM
The problem statement is that:
- Information regarding
online sales is prone to hackers and spammers e.g. product details,
distributor details, purchases, sales details and making online payment.
- Lack of database for
record keeping.
- It is very difficult
to maintain historical data of sales and other detail transaction.
1.3 OBJECTIVES OF THE
STUDY
The objective of this project is to develop a piece of software
that will solve the following:
- Protection of
integrity and confidentiality of the data stored
Since the invention of the World Wide Web (WWW) in 1989,
Internet-based electronic commerce has been transformed from a mere idea into
reality. Consumers browse through catalogues, searching for best offers, order
goods, and pay for them electronically. Information services can be subscribed
online, and many newspapers and scientific journals are even readable via the
Internet. Most financial institutions have some sort of online presence,
allowing their customers to access and manage their accounts make financial
transactions, trade stocks, and so forth. Electronic mails are exchanged within
and between enterprises and often already replace fax copies. Soon there is
arguably no enterprise left that has no Internet presence, if only for
advertisement reasons. In early 1998 more than 2 million web servers were
connected to the Internet, and more than 300 million host computers. And even
if actual Internet business or ecommerce is still marginal: the expectations
are high.
1.4 SIGNIFICANCE OF
THE STUDY
The importance of this project work includes:
- To enable the dealers
successfully implement and use a web based application securely.
- To enable customers
purchase goods online at state of their comfort or any were around the
globe.
- To provide best
benefit of dealerships, it makes extra significance in society that best
provide new standard service elements to users.
1.5 SCOPEOF
THE STUDY
The scope of this project work is confined Design and Development
of an E-Commerce Security Using RSA Cryptosystem
1.6 LIMITATION
OF THE STUDY
The research work is largely limited among other things by the
following:
· Time Constraint – The researcher
has to spend many nights in order to meet up with a desired outcome.
· Ability
to access desired information as at when needed.
· Financial Constraint – The cost
of acquiring research materials is high, even the cost of surfing the internet
and the human factors pose a big limitations.
1.7
DEFINITION OF TERMS
- SALES -
A sale is the act of selling a product or service in return for money or
other compensation. It is an act of completion of a commercial activity.
- DATABASE - A
database is a collection of information that
is organized so that it can easily be accessed, managed, and updated. In
one view, databases can be classified according to types of content:
bibliographic, full-text, numeric, and images.
Chapters: 1 - 5
Delivery: Email
Delivery: Email
Number of Pages: 70
Price: 3000 NGN
In Stock
No comments:
Post a Comment
Add Comment