Secure E-Commerce Scheme

被引:6
|
作者
Cebeci, Sena Efsun [1 ]
Nari, Kubra [1 ]
Ozdemir, Enver [1 ]
机构
[1] Istanbul Tech Univ, Informat Inst, TR-34467 Istanbul, Turkey
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Electronic commerce; Security; Protocols; Companies; Credit cards; Three-dimensional displays; Cryptography; E-commerce security; security protocol; algorithm development; symmetric key cryptography;
D O I
10.1109/ACCESS.2022.3145030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
E-commerce security has recently been an emerging topic due to the escalation in credit card fraud and stolen user accounts. In general, the security bridge and privacy leakage occur on the side of e-commerce companies due to various factors such as flaws in the design of their storage systems. The stored information of users increases the risk on privacy bridge and to remedy such risks e-commerce companies are forced to make costly investments. The security threats also enforce the development of robust security protocols and methods in digital commerce systems. The current protocols and methods generally bring extra communication and computation costs to all parties involving in the e-commerce system and the security risk on the side of e-commerce companies still remains. In this paper, we propose a Secure E-commerce Scheme (SES) which alleviates the security threats on the side of e-commerce companies and reduces communication costs for all parties. The proposed secure e-commerce protocol, SES, is implemented, analyzed and compared to two well-known schemes; Secure Electronic Transaction (SET) and 3D Secure.
引用
收藏
页码:10359 / 10370
页数:12
相关论文
共 50 条
  • [11] The Research on Secure Payment System of E-Commerce
    He, Yongqiang
    Wei, Ping
    Shi, Yanrong
    [J]. ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 18 - 21
  • [12] SAFE: secure agent roaming for e-commerce
    Guan, SU
    Yang, Y
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2002, 42 (2-4) : 481 - 493
  • [13] Research on E-Commerce Secure Payment Protocols
    Zhu Jun-xuan
    Wu Zhong
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON PUBLIC ECONOMICS AND MANAGEMENT (ICPEM 2009), VOL 5: STATISTICS AND METHODOLOGY, 2009, : 430 - 433
  • [14] A secure anonymous authorisation architecture for e-commerce
    Au, WKR
    Choo, KKR
    Looi, M
    [J]. 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, Proceedings, 2005, : 106 - 111
  • [16] Symbolon - A novel concept for secure e-commerce
    Fischmeister, S
    Hagleitner, G
    Pree, W
    [J]. TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 603 - 616
  • [17] Utilities pave way for secure E-commerce
    不详
    [J]. COMMUNICATIONS NEWS, 1996, 33 (08): : 10 - 10
  • [18] Layered architecture for secure e-commerce applications
    Herzberg, Amir
    Yoffe, Igal
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 118 - +
  • [19] IBM launches secure E-commerce framework
    不详
    [J]. COMPUTER, 1997, 30 (03) : 19 - 20
  • [20] E-representative:: a scalability scheme for e-commerce
    Meira, W
    Menascé, D
    Almeida, V
    Fonseca, R
    [J]. WECWIS 2000: SECOND INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDING, 2000, : 168 - 175