A SECURITY MODEL FOR PREVENTING E-COMMERCE RELATED CRIMES
Raphael Olufemi AKINYEDE
roakinyede@futa.edu.ng* The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure (Nigeria)
Sulaiman Omolade ADEGBENRO
The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure (Nigeria)
Babatola Moses OMILODI
The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure, (Nigeria)
Abstract
The major challenge being faced by the financial related institutions, such as e-Commerce has been insecurity. Therefore, there is urgent need to develop a scheme to protect transmitted financial information or messages from getting to the third party, intruder and/or unauthorized person(s). Such scheme will be based on Advanced Encryption Standard (AES) and Neural Data Security (NDS) Model. Based on this background, an AES using Time-based Dynamic Key Generation coupled with NDS model will be used to develop security model for preventing e-commerce related crimes. While AES will secure users’ details in the database server and ensures login authentications, NDS model will fragment or partition sensitive data into High and Low levels of confidentiality. The sensitivity of the data will determine, which category of confidentiality the data will fall into. The fragmented data are saved into two different databases, on two different servers and on the same datacenter. In addition, an exploratory survey was carried out using different performance metrics with different classifications of algorithms. Out of the four algorithms considered, Naive Bayes performs better as it shows, out of a total of 105 instances that were observed, 85.71% were correctly classified while 14.29% were misclassified.
Keywords:
e-Commerce, AES, NDSReferences
Akinyede, R. O., Alese, B. K, & Adewale, O. S. (2014). Building a Secure Environment for ClientSide Ecommerce Payment System Using Encryption System. Proceedings of the World Congress on Engineering (vol. 1). London.
Almunawar, M. N. (2012). Securing electronic transactions to support e-commerce. Arxiv.org. www.arxiv.org/ftp/arxiv/papers/1207/1207.4292.pdf
Berchane, N., & Berchane, N. (2018, March 21). Impacts of information technology (IT). Master Intelligence Economique et Stratégies Compétitives. https://master-iesc-angers.com/impactsof-information-technology-it/
Chauhan, E. S., Datta, U., & Pratap, M. (2015). A Hybrid Technique to Secure E commerce Transaction with the Help of AES Encryption and Stenography in Image. International Journal of Hybrid Information Technology, 8, 271–278.
Chinedu, J. N. (2015). Design and Development of an E-Commerce Security. International Journal of Innovative Research in Information Security (IJIRIS), 6(2), 5–17.
Hamilton, D. I., & Gabriel, J. M. (2012). Dimensions of fraud in Nigeria quoted firms. American Journal of Social and Management Sciences, 3(3), 112–120. http://doi.org/10.5251/ajsms.2012.3.3.112.120
Jarupunphol, P., & Buathong, W. (2013). Secure Electronic Transactions (SET): A Case of Secure System Project Failures. International Journal of Engineering and Technology, 5(2), 278–282. http://doi.org/10.7763/IJET.2013.V5.558
Kuppuswamy, P., & Al-Khalidi, S. Q. (2014). Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm. MIS Rev. Int. J., 20(1), 59–71.
Maitanmi, O., Ogunlere, S., & Ayinde, S. (2013). Impact of Cyber Crimes on Nigerian Economy. The International Journal of Engineering and Science, 2(4), 45–51.
Ogwueleka, F., & Ocheme, I. (2014). Review of RSA Algorithm Encryption for Combating Cybercrime: A Case Study of Developing Country. International Journal of Emerging Technology and Advanced Engineering, 4(9), 538–548.
Rajeshree, S. T., & Kirti, K., (2018). Securing Online Transactions Using Biometrics in Mobile Phone. International Research Journal of Engineering and Technology (IRJET), 5(6), 848–851.
RasmiP, S., & Paul, V. (2011). A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications. IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI), 9, 14–18.
Taroub, A. M. S. (2015). Privacy and Protection in Electronic Transaction: A Review of the eCommerce Security Protocols. The 7th International Conference on Information Technology (pp. 421–429). http://doi.org/10.15849/icit.2015.0079
Yakasai, A. M. (2017). The Relevance of E-Commerce in Nigeria. In Northwest Business and Entrepreneurship Development Review (pp. 103–135). Faculty of Social and Management Sciences.
Authors
Raphael Olufemi AKINYEDEroakinyede@futa.edu.ng
* The Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure Nigeria
Authors
Sulaiman Omolade ADEGBENROThe Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure Nigeria
Authors
Babatola Moses OMILODIThe Federal University of Technology, School of Computing, Department of Computer Science, FUTA Rd, Akure, Nigeria
Statistics
Abstract views: 84PDF downloads: 31
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
Most read articles by the same author(s)
- Raphael Olufemi AKINYEDE, Temitayo Elijah BALOGUN, Abiodun Boluwade ROTIMI, Oluwasefunmi Busola FAMODIMU, A CUSTOMER-CENTRIC APPLICATION FOR A CINEMA HOUSE , Applied Computer Science: Vol. 16 No. 2 (2020)
Similar Articles
- Maria CORDENTE-RODRIGUEZ, Simone SPLENDIANI, Patrizia SILVESTRELLI, MEASURING PROPENSITY OF ONLINE PURCHASE BY USING THE TAM MODEL: EVIDENCE FROM ITALIAN UNIVERSITY STUDENTS , Applied Computer Science: Vol. 16 No. 2 (2020)
You may also start an advanced similarity search for this article.