A Survey on Various Online Transaction, E-Commerce Security and Applications
Varsha Jotwani1 , Amit Dutta2
Section:Survey Paper, Product Type: Journal Paper
Volume-3 ,
Issue-8 , Page no. 50-55, Aug-2015
Online published on Aug 31, 2015
Copyright © Varsha Jotwani , Amit Dutta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Varsha Jotwani , Amit Dutta, “A Survey on Various Online Transaction, E-Commerce Security and Applications,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.50-55, 2015.
MLA Citation
MLA Style Citation: Varsha Jotwani , Amit Dutta "A Survey on Various Online Transaction, E-Commerce Security and Applications." International Journal of Computer Sciences and Engineering 3.8 (2015): 50-55.
APA Citation
APA Style Citation: Varsha Jotwani , Amit Dutta, (2015). A Survey on Various Online Transaction, E-Commerce Security and Applications. International Journal of Computer Sciences and Engineering, 3(8), 50-55.
BibTex Citation
BibTex Style Citation:
@article{Jotwani_2015,
author = {Varsha Jotwani , Amit Dutta},
title = {A Survey on Various Online Transaction, E-Commerce Security and Applications},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {50-55},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=607},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=607
TI - A Survey on Various Online Transaction, E-Commerce Security and Applications
T2 - International Journal of Computer Sciences and Engineering
AU - Varsha Jotwani , Amit Dutta
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 50-55
IS - 8
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2917 | 2763 downloads | 2555 downloads |




Abstract
While the usage of ecommerce application, information and communication technology enhances in private and professional existence, personal data is extensively stored. While service providers require relying on recognizing their consumers, aware characteristics administration and privacy increases into a new assessment for the service user, particularly in the electronic service circumstance. At this time, recent technology infrastructures can support in on condition that security to both sides by assuring identification and privacy at the same time.
Key-Words / Index Term
Trusted Platform Module,Trusted Computing Group,Security,Security
References
[1] Trusted Computing Group: TCG TPM specification version 1.2. (TCG Specification).
[2] Brickell, E. F., Camenisch, J., and Chen, L. Direct Anonymous Attestation. In 11th ACM Conference on Computer and Communications Security (CCS 2004) (2004), V. Atluri, B. Pfitzmann, and P. D. McDaniel, Eds., ACM, pp. 132–145.
[3] Camenisch, J. Better Privacy for Trusted Computing Platforms: (Extended Abstract). In 9th European Symposium on Research In Computer Security (ESORICS 2004) (2004), P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, Eds., vol. 3193 of Lecture Notes in Computer Science, Springer, pp. 73–88.
[4] Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. Design and Implementation of a TCG-based Integrity Measurement Architecture. In 13th USENIX Security Symposium (2004), USENIX, pp. 223–238.
[5] A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure overlay services. In Proceedings of ACM SIGCOMM, 2002.
[6] TCG (2008) TPM Spezifikationen der Trusted Computing Group [Specifications of the Trusted Computing Group], https://www.trustedcomputinggroup.org/specs/TPM,.
[7] European Multilaterally Secure Computing Base (EMSCB) (2008) Turaja Technology, http://www.emscb.de/content/pages/About-Turaya-de.htm,.
[8] ARM (2008) ARM processor architecture, security extension ARM Trust Zone technology, http://www.arm.com/products/esd/trustzone_home.html, .
[9] Rankl, W.; Effing, W. (2002) Handbuch der Chipkarten, 4th edition, Munich, Carl Hanser Verlag.
[10] Swoboda, J., Spitz, S., Pramateftakis, M. (2008) Kryptographie und IT Sicherheit, Wiesbaden, Vieweg-Teubner, ISBN 978-3-8348-0248-4.
[11] InspireD (2005) D6 Communication Architecture Definition (Draft), forthcoming on http://www.inspiredproject.com,.
[12] Trusted Computing Group. http://www.trustedcomputinggroup.org/ (05 April 2010).
[13] Ekberg, J.-E., and Kylänpää, M. Mobile Trusted Module (MTM) – an introduction, Nov. 2007. http://research.nokia.com/files/NRCTR2007015.pdf.
[14] D. Challener, K. Yoder, F. Catherman, D. Saord, and L. V. Coorn. A Practical Guide to Trusted Computing. Pearson plc IBM press, 2008. ISBN-13: 978-0-13-239842-8.
[15] http://www.ecommerce-digest.com/7_8.html. (Accessed 23 Sept 2013).
[16] Christoph Kern, Anita Kesavan, and NeilDaswani, Foundations of Security: What Every Programmer Needs to Know.
[17] Raghav Gautam, Sukhwinder Singh, “Network Security Issues in e-Commerce” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
[18] Ashish Kr. Luhach, Dr. Sanjay K. Dwivedi, Dr. C. K. Jha. “Designing A Logical Security Framework For E-Commerce System Based On SOA” International Journal on Soft Computing (IJSC) Vol. 5, No. 2, May 2014.
[19] Khandare Nikhil B., “Transaction Security for Internet E-commerce Application” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015.
[20] Ankur Chaudhary, Khaleel Ahmad, M.A. Rizvi, “E-commerce Security Through Asymmetric Key Algorithm” Fourth International Conference on Communication Systems and Network Technologies, 2014.
[21] Thembekile O. Mayayise, Isaac O. Osunmakinde, “A Compliant Assurance Model for Assessing the Trustworthiness of Cloud-based E-Commerce Systems” 2014.
[22] Luca Mazzola, Aris Tsois, Tatyana Dimitrova, and Elena Camossi, “Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification” European Intelligence and Security Informatics Conference, 2013.