Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The major challenge being faced by the financial related institutions, such as e-Commerce has been insecurity. Therefore, there is urgent need to develop a scheme to protect transmitted financial information or messages from getting to the third party, intruder and/or unauthorized person(s). Such scheme will be based on Advanced Encryption Standard (AES) and Neural Data Security (NDS) Model. Based on this background, an AES using Time-based Dynamic Key Generation coupled with NDS model will be used to develop security model for preventing e-commerce related crimes. While AES will secure users’ details in the database server and ensures login authentications, NDS model will fragment or partition sensitive data into High and Low levels of confidentiality. The sensitivity of the data will determine, which category of confidentiality the data will fall into. The fragmented data are saved into two different databases, on two different servers and on the same datacenter. In addition, an exploratory survey was carried out using different performance metrics with different classifications of algorithms. Out of the four algorithms considered, Naive Bayes performs better as it shows, out of a total of 105 instances that were observed, 85.71% were correctly classified while 14.29% were misclassified.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
30--41
Opis fizyczny
Bibliogr. 15 poz., fig., tab.
Twórcy
autor
- The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure, Nigeria
- The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure, Nigeria
autor
- The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure, Nigeria
Bibliografia
- [1] Akash, V. M., & Bhonge, S. P. (2013). Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption. International Journal of Science and Research (IJSR), 4(4), 16041503.
- [2] Akinyede, R. O., Alese, B. K, & Adewale, O. S. (2014). Building a Secure Environment for Client-Side Ecommerce Payment System Using Encryption System. Proceedings of the World Congress on Engineering (vol. 1). London.
- [3] Almunawar, M. N. (2012). Securing electronic transactions to support e-commerce. Arxiv.org. www.arxiv.org/ftp/arxiv/papers/1207/1207.4292.pdf
- [4] Berchane, N., & Berchane, N. (2018, March 21). Impacts of information technology (IT). Master Intelligence Economique et Stratégies Compétitives. https://master-iesc-angers.com/impacts-of-information-technology-it/
- [5] Chauhan, E. S., Datta, U., & Pratap, M. (2015). A Hybrid Technique to Secure E commerce Transaction with the Help of AES Encryption and Stenography in Image. International Journal of Hybrid Information Technology, 8, 271–278.
- [6] Chinedu, J. N. (2015). Design and Development of an E-Commerce Security. International Journal of Innovative Research in Information Security (IJIRIS), 6(2), 5–17.
- [7] Hamilton, D. I., & Gabriel, J. M. (2012). Dimensions of fraud in Nigeria quoted firms. American Journal of Social and Management Sciences, 3(3), 112–120. http://doi.org/10.5251/ajsms. 2012.3.3.112.120
- [8] Jarupunphol, P., & Buathong, W. (2013). Secure Electronic Transactions (SET): A Case of Secure System Project Failures. International Journal of Engineering and Technology, 5(2), 278–282. http://doi.org/10.7763/IJET.2013.V5.558
- [9] Kuppuswamy, P., & Al-Khalidi, S. Q. (2014). Securing E-Commerce Business Using Hybrid Combi-nation Based on New Symmetric Key and RSA Algorithm. MIS Rev. Int. J., 20(1), 59–71.
- [10] Maitanmi, O., Ogunlere, S., & Ayinde, S. (2013). Impact of Cyber Crimes on Nigerian Economy. The International Journal of Engineering and Science, 2(4), 45–51.
- [11] Ogwueleka, F., & Ocheme, I. (2014). Review of RSA Algorithm Encryption for Combating Cybercrime: A Case Study of Developing Country. International Journal of Emerging Technology and Advanced Engineering, 4(9), 538–548.
- [12] Rajeshree, S. T., & Kirti, K., (2018). Securing Online Transactions Using Biometrics in Mobile Phone. International Research Journal of Engineering and Technology (IRJET), 5(6), 848–851.
- [13] RasmiP, S., & Paul, V. (2011). A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications. IJCA Proceedings on International Conference on VLSI, Communications and Instru-mentation (ICVCI), 9, 14–18.
- [14] Taroub, A. M. S. (2015). Privacy and Protection in Electronic Transaction: A Review of the e-Commerce Security Protocols. The 7th International Conference on Information Technology (pp. 421–429). http://doi.org/10.15849/icit.2015.0079
- [15] Yakasai, A. M. (2017). The Relevance of E-Commerce in Nigeria. In Northwest Business and Entrepreneurship Development Review (pp. 103–135). Faculty of Social and Management Sciences.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-0a515954-f861-49ed-aad5-72cbf3508da8