Abstract
Electronic commerce is the buying and selling of goods and services, or the funds transfer between independent organizations and/or persons over an electronic wireless network, primarily the Internet. It focuses on the use of ICT to enable the external activities and relationship among the business and individuals, groups and other business. These business transactions occur in many formats such as business-to-business, business-to-consumer, consumer-to-consumer or consumer-to-business. It is the one type of trading in products or services using wireless networks like Internet or online social media networks etc. Here the computers, telephones, fax machines, barcode readers, credit cards, debit cards, ATM etc. are used for conducting business in e-commerce system. E-commerce includes the activities such as order entry, transaction processing, online payment, authentication, order fulfillment, inventory control, shipment, and customer support. At present most of the people are participating in e-commerce. In E-commerce system privacy and security of user’s information is the most crucial issue at present. Electronic record related to organization or person is sensitive in nature so, it is very significant to impose an advanced security protocol, technical solutions in the system. E-commerce security is the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. In this paper we have focused on security issue like technical safeguards for e-commerce. Our technique proposes an LFSR, pell’s method and Linear congruence based security model for data security in e-commerce. Here two types of keys i.e., intermediate key, session key are used for encryption-decryption and authentication purpose. This new approach of key generation provides extra robustness in our technique. The different types of experiments on this technique and their results conforms that our technique is very secure and efficient for e-business, e-commerce.
Similar content being viewed by others
References
Yasin, S., & Haseeb, K. (2012). Cryptography based e-commerce security: A review. IJCSI, 9(2), 132.
Biswajit Tripathy, B., & Mishra, J. (2013). Protective measures in ecommerce to deal with security threats arising out of social issues—A framework. IAEME, 4(1), 12–24.
Kaushik, D., Gupta, A., & Gupta, S. (2020). E-commerce security challenges: A review. In Proceedings of the international conference on innovative computing & communications (ICICC) 2020. SSRN: https://ssrn.com/abstract=3595304 or https://doi.org/10.2139/ssrn.3595304.
Niranjanamurthy, M., Kavyashree, N., & Jagannath, S. (2012). Mcommerce: Security challenges issues and recommended secure payment method. IJMIE, 2(8), 374–393.
Das, A., & Veni Madhavan, C. E. (2004). Public-key cryptography: Theory and practice. Pearson Education.
Stallings, W. (2003). Cryptography and network security: Principles and practice. (3rd ed.). Prentice Hall.
Kahate, A. (2008). Cryptography and network security. New Delhi: Tata McGraw-Hill Publishing Company.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In J. Kilian (Ed.), CRYPTO2001. (Vol. 2139, pp. 213–229). Heidelberg: Springer.
Oladipupo, E. T., & Alade, O. A. (2014). An approach to improve data security using modified XOR encryption algorithm. International Journal of Core Research in Communication Engineering, 1(2), 1834–1838.
Agrawal, A., Gorbunov, S., Vaikuntanathan, V., & Wee, H. (2013). Functional encryption: New perspectives and lower bounds. In R. Canetti & J. A. Garay (Eds.), CRYPTO 2013, Part II. (Vol. 8043, pp. 500–518). Heidelberg: Springer.
Stinson, D. (2006). Cryptography: Theory and practice. (3rd ed.). Chapman & Hall.
Chaudhry, S. A., et al. (2017). An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications, 10(1), 1–15.
Deb, S., Bhuyan, B., Gupta, N. C. (2018). Design and analysis of LFSR-based stream cipher. In: J. Mandal, G. Saha, D. Kandar, A. Maji (Eds.) Proceedings of the international conference on computing and communication systems. Lecture notes in networks and systems, vol. 24. Springer, Singapore. https://doi.org/10.1007/978-981-10-6890-4_6.
Wu, G., et al. (2018). A lightweight and efficient encryption scheme based on LFSR. International Journal of Embedded System, 10(3), 225–232.
Chakravorty, J. G., & Ghosh, P. R. (2018). Advanced higher algebra. U.N.Dhur and Sons Private Ltd.
Shockley, J. E. (1967). Introduction to number theory. New York: Holt, Rinehart and Winston.
Sangeetha, M. K., & Suchitra, R. (2016). The study of e-commerce security issues and solutions. International Journal of Engineering Research & Technology (IJERT) NCRIT, 4(27), 2885–2895.
Ghansela, S. (2013). Network security: Attacks, tools and techniques. IJARCSSE, 3(6), 419–421.
Alladi, T., Chamola, V., Parizi, R. M., & Choo, K. R. (2019). Blockchain applications for industry 4.0 and industrial IoT: A review. IEEE Access, 7, 176935–176951. https://doi.org/10.1109/ACCESS.2019.2956748.
Abomhara, M., & Køien, G. M. (2014) Security and privacy in the internet of things: Current status and open issues. In International conference on privacy and security in mobile systems (PRISMS) (pp. 1–8). IEEE.
Fu, C., Zhang, G.-Y., Zhu, M., Chen, Z., & Lei, W.-M. (2018). A new chaos-based color image encryption scheme with an efficient substitution key stream generation strategy. Security and Communication Networks. https://doi.org/10.1155/2018/2708532.
Harmouch, Y. (2018). A chaotic key stream generation for stream cipher. In LOPAL '18: Proceedings of the international conference on learning and optimization algorithms: Theory and applications May 2018 Article No.: 14 (pp. 1–6). https://doi.org/10.1145/3230905.3230942.
Sreelaja, N. K., & Pai, G. A. V. (2009). Design of stream cipher for text encryption using particle swarm optimization based key generation. Journal of Information Assurance and Security, 2, 30–41.
Dijesh, P., Babu, S. S., & Vijayalakshmi, Y. (2020). Enhancement of e-commerce security through asymmetric key algorithm. Computer Communications, 153, 125–134. https://doi.org/10.1016/j.comcom.2020.01.033.
Ahmad, K., & Alam, M. S. (2016). E-commerce security through elliptic curve cryptography. Procedia Computer Science, 78, 867–873. https://doi.org/10.1016/j.procs.2016.05.549.
Hassan, Md., Shukur, Z., & Hasan, M. (2020). An efficient secure electronic payment system for e-commerce. Computers, 9, 13. https://doi.org/10.3390/computers9030066.
Oo, K. Z. (2019). Design and implementation of electronic payment gateway for secure online payment system. International Journal of Trend in Scientific Research and Development IJTSRD, 3(5), 1329–1334.
Kumar, V. (2015). Ontology based public healthcare system in Internet of Things (IoT). Procedia Computer Science, 50, 99–102. https://doi.org/10.1016/j.procs.2015.04.067.
Zaidan, B., Zaidan, A., Al-Frajat, A., & Jalab, H. (2010). On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences, 10, 1650–1655.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the Internet of things. In 2015 IEEE World Congress on Services (SERVICES) (pp. 21–28). IEEE.
Kak, A. (2015). Lecture notes on computer and network security. Purdue University.
Maia, P., Batista, T., Cavalcante, E., Baffa, A., Delicato, F. C., Pires, P. F., & Zomaya, A. (2014). A web platform for interconnecting body sensors and improving health care. Procedia Computer Science, 40, 135–142. https://doi.org/10.1016/j.procs.2014.10.041.
Joshi, C., & Singh, U. K. (2015). A review on taxonomies of attacks and vulnerability in computer and network system. International Journal of Advanced Research in Computer Science and Software Engineering (IJRCSSE), 5(1), 742–747.
Olivier, F., Carlos, G., & Florent, N. (2015). New security architecture for IoT network. Procedia Computer Science, 52, 1028–1033. https://doi.org/10.1016/j.procs.2015.05.099.
Liang, W., Tang, M., Long, J., Peng, X., Xu, J., & Li, K. (2019). A secure FaBric Blockchain-based data transmission technique for industrial Internet-of-Things. IEEE Transactions on Industrial Informatics, 15(6), 3582–3592. https://doi.org/10.1109/TII.2019.2907092.
Ajiniyazovna, S. (2020). Implementation of E-commerce security methods and tools. International Journal of Emerging Trends in Engineering Research, 8, 1545–1551. https://doi.org/10.30534/ijeter/2020/12852020.
Chuang, M.-C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 34–50.
Hwang, Y. H. (2015). Iot security & privacy: Threats and challenges. In Proceedings of the 1st ACM workshop on IoT privacy, trust and security (pp. 1–1). ACM.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Bhowmik, A., Karforma, S. Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce. Electron Commer Res 22, 1–21 (2022). https://doi.org/10.1007/s10660-021-09477-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10660-021-09477-w