E-COMMERCE SECURITY WITH SECURE ELECTRONIC TRANSACTION PROTOCOL : A SURVEY AND IMPLEMENTATION

This paper tells about electronic transaction on ecommerce website using Secure Electronic Transaction (SET) protocol. SET is a very comprehensive security protocol, which utilizes cryptography to provide confidentiality of information, ensure payment integrity, and enable identity authentication. It relies on cryptography, digital certificate and authentication by SMS to ensure message confidentiality and security. First the report introduces about ecommerce websites and how to build it. It then explains how SET works and the components involved in it. Then the report gives out a design and implementation of this protocol.

[1]  Supakorn Kungpisdan,et al.  A practical framework for mobile set payment , 2003 .

[2]  Heiko Schuldt,et al.  Automatic generation of reliable e-commerce payment processes , 2000, Proceedings of the First International Conference on Web Information Systems Engineering.

[3]  Aifeng Sun Optimization Study for Lightweight Set Protocol , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.

[4]  Lawrence C. Paulson Verifying the SET Protocol: Overview , 2002, FASec.

[5]  Xiuhua Liu,et al.  The Study on E-commerce Security Based on ECC and SET , 2011, 2011 Third International Conference on Communications and Mobile Computing.

[6]  Joseph G. Tront,et al.  E-commerce security issues , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[7]  Sujeet Shenoi,et al.  Formal analysis of e-commerce protocols , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.

[8]  Dieter Gollmann E-commerce security , 2000 .

[9]  Fabio Massacci,et al.  Verifying the SET registration protocols , 2003, IEEE J. Sel. Areas Commun..

[10]  Godwin J. Udo,et al.  Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..

[11]  Wan Liang,et al.  Formalizing and Checking SET Protocol Based on TLA , 2010, 2010 International Conference on E-Product E-Service and E-Entertainment.

[12]  Shao-ping Chen Study on a Safe and Efficient Payment Model in E-Commerce , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.

[13]  Catherine A. Meadows,et al.  A Formal Specification of Requirements for Payment Transactions in the SET Protocol , 1998, Financial Cryptography.

[14]  Shiyong Lu,et al.  Model checking the secure electronic transaction (SET) protocol , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[15]  Chin-Ming Hsu,et al.  An online fraud-resistant technology for credit card E-transactions , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[16]  Kwangjo Kim,et al.  Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme , 1999, ICISC.

[17]  Zhibing Zhang E-Commerce Based Agents over P2P Network , 2008, 2008 International Conference on Management of e-Commerce and e-Government.

[18]  Zhihua Hu The Study of E-Commerce Security Protocol , 2011, 2011 International Conference on Intelligence Science and Information Engineering.

[19]  Jin-Young Choi,et al.  Analyzing the Application of E-Commerce inWireless Network , 2005, Second IEEE International Workshop on Mobile Commerce and Services.

[20]  Mohamed Kouta,et al.  Modified SET protocol for mobile payment: An empirical analysis , 2010, 2010 2nd International Conference on Software Technology and Engineering.

[21]  Linlin Wang,et al.  Key Technologies for Security Enhancing of Payment Gateway , 2008, 2008 International Symposium on Electronic Commerce and Security.

[22]  M. Carmen Ruiz,et al.  A formal specification and performance evaluation of the purchase phase in the SET protocol , 2005, Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05).

[23]  Xuan Zhang,et al.  Implementation of a Suggested E-commerce Model Based on SET Protocol , 2010, 2010 Eighth ACIS International Conference on Software Engineering Research, Management and Applications.

[24]  Sridhar P. Nerur,et al.  A framework for analyzing e-commerce security , 2002, Inf. Manag. Comput. Secur..

[25]  B. Sathish Babu,et al.  A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[26]  Herman Lam,et al.  A non-repudiation message transfer protocol for e-commerce , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[27]  Kian-Lee Tan,et al.  A Secure Agent-Mediated Payment Protocol , 2002, ICICS.

[28]  Srecko Brlek,et al.  A flaw in the electronic commerce protocol SET , 2006, Inf. Process. Lett..

[29]  Chung-Ren Ou,et al.  SETNR/A: an agent-based secure payment protocol for mobile commerce , 2010, Int. J. Intell. Inf. Database Syst..

[30]  Prathamesh Churi,et al.  JSSecure: A Secured Encryption Strategy for Payment Gateways in E-Commerce , 2017 .

[31]  Xun Yi,et al.  Secure Agent-Mediated Mobile Payment , 1998, PRIMA.

[32]  A. Sengupta,et al.  e-Commerce security — A life cycle approach , 2005 .

[33]  Wang Hui,et al.  An improved SET protocol payment system , 2010, 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering.

[34]  Bing Xu,et al.  Research of Session Security Management in E-Commerce System , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.