Latest

whatsapp (+234)07060722008
email sales@graciousnaija.com

Friday 29 January 2016

DESIGN AND DEVELOPMENT OF AN E-COMMERCE SECURITY USING RSA CRYPTO SYSTEM

DESIGN AND DEVELOPMENT OF AN E-COMMERCE SECURITY USING RSA CRYPTOSYSTEM
Abstract

E-commerce has presented a new way of doing transactions all over the world using internet. The success of ecommerce depends greatly on how its information technology is used. Over the years the rate at which ecommerce sensitive information is sent over the internet and network has increased drastically. It is for this reason that every company wants to ensure that its ecommerce information is secured. There is need for ecommerce information transmitted via the internet and computer networks to be protected. There is substantial growth in the areas of credit card fraud and identity theft because the internet is a public network with thousands of millions of users. Amongst users are crackers or hackers that carry out the credit card fraud and identity theft in numerous ways facilitated by poor internet security; a concern regarding the exchange of money securely and conveniently over the internet increases. The criticality, danger, and higher priority importance of any e-commerce money transfer makes it a hot area of research interest in modern computer science and informatics. E-commerce industry is slowly addressing security issues on their internal networks but security protection for the consumers is still in its infancy, thus posing a barrier to the development of e-commerce. There is a growing need for technological solutions to globally secure ecommerce transaction information by using appropriate data security technology. The technology solution proposed for solving this security problem is the RSA cryptosystem. This research paper focuses on securing ecommerce information sent through the computer network and internet using RSA cryptography. It elucidates the implementation of RSA algorithm and shows that ecommerce security powered with RSA cryptography is very important in ecommerce transaction. While many attacks exist, the system has proven to be very secure.
Chapter One

Introduction
1.1    Background of the study

E-commerce or electronic commerce is trading in product or services conducted via computer networks such as the internet. It is considered to be the sales aspect of e-business consisting of the exchange of data to facilitate the financing, payment and security of business transactions. E-commerce refers to a wide range of online business activities for products and services. High degree of confidence needed in authenticity and privacy of such transactions can be difficult to maintain where they are exchanged over an unsecured public network such as the Internet. E-commerce also pertains to any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact. A security objective is the contribution to security that a system is intended to achieve. Security has emerged as an increasingly important issue in the development and success of an E-commerce organization. Gaining access to sensitive information and replay are some common threats that hackers impose to E-commerce systems. Trojan horse programs launched against client systems pose the greatest threat to e-commerce because they can bypass or subvert most of the authentication and authorization mechanisms used in an ecommerce transaction. Privacy has become a major concern for consumers with the rise of identity theft and impersonation and any concern for consumers must be treated as a major concern for e-Commerce providers. E-commerce security has its own particular nuances and is one of the highest visible security components that affect the end user through their daily payment interaction with business. E-commerce shares security concerns with other technologies in the field. Privacy concerns have been found, revealing a lack of trust in a variety of contexts, including commerce, electronic health records, e-recruitment technology and social networking, and this has directly influenced users. Security is one of the principal and continuing concerns that restrict customers and organizations engaged with ecommerce. The e-commerce industry is slowly addressing security issues on their internal networks. There are guidelines for securing systems and networks available for the ecommerce systems personnel to read and implement. Educating the consumer on security issues is still in the infancy stage but will prove to be the most critical element of the e-commerce security architecture. A. Background Study The success or failure of an e-commerce operation hinges on myriad of factors, including but not limited to the business model, the team, the customers, the investors, the product, and the security of data transmissions and storage. Data security has taken on heightened importance since series of high-profile "cracker" attacks have humbled popular Web sites resulting in the impersonation of Microsoft employees for the purposes of digital certification and the misuse of credit card numbers of customers at business-to-consumer (B2C) e-commerce destinations. Security is on the mind of every e-commerce entrepreneur who solicits, stores, or communicates any sensitive information.


1.2 STATEMENT OF PROBLEM

The problem statement is that:

  • Information regarding online sales is prone to hackers and spammers e.g. product details, distributor details, purchases, sales details and making online payment.
  • Lack of database for record keeping.
  • It is very difficult to maintain historical data of sales and other detail transaction.

1.3 OBJECTIVES OF THE STUDY

The objective of this project is to develop a piece of software that will solve the following:

  • Protection of integrity and confidentiality of the data stored

Since the invention of the World Wide Web (WWW) in 1989, Internet-based electronic commerce has been transformed from a mere idea into reality. Consumers browse through catalogues, searching for best offers, order goods, and pay for them electronically. Information services can be subscribed online, and many newspapers and scientific journals are even readable via the Internet. Most financial institutions have some sort of online presence, allowing their customers to access and manage their accounts make financial transactions, trade stocks, and so forth. Electronic mails are exchanged within and between enterprises and often already replace fax copies. Soon there is arguably no enterprise left that has no Internet presence, if only for advertisement reasons. In early 1998 more than 2 million web servers were connected to the Internet, and more than 300 million host computers. And even if actual Internet business or ecommerce is still marginal: the expectations are high.


1.4 SIGNIFICANCE OF THE STUDY

The importance of this project work includes:

  • To enable the dealers successfully implement and use a web based application securely.
  • To enable customers purchase goods online at state of their comfort or any were around the globe.
  • To provide best benefit of dealerships, it makes extra significance in society that best provide new standard service elements to users.

1.5    SCOPEOF THE STUDY

The scope of this project work is confined Design and Development of an E-Commerce Security Using RSA Cryptosystem


1.6    LIMITATION OF THE STUDY

The research work is largely limited among other things by the following:

·         Time Constraint – The researcher has to spend many nights in order to meet up with a desired outcome.

·         Ability to access desired information as at when needed.

·         Financial Constraint – The cost of acquiring research materials is high, even the cost of surfing the internet and the human factors pose a big limitations.


1.7    DEFINITION OF TERMS

  • SALES - A sale is the act of selling a product or service in return for money or other compensation. It is an act of completion of a commercial activity.
  • DATABASE - A database is a collection of information that is organized so that it can easily be accessed, managed, and updated. In one view, databases can be classified according to types of content: bibliographic, full-text, numeric, and images.
TOPIC: DESIGN AND DEVELOPMENT OF AN E-COMMERCE SECURITY USING RSA CRYPTOSYSTEM
Chapters: 1 - 5
Delivery: Email
Number of Pages: 70

Price: 3000 NGN
In Stock


 


No comments:

Post a Comment

Add Comment