Open Access   Article Go Back

A Survey on Various Online Transaction, E-Commerce Security and Applications

Varsha Jotwani1 , Amit Dutta2

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-8 , Page no. 50-55, Aug-2015

Online published on Aug 31, 2015

Copyright © Varsha Jotwani , Amit Dutta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Varsha Jotwani , Amit Dutta, “A Survey on Various Online Transaction, E-Commerce Security and Applications,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.50-55, 2015.

MLA Style Citation: Varsha Jotwani , Amit Dutta "A Survey on Various Online Transaction, E-Commerce Security and Applications." International Journal of Computer Sciences and Engineering 3.8 (2015): 50-55.

APA Style Citation: Varsha Jotwani , Amit Dutta, (2015). A Survey on Various Online Transaction, E-Commerce Security and Applications. International Journal of Computer Sciences and Engineering, 3(8), 50-55.

BibTex Style Citation:
@article{Jotwani_2015,
author = {Varsha Jotwani , Amit Dutta},
title = {A Survey on Various Online Transaction, E-Commerce Security and Applications},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {50-55},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=607},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=607
TI - A Survey on Various Online Transaction, E-Commerce Security and Applications
T2 - International Journal of Computer Sciences and Engineering
AU - Varsha Jotwani , Amit Dutta
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 50-55
IS - 8
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2819 2544 downloads 2405 downloads
  
  
           

Abstract

While the usage of ecommerce application, information and communication technology enhances in private and professional existence, personal data is extensively stored. While service providers require relying on recognizing their consumers, aware characteristics administration and privacy increases into a new assessment for the service user, particularly in the electronic service circumstance. At this time, recent technology infrastructures can support in on condition that security to both sides by assuring identification and privacy at the same time.

Key-Words / Index Term

Trusted Platform Module,Trusted Computing Group,Security,Security

References

[1] Trusted Computing Group: TCG TPM specification version 1.2. (TCG Specification).
[2] Brickell, E. F., Camenisch, J., and Chen, L. Direct Anonymous Attestation. In 11th ACM Conference on Computer and Communications Security (CCS 2004) (2004), V. Atluri, B. Pfitzmann, and P. D. McDaniel, Eds., ACM, pp. 132–145.
[3] Camenisch, J. Better Privacy for Trusted Computing Platforms: (Extended Abstract). In 9th European Symposium on Research In Computer Security (ESORICS 2004) (2004), P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, Eds., vol. 3193 of Lecture Notes in Computer Science, Springer, pp. 73–88.
[4] Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. Design and Implementation of a TCG-based Integrity Measurement Architecture. In 13th USENIX Security Symposium (2004), USENIX, pp. 223–238.
[5] A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure overlay services. In Proceedings of ACM SIGCOMM, 2002.
[6] TCG (2008) TPM Spezifikationen der Trusted Computing Group [Specifications of the Trusted Computing Group], https://www.trustedcomputinggroup.org/specs/TPM,.
[7] European Multilaterally Secure Computing Base (EMSCB) (2008) Turaja Technology, http://www.emscb.de/content/pages/About-Turaya-de.htm,.
[8] ARM (2008) ARM processor architecture, security extension ARM Trust Zone technology, http://www.arm.com/products/esd/trustzone_home.html, .
[9] Rankl, W.; Effing, W. (2002) Handbuch der Chipkarten, 4th edition, Munich, Carl Hanser Verlag.
[10] Swoboda, J., Spitz, S., Pramateftakis, M. (2008) Kryptographie und IT Sicherheit, Wiesbaden, Vieweg-Teubner, ISBN 978-3-8348-0248-4.
[11] InspireD (2005) D6 Communication Architecture Definition (Draft), forthcoming on http://www.inspiredproject.com,.
[12] Trusted Computing Group. http://www.trustedcomputinggroup.org/ (05 April 2010).
[13] Ekberg, J.-E., and Kylänpää, M. Mobile Trusted Module (MTM) – an introduction, Nov. 2007. http://research.nokia.com/files/NRCTR2007015.pdf.
[14] D. Challener, K. Yoder, F. Catherman, D. Saord, and L. V. Coorn. A Practical Guide to Trusted Computing. Pearson plc IBM press, 2008. ISBN-13: 978-0-13-239842-8.
[15] http://www.ecommerce-digest.com/7_8.html. (Accessed 23 Sept 2013).
[16] Christoph Kern, Anita Kesavan, and NeilDaswani, Foundations of Security: What Every Programmer Needs to Know.
[17] Raghav Gautam, Sukhwinder Singh, “Network Security Issues in e-Commerce” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
[18] Ashish Kr. Luhach, Dr. Sanjay K. Dwivedi, Dr. C. K. Jha. “Designing A Logical Security Framework For E-Commerce System Based On SOA” International Journal on Soft Computing (IJSC) Vol. 5, No. 2, May 2014.
[19] Khandare Nikhil B., “Transaction Security for Internet E-commerce Application” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015.
[20] Ankur Chaudhary, Khaleel Ahmad, M.A. Rizvi, “E-commerce Security Through Asymmetric Key Algorithm” Fourth International Conference on Communication Systems and Network Technologies, 2014.
[21] Thembekile O. Mayayise, Isaac O. Osunmakinde, “A Compliant Assurance Model for Assessing the Trustworthiness of Cloud-based E-Commerce Systems” 2014.
[22] Luca Mazzola, Aris Tsois, Tatyana Dimitrova, and Elena Camossi, “Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification” European Intelligence and Security Informatics Conference, 2013.