Documente Academic
Documente Profesional
Documente Cultură
net/publication/266483717
CITATIONS READS
12 925
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Rashid Jalal Qureshi on 20 August 2015.
2
Faculty of Physical and Numerical Sciences, Computer Science Department Islamia College (Chartered University)
Peshawar, Pakistan
3
Faculty of Physical and Numerical Sciences, Computer Science Department Islamia College (Chartered University)
Peshawar, Pakistan
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012
ISSN (Online): 1694-0814
www.IJCSI.org 133
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012
ISSN (Online): 1694-0814
www.IJCSI.org 134
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012
ISSN (Online): 1694-0814
www.IJCSI.org 135
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012
ISSN (Online): 1694-0814
www.IJCSI.org 136
5. CONCLUSION
Information security has become a very critical
aspect of modern communication system. Privacy,
integrity, confidentiality and non repudiation are
main security dimension to protect E-commerce
transactions against threats. These objectives are
achieved by Cryptography functions and techniques.
Fig 5: Merchant Certificate Schema When customers and merchants perform a
transaction over Internet, the protection of
information against security threats is a major issue.
Table 3: SEP Steps
During sending the sensitive information, the data
i. EKU (Auth) [IDA, ReqA, Time, KUA, NA]
must be protected from unauthorized access to
ii. EKU (Auth) [IDB, Time, KUB, NA] maintain its privacy and integrity. In this research
paper different approaches has presented that
iii. CA=EKR (Auth) [IDA, ReqA ,Time, KUA, NA] increases the level of security dimensions using
cryptographic techniques.
iv. CB=EKR (Auth) [IDB, Time, KUB, NB]
v. TA→M
6. REFERENCES
vi. TB →C
[1] Thomas L. Mesenbourg, “An Introduction to
vii. Eku (B) [N1, EKR (A) [IDA, Time, NA]]
E-commerce”, Philippines: DAI-AGILE, 2000
viii. Eku (A) [N2, EKR (B) [IDB, Time, NB]] [2] William Stallings, “Cryptography and Network
Security”, 3rd edition, Prentice
ix. Eku (B) [EKR (A) [N2]] [3] Khalid Haseeb, Dr. Muhammad Arshad, Shoukat ali
and Dr. Shazia Yasin “ Secure E-commerce Protocol”,
International Journal of Computer Science and Security
Secure E-commerce Protocol[3] provides security (IJCSS), Vol. 5 No. 1, pp.742-751, April 2011
against Authentication , Confidentiality , Integrity, [4]D. Berlin, "Information SecurityPerspective on
Non Repudiation ,Replay attack and man in the Intranet," presented at Internet and E-Commerce
middle attack. Infrastructure, 2007.
[5] S. R. S. KESH, AND S. NERUR, "A Framework for
Table 4: SEP Notations Analyzing E-Commerce Security," Information
Notation Description Management and Computer Security, vol. 10, no. 4, no. pp.
CIA Certificate Issue 149-158.
[6] Schmid.B,“Elecktronische Markte“. p 465-480. 1993
Authority
[7] Joel Weise, “Public Key Infrastructure”, SunPSSM
CA, CB Certificate issue to user Global Security Practice Sun BluePrints™ OnLine August
A 2001
N1, N2 Nonce generated by user [8] QIN Zhiguang, LUO Xucheng, GAO Rong, “ A survey
A of E-commerce Security”, School of Management,
Time Time Stamp University of Electronic Science and Technology of China
IDA, IDB Identity of user A and B Chengdu, Journal of Electronic Science and Technology of
China Vol.2 No.3, Sept 2004
EKR(A), EKR(B), EKU(A), Encryption using
[9] Abdullah M. Jaafar and Azman Samsudin, A New
EKU(B) private/public keys of Public-Key Encryption Scheme Based on Non-Expansion
user A and B [10]P. C. O. A.J Menezes, and S.A. Vanstone, Handbook
of Applied Cryptography: CRC Press, 1996.
[11] An Introduction to Cryptography (found in the
4. FUTURE WORK documentation of PGP® Desktop 8.1). Page 17. June
2004.
Information security is a burning issue in research [12] Jagdev Singh Kaleka, “E-Commerce: Authentication
community. Pretty good privacy can be used to & Security on Internet”, Deptt. of Technical Education and
provide authentication and confidentiality to Industrial Training, Govt. of Punjab
[13] Cetin K. Koc, "Next Generation E-Commerce
E-commerce security but it is not a fool proof
Security" Information Security Laboratory December 2,
solution because integrity, Non repudiation and 1999
replay threats are also important E-commerce
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012
ISSN (Online): 1694-0814
www.IJCSI.org 137