E-commerce Trade Consumption Payment Security and Privacy Based on Improved B2C Model

With the popularity of the Internet and smart phones, ecommerce based on the Internet has rapidly developed by relying on its particular merits. However, the openness of the Internet makes payment security and privacy protection become the key of e-commerce development. This study gave a brief introduction of both traditional and improved Business to Customer (B2C) e-commerce and preformed the analogue simulation on shift left long (SLL) security protocol based on double encryption algorithm and traditional encryption algorithm under different sizes of data. The result showed that the double encryption algorithm could has lower complexity for encrypting and decrypting data, enabling to shorten the time of the encryption and decryption of the data; in terms of security, the decryption integrity of the data that was encrypted by double encryption algorithm was lower, and was basically garbled without logic. Thus, the security is guaranteed. In conclusion, the third-party privacy server in the improved B2C model can effectively guarantee the payment and privacy security of consumers.

[1]  Steven E. Kaplan,et al.  A Web assurance services model of trust for B2C e-commerce , 2003, Int. J. Account. Inf. Syst..

[2]  Mahadi Bahari,et al.  Business-to-customer (B2C) Electronic Commerce: An implementation process view , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).

[3]  Cheng-Chi Lee,et al.  Traceability on Low-Computation Partially Blind Signatures for Electronic Cash , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[4]  E. Huang,et al.  Assessing customer retention in B2C electronic commerce: an empirical study , 2016 .

[5]  Min-Shiang Hwang,et al.  Improved on Date Attachable Electronic Cash , 2013 .

[6]  Steven Walczak,et al.  Personality Type Effects on Perceptions of Online Credit Card Payment Services , 2016, J. Theor. Appl. Electron. Commer. Res..

[7]  Banshidhar Majhi,et al.  Design of electronic payment system based on authenticated key exchange , 2018, Electron. Commer. Res..

[8]  Min-Shiang Hwang,et al.  A Study of Micro-payment Based on One-way Hash Chain , 2006, Int. J. Netw. Secur..

[9]  Min-Shiang Hwang,et al.  A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[10]  Xin Wang,et al.  Study on the Function of Computer Technology in the Electronic Commerce Environment Security and Risk Assessment , 2015, 2015 International Conference on Intelligent Transportation, Big Data and Smart City.

[11]  Xingtong Liu,et al.  Security Analysis of Electronic Payment Protocols Based on Quantum Cryptography , 2017, 2017 4th International Conference on Information Science and Control Engineering (ICISCE).

[12]  Minjoon Jun,et al.  Customer-perceived value and loyalty: how do key service quality dimensions matter in the context of B2C e-commerce? , 2015, Service Business.

[13]  K. Saraç,et al.  PPEP: A Deployable Privacy Preserving E-Commerce Protocol for Electronic Goods , 2016 .

[14]  Kanwal Daud Gill,et al.  Centralized collaborative reputation model for B2C E-Commerce , 2014, 17th IEEE International Multi Topic Conference 2014.

[15]  Chin-Chen Chang,et al.  The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain , 2005, Des. Codes Cryptogr..

[16]  Min-Shiang Hwang,et al.  An Authentication Protocol for Lightweight NFC Mobile Sensors Payment , 2016, Informatica.

[17]  L. G. Pee,et al.  Customer co-creation in B2C e-commerce: does it lead to better new products? , 2016, Electronic Commerce Research.

[18]  Muhammad Sher,et al.  A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography , 2016, Electron. Commer. Res..

[19]  Dragan Gasevic,et al.  FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions , 2015, Comput. J..