Smart city-based e-commerce security technology with improvement of SET network protocol

Abstract In this paper, we proposed an improvement of SET protocol for E-commerce transaction. We study the security technology and protocol flow of set protocol, and point out the shortcomings of SET protocol. Due to the lack of security and low scalability of the current protocol, this paper proposes a server e-wallet strategy, which divides the original client into e-wallet client and e-wallet server, and enhances the convenience and security of the transaction by transferring the client to the issuer or the third-party financial institution, while the scalability is stronger. In order to ensure the atomicity of goods and confirm the atomicity of delivery, this paper proposes a secure e-commerce payment protocol based on the fourth party, which includes master protocol, customer return protocol, customer exchange protocol and customer merchant transaction dispute resolution protocol. According to the efficiency of SET protocol, a security hierarchical control model is proposed, which can select different security levels to operate according to the actual needs of customers, and the principle and implementation of the model are analyzed.

[1]  Sylvanus A. Ehikioya,et al.  A Formal Model of Distributed Security for Electronic Commerce Transactions Systems , 2019, Int. J. Networked Distributed Comput..

[2]  Ren-Junn Hwang,et al.  Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce , 2015, Symmetry.

[3]  Junlong Zhu,et al.  ACCP: adaptive congestion control protocol in named data networking based on deep learning , 2019, Neural Computing and Applications.

[4]  Anirban Pathak,et al.  Quantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerce , 2018, Quantum Information Processing.

[5]  Abdul Halim Barkatullah,et al.  Does self-regulation provide legal protection and security to e-commerce consumers? , 2018, Electron. Commer. Res. Appl..

[6]  Linzhu Hu,et al.  E-commerce Trade Consumption Payment Security and Privacy Based on Improved B2C Model , 2019, Int. J. Netw. Secur..

[7]  Rahul Katarya,et al.  Recommender system with grey wolf optimizer and FCM , 2016, Neural Computing and Applications.

[8]  Yomi Kastro,et al.  Real-time prediction of online shoppers’ purchasing intention using multilayer perceptron and LSTM recurrent neural networks , 2019, Neural Computing and Applications.

[9]  Özgür Kafali,et al.  Pirasa: strategic protocol selection for e-commerce agents , 2018, Electronic Markets.

[10]  Habib Ullah Khan,et al.  Violators versus non-violators of information security measures in organizations—A study of distinguishing factors , 2019, J. Organ. Comput. Electron. Commer..