Securing Transactions Using Hybrid Cryptography in E-commerce Apps

المؤلفون

  • Ghanima Sabr Shyaa
  • Mishall Al-Zubaidie*1

DOI:

https://doi.org/10.32792/jeps.v13i3.357

الملخص

The development of technology at the present time leads to an increase in the use of electronic
commerce due to the increase in demand processes, whether selling or buying goods, products,
services, or payment requests, and that the transfer of information the merchants is sensitive and
important information, and this information or operations may be subject to penetration or attacks. In
this research, we designed a protocol that integrates the Fernet algorithm and the ElGamal algorithm,
and we use the Data Leakage Detection Technology (DLD) to safeguard e-commerce transaction
data. This protocol provid high security for information, and the integration of algorithms provides
high security and strong performance for information transactions that are difficult to hack. We
incorporate encryption algorithms to achieve a high level of security and performance. The proposed
protocol is higher in security and performance than the algorithms of previous studies.

المراجع

[ 1] Asih, E. S., Nguyen, P. T., Lydia, E. L., Shankar, K., Hashim, W., & Maseleno, A.

(2019). Mobile E-commerce website for technology-based buying selling services.

[ 2] Al-Ayed, S. (2022). The impact of e-commerce drivers on e-customer loyalty: Evidence from

KSA. International Journal of Data and Network Science, 6(1), 73-80.

[ 3] Kumbhakar, D., Sanyal, K., & Karforma, S. (2023). An optimal and efficient data security

technique through crypto-stegano for E-commerce. Multimedia Tools and Applications, 1-14.

[ 4] Jintcharadze, E., & Iavich, M. (2020, September). Hybrid implementation of Twofish,

AES, ElGamal and RSA cryptosystems. In 2020 IEEE East-West Design & Test Symposium

(EWDTS) (pp. 1-5). IEEE.

[ 5] MALAU, H., & YOVIRA, V. (2022). REVIEW OF TEXT BASED PASSWORD AND

OTHER AUTHENTICATION METHODS FOR E-COMMERCE DATA PROTECTION.

Journal of Theoretical and Applied Information Technology, 100(6).

[ 6] Sidik, A. P., Efendi, S., & Suherman, S. (2019, June). Improving One-Time Pad Algorithm

on Shamir’s Three-Pass Protocol Scheme by Using RSA and ElGamal Algorithms. In Journal

of Physics: Conference Series (Vol. 1235, No. 1, p. 012007). IOP Publishing.

[ 7] Ali, G., Dida, M. A., & Elikana Sam, A. (2021). A Secure and Efficient Multi-Factor

Authentication Algorithm for Mobile Money Applications. Future Internet, 13(12), 299.

[ 8] Tyagi, S. S. (2021). Enhancing Security of Cloud Data through Encryption with AES and

Fernet Algorithm through Convolutional-Neural-Networks (CNN). International Journal of

Computer Networks and Applications, 8(4), 288-299.

[ 9] Dong, Z. (2021). Construction of mobile E-commerce platform and analysis of its impact on

E-commerce logistics customer satisfaction. Complexity, 2021.

[ 10] Abdul Hussien, F. T., Rahma, A. M. S., & Abdul Wahab, H. B. (2021). A secure

environment using a new lightweight AES encryption algorithm for e-commerce websites.

Security and Communication Networks, 2021.

[ 11] Kota, C. (2022). Secure File Storage in Cloud Using Hybrid Cryptography. Available at

SSRN 4209511.

[ 12] Koppaka, A. K., & Lakshmi, V. N. (2022). ElGamal algorithm with hyperchaotic sequence

to enhance security of cloud data. International Journal of Pervasive Computing and

Communications, (ahead-of-print).

[ 13] Charles, V. B., Surendran, D., & SureshKumar, A. (2022). Heart disease databased

privacy preservation using enhanced ElGamal and ResNet classifier. Biomedical Signal

Processing and Control, 71, 103185.

[ 14] Ahmed, S., & Ahmed, T. (2022). Comparative Analysis of Cryptographic Algorithms in

Context of Communication: A Systematic Review.

[ 15] Parvathi, R., Girish, M., Sandeep, M. G., & Abhiram, K. (2022). Secured Blockchain

Technology for Agriculture Food Supply Chain. Journal of Pharmaceutical Negative Results,

-361.

[ 16] Asmah, A., & Inayah, A. I. (2023, January). Efficiency for E-Commerce Business Actors.

In 3rd International Conference on Business Law and Local Wisdom in Tourism (ICBLT

(pp. 185-193). Atlantis Press.

[ 17] He, H., & Zhang, B. (2023). Strategy Analysis of Multi-Agent Governance on the ECommerce

Platform. Journal of Theoretical and Applied Electronic Commerce Research,

(1), 1-18.

[ 18] Li, Z., Ren, L., Li, Z., Chen, J., Tian, X., & Zhang, Y. (2023). Price Dispersion,

Bargaining Power, and Consumers’ Online Shopping Experience in e-Commerce: Evidence

from Online Transactions. Mathematical Problems in Engineering, 2023.

[ 19] Sugito, P. (2023). Sales Multiplize Through E-Commerce Training for Batik Craftsman in

Paiton Probolinggo. Empowerment Society, 6(1), 9-16.

[ 20] De Feo, L., Poettering, B., & Sorniotti, A. (2021, November). On the (in) security of

ElGamal in OpenPGP. In Proceedings of the 2021 ACM SIGSAC Conference on Computer

and Communications Security (pp. 2066-2080).

[ 21] Asri, R., Nasution, M. K., & Suherman, S. (2019, June). Modification of chipper text

Elgamal algorithm using split merge. In Journal of Physics: Conference Series (Vol. 1235,

No. 1, p. 012054). IOP Publishing.

[ 22] Sari, P. P., Nababan, E. B., & Zarlis, M. (2020, June). Comparative study of luc, elgamal

and RAS algorithms in encoding texts. In 2020 3rd International Conference on Mechanical,

Electronics, Computer, and Industrial Technology (MECnIT) (pp. 148-151). IEEE.

[ 23] Arboleda, E. R. (2019). Secure and fast chaotic Elgamal cryptosystem. Int. J. Eng. Adv.

Technol, 8(5), 1693-1699.

[ 24] Harjito, B., Setyowati, T., & Wijayanto, A. (2022). Comparative Analysis between

Elgamal and NTRU Algorithms and their implementation of Digital Signature for Electronic

Certificate. International journal of electrical and computer engineering systems, 13(9), 729-

[ 25] Ismail, E. G., CHAHBOUN, A., & RAISSOUNI, N. (2020). FERNET SYMMETRIC

ENCRYPTION METHOD to GATHER MQTT E2E SECURE COMMUNICATIONS for

IoT DEVICES.

[ 26] Prashanth, C., Teja, D. B. S., & Lavanya, V. (2022). Securing the Data in Cloud Using

Fernet Technique (No. 9237). EasyChair.

[ 27] Habibu, T., Luhanga, E. T., & Sam, A. E. (2019). Developing an algorithm for securing

the biometric data template in the database.

[ 28] Singh, A., Ikuesan, R. A., & Venter, H. (2022). Secure Storage Model for Digital Forensic

Readiness. IEEE Access, 10, 19469-19480.

[ 29] Gupta, I., & Singh, A. K. (2022). A Holistic View on Data Protection for Sharing,

Communicating, and Computing Environments: Taxonomy and Future Directions. arXiv

preprint arXiv:2202.11965.

[ 30] Patil, R. C., Kumar, A., Narmadha, T., Suganthi, M., Rao, A. V. S. R., & Rajesh, A.

(2022). Data Leakage Detection in Cloud Computing Environment Using Classification

Based on Deep Learning Architectures. International Journal of Intelligent Systems and

Applications in Engineering, 10(2s), 281-285.

[ 31] Verma, R., Gautam, V., Yadav, C. P., Gupta, I., & Singh, A. K. (2020, May). A Survey

on Data Leakage Detection and Prevention. In Proceedings of the International Conference on

Innovative Computing & Communications (ICICC).

[ 32] https://www.wordtemplatesonline.net/payment-receipt-templates/free e-commerce

form.

[ 33] Badotra, S., & Sundas, A. (2021). A systematic review on security of E-commerce systems.

International Journal of Applied Science and Engineering, 18(2), 1-19.

[ 34] Alqassab, A., & Hikmat Ismael, Y. (2022). EMV Electronic Payment System and its

Attacks: A Review. AL-Rafidain Journal of Computer Sciences and Mathematics, 16(1), 23-

[ 35] Xiao, Y., Zhou, C., Guo, X., Song, Y., & Chen, C. (2022). A Novel Decentralized ECommerce

Transaction System Based on Blockchain. Applied Sciences, 12(12), 5770.

[ 36] Kaushik, D., Gupta, A., & Gupta, S. (2020, May). E-commerce security challenges: A

review. In Proceedings of the international conference on innovative computing &

communications (ICICC).

[ 37] Liu, X., Ahmad, S. F., Anser, M. K., Ke, J., Irshad, M., Ul-Haq, J., & Abbas, S. (2022).

Cyber security threats: A never-ending challenge for e-commerce. Frontiers in psychology,

, 4863.

[ 38] Odunze, D. (2018). Cyber victimization by hackers: A criminological analysis. Public Policy

and Administration Research, 8(01), 08-15.

[ 39] Roy, S., Sharmin, N., Acosta, J. C., Kiekintveld, C., & Laszka, A. (2022). Survey and

taxonomy of adversarial reconnaissance techniques. ACM Computing Surveys, 55(6), 1-38.

[ 40] Weichbroth, P., Wereszko, K., Anacka, H., & Kowal, J. (2023). Security of

Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments.

Sensors, 23(6), 3155.

[ 41] Awan, I. A., Shiraz, M., Hashmi, M. U., Shaheen, Q., Akhtar, R., & Ditta, A. (2020).

Secure framework enhancing AES algorithm in cloud computing. Security and

communication networks, 2020, 1-16.

[ 42] Al-gohany, N. A., & Almotairi, S. (2019). Comparative study of database security in cloud

computing using AES and DES encryption algorithms. Journal of Information Security and

Cybercrimes Research, 2(1), 102-109.

[ 43] Devassy, N. (2023). Research Project Questions (Doctoral dissertation, Dublin, National

College of Ireland).

[ 44] SYLFANIA, D. Y., JUNIAWAN, F. P., & PRADANA, H. A. (2020, May). Blowfish–RSA

Comparison Analysis of the Encrypt Decrypt Process in Android-Based Email Application. In

Sriwijaya International Conference on Information Technology and Its Applications

(SICONIAN 2019) (pp. 113-119). Atlantis Press.

التنزيلات

منشور

2023-11-04