eISSN:2278-5299

International Journal of Latest Research in Science and Technology

DOI:10.29111/ijlrst   ISRA Impact Factor:3.35

A News Letter Sign UP!
E-COMERCE SECURE TRANSFER BASED ON EMBEDDED DSP

Research Paper Open Access

International Journal of Latest Research in Science and Technology Vol.2 Issue 2, pp 124-128,Year 2013

E-COMERCE SECURE TRANSFER BASED ON EMBEDDED DSP

Farah Hanna Zawaideh

Correspondence should be addressed to :

Received : 29 March 2013; Accepted : 25 April 2013 ; Published : 30 April 2013

Share
Download 125
View 180
Article No. 10176
Abstract

The e-commerce is a very critical issue in information transfer because of the money is the manipulated variable. The criticality, danger, and higher priority importance of any e-commerce transfer makes it to be hot area of interest in modern computer science and informatics. The security of e-commerce transfer is an issue of computer system and informatics rather that the issue of administration. One key element that provides higher security for modern e-commerce systems is the cryptography. The cryptography is commonly known that software-based encryption has built-in security weaknesses due to storing and managing digital certificates/keys in a high-risk environment such as a local hard disk or software. The cryptography methodologies are based on complex mathematical formulation, calculus, and non-linear algebraic math. Which leads to use an embedded hardware in order to encrypt the required message and thus, makes it more reliable, and more ease to implement. In fact, the embedded encryptor represents a superior solution. Actually, the most of used embedded hardware encryption modules requires additional software to module and achieve the secure e-commerce application. Thus, it increases the cost and doubles the systems complexity. This paper, contributes new embedded encryptor based on DSP to build a rigid cryptography module. The contributed algorithm is based on RSA encryption algorithm. It is implemented and adapted to provide trusted security level on any transaction of e-commerce with respect to client, and administration. This research integrates the DSP based embedded encryption to build a module that combines both, programming flexibility and computational power. It targets the common web browsers those are commonly used in e-commerce applications. This integrated system is intended to process and store the e-commerce transactions in sensitive data inside the hardware that is used to be plugged inside the computer. This paper increases the security strength and limits the overhead by adapting the common available web browsers, thus, completing the transactions applications that required in high efficiency. The web with full functionality of e-commerce is a system that developed to measure the validity of the contributed system and algorithm. The contribution of this paper is to perform an RSA encryption that is pluggable to the computer, and it is capable to encrypt and store the critical e-commerce transitioned, it is also based on common web browsers.

Key Words   
Encryption, RSA, Security, E-Commerce, DSP, Web Browsing
Copyright
References
  1. Hu J. Mobile fingerprint template protection: progress and open issues. IEEE ICIEA Conference, Singapore, 3 - 5 June, 2008.
  2. Hoang XD, Hu J, Bertok P. A program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. Journal of Network and Computer Applications 2009; 32: 1219--1228.
  3. Hu J, Bertok P, Tari Z. Taxonomy and framework for integrating dependability and security. Chapter 6 Part II: Modelling the Interaction between Dependability and Security. In Information Assurance: Dependability and Security in Networked Systems, Qian Y, Joshi J, Tipper D, Kirshanamurthy P (eds). Elsevier, The Netherlands, 2008; 149--170. ISBN: 978-0-12-373566-9.
  4. Hu J, Qiu D, Chen HH, Yu X. A simple and efficient data processing scheme for HMM based anomaly intrusion detection. Special Issue of Advances on Network Intrusion Detection. IEEE Network 2009; 23(1): 42--47.
  5. Wang Y, Hu J, Philip D. A fingerprint orientation model based on 2D Fourier Expansion (FOMFE) and its application to singular-point detection and fingerprint Indexing. Special Issue on Biometrics: Progress and Directions, IEEE Transactions on Pattern Analysis and Machine Intelligence, April 2007.
  6. Izumi M, Sakiyama K, Ohta K. A new approach for implementing the MPL method toward higher SPA resistance. International Conference on Availability, Reliability and Security (ARES ’09),March 16--19, 2009, pp. 181--186.
  7. Han F, Hu J, Yu X, Feng Y, Zhou J. A novel hybrid crypto-biometric authentication scheme for ATM based banking applications. IAPR International Conference on Biometrics (ICB2006), 5--7 January, 2006, Hong Kong China. Published at Lecture Notes in Computer Science, Springer, 2005, 3832, pp. 675--681.
  8. 14. Kim CH, Oh S, Lim L. A new hardware architecture for operations in GF (2n). Transactions IEEE Computers 2002, 51(1): 90--92.
  9. 19. Hu J, Xi Z, Jennings A, Lee HYJ, Wahyudi D. DSP application in e-commerce security. Processing of IEEE International Conference on Acoustics, Speech, and Signal, 2, 2001, pp. 1005--1008.
  10. Han F, Hu J, Yu X. A biometric encryption approach incorporating fingerprint indexing in key generation. International Conference on Intelligence Computing (ICIC06), Kunming, China, 2006. Published at Computational Intelligence and Bioinformatics, Lecture Notes in Computer Science, Springer, 0302--9743, 4115, 2006, pp. 342--251.
  11. 21. Hoang XD. E-Commerce Security Enhancement and Anomaly Intrusion Detection using Machine Learning Techniques. PhD thesis, 2006, RMIT.
To cite this article

Farah Hanna Zawaideh , " E-comerce Secure Transfer Based On Embedded Dsp ", International Journal of Latest Research in Science and Technology . Vol. 2, Issue 2, pp 124-128 , 2013


Responsive image

MNK Publication was founded in 2012 to upholder revolutionary ideas that would advance the research and practice of business and management. Today, we comply with to advance fresh thinking in latest scientific fields where we think we can make a real difference and growth now also including medical and social care, education,management and engineering.

Responsive image

We offers several opportunities for partnership and tie-up with individual, corporate and organizational level. We are working on the open access platform. Editors, authors, readers, librarians and conference organizer can work together. We are giving open opportunities to all. Our team is always willing to work and collaborate to promote open access publication.

Responsive image

Our Journals provide one of the strongest International open access platform for research communities. Our conference proceeding services provide conference organizers a privileged platform for publishing extended conference papers as journal publications. It is deliberated to disseminate scientific research and to establish long term International collaborations and partnerships with academic communities and conference organizers.