A SECURITY MODEL FOR PREVENTING E-COMMERCE RELATED CRIMES

Raphael Olufemi AKINYEDE

roakinyede@futa.edu.ng
* The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure (Nigeria)

Sulaiman Omolade ADEGBENRO


The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure (Nigeria)

Babatola Moses OMILODI


The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure, (Nigeria)

Abstract

The major challenge being faced by the financial related institutions, such as e-Commerce has been insecurity. Therefore, there is urgent need to develop a scheme to protect transmitted financial information or messages from getting to the third party, intruder and/or unauthorized person(s). Such scheme will be based on Advanced Encryption Standard (AES) and Neural Data Security (NDS) Model. Based on this background, an AES using Time-based Dynamic Key Generation coupled with NDS model will be used to develop security model for preventing e-commerce related crimes. While AES will secure users’ details in the database server and ensures login authentications, NDS model will fragment or partition sensitive data into High and Low levels of confidentiality. The sensitivity of the data will determine, which category of confidentiality the data will fall into. The fragmented data are saved into two different databases, on two different servers and on the same datacenter. In addition, an exploratory survey was carried out using different performance metrics with different classifications of algorithms. Out of the four algorithms considered, Naive Bayes performs better as it shows, out of a total of 105 instances that were observed, 85.71% were correctly classified while 14.29% were misclassified.


Keywords:

e-Commerce, AES, NDS

Akash, V. M., & Bhonge, S. P. (2013). Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption. International Journal of Science and Research (IJSR), 4(4), 16041503.
Akinyede, R. O., Alese, B. K, & Adewale, O. S. (2014). Building a Secure Environment for ClientSide Ecommerce Payment System Using Encryption System. Proceedings of the World Congress on Engineering (vol. 1). London.
Almunawar, M. N. (2012). Securing electronic transactions to support e-commerce. Arxiv.org. www.arxiv.org/ftp/arxiv/papers/1207/1207.4292.pdf
Berchane, N., & Berchane, N. (2018, March 21). Impacts of information technology (IT). Master Intelligence Economique et Stratégies Compétitives. https://master-iesc-angers.com/impactsof-information-technology-it/
Chauhan, E. S., Datta, U., & Pratap, M. (2015). A Hybrid Technique to Secure E commerce Transaction with the Help of AES Encryption and Stenography in Image. International Journal of Hybrid Information Technology, 8, 271–278.
Chinedu, J. N. (2015). Design and Development of an E-Commerce Security. International Journal of Innovative Research in Information Security (IJIRIS), 6(2), 5–17.
Hamilton, D. I., & Gabriel, J. M. (2012). Dimensions of fraud in Nigeria quoted firms. American Journal of Social and Management Sciences, 3(3), 112–120. http://doi.org/10.5251/ajsms.2012.3.3.112.120
Jarupunphol, P., & Buathong, W. (2013). Secure Electronic Transactions (SET): A Case of Secure System Project Failures. International Journal of Engineering and Technology, 5(2), 278–282. http://doi.org/10.7763/IJET.2013.V5.558
Kuppuswamy, P., & Al-Khalidi, S. Q. (2014). Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm. MIS Rev. Int. J., 20(1), 59–71.
Maitanmi, O., Ogunlere, S., & Ayinde, S. (2013). Impact of Cyber Crimes on Nigerian Economy. The International Journal of Engineering and Science, 2(4), 45–51.
Ogwueleka, F., & Ocheme, I. (2014). Review of RSA Algorithm Encryption for Combating Cybercrime: A Case Study of Developing Country. International Journal of Emerging Technology and Advanced Engineering, 4(9), 538–548.
Rajeshree, S. T., & Kirti, K., (2018). Securing Online Transactions Using Biometrics in Mobile Phone. International Research Journal of Engineering and Technology (IRJET), 5(6), 848–851.
RasmiP, S., & Paul, V. (2011). A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications. IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI), 9, 14–18.
Taroub, A. M. S. (2015). Privacy and Protection in Electronic Transaction: A Review of the eCommerce Security Protocols. The 7th International Conference on Information Technology (pp. 421–429). http://doi.org/10.15849/icit.2015.0079
Yakasai, A. M. (2017). The Relevance of E-Commerce in Nigeria. In Northwest Business and Entrepreneurship Development Review (pp. 103–135). Faculty of Social and Management Sciences.
Download


Published
2020-09-30

Cited by

AKINYEDE, R. O. ., ADEGBENRO, S. O. ., & OMILODI, B. M. (2020). A SECURITY MODEL FOR PREVENTING E-COMMERCE RELATED CRIMES. Applied Computer Science, 16(3), 30–41. https://doi.org/10.23743/acs-2020-19

Authors

Raphael Olufemi AKINYEDE 
roakinyede@futa.edu.ng
* The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure Nigeria

Authors

Sulaiman Omolade ADEGBENRO 

The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure Nigeria

Authors

Babatola Moses OMILODI 

The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure, Nigeria

Statistics

Abstract views: 49
PDF downloads: 3


License

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.


Most read articles by the same author(s)

Similar Articles

You may also start an advanced similarity search for this article.