Design and Implementation of Secured E C
Design and Implementation of Secured E C
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. IV (Jan – Feb. 2016), PP 63-72
www.iosrjournals.org
Abstract : E-commerce involves the process of buying, selling, and exchanging of products, services, and
information via computer networks, primarily the Internet. The objective of this paper is to identify obstacles
that facing the implementation of e-commerce system and providing security solutions to protect sensitive
information. In the practical part the paper presents the design and implementation of secure site that allow the
customers to search and buy products at anytime and anyplace through the Internet. All data are archived and
stored in the proposed system, so that the administrator can easily search and retrieve information at any time
and can make changes to them.
Keywords: Security, Safety, Encryption, E-commerce, Site, Attacker
I. Introduction
E-commerce helps countries improve trade effectiveness and facilitates the integration of developing
countries into the global economy. It allows businesses and entrepreneurs to become more competitive. This
style of trading is canceled many of the limitations of traditional business. Existence of virtual markets, passages
and stores that have not occupy any physical space, allowing access and circulation in these markets for a
moment and anywhere in the world without leaving home is possible. Select and order goods that are placed in
virtual shop windows at unspecified parts of the world and also are advertising on virtual networks and payment
is provided through electronic services. The main components of E-commerce are: communication systems, data
management systems and security. [1, 2] The programming languages that are used to develop the system are
PHP and CSS. a.PHP: It is one of the most popular programming languages currently used in the creation of
web applications. The web server does the interpretation and implementation of the code then sends the result to
be displayed in the client browser. Because the web server is the one who interprets and executes its own code,
it is so-called server-side scripting language. [3]
b.CSS (Cascading Style Sheets): It is a simple design language intended to simplify the process of
making web pages presentable. CSS handles the look of a webpage, such as the color of the text, the style of
fonts, the spacing between paragraphs, and how columns are sized and laid out. It provides a powerful control
over the presentation of an HTML (XHTML) document. [4]
Introduction tp E-commerce
E-commerce is the business process such as buying and selling between the parties (buyer and seller)
on the transfer of the right to use the goods or services over the internet networks with certain electronic
mechanism. The electronic approval between the seller and the buyer to hold the sale or purchase is the essential
element in defining the concept of E-commerce. [2] There are types of E-commerce are Business-to-Business
(B2B), Business-to-Consumer (B2C), Consumer-to-Consumer (C2C), Peer-to-Peer (P2P) and Mobile commerce
(M-commerce). [5, 6, 7]
a. Business-to-Business (B2B): focus on selling to other businesses, an E-commerce company can deal with
suppliers or distributors or agents, these transactions usually carried out through Electronic Data Interchange
(EDI).
b. Business-to-Consumer (B2C): online businesses attempt to reach individual consumers. Portals (Yahoo.com,
MSN.com) offer users useful Web search tools and many services by charging advertisers for add placement,
collecting referral fees for steering customers to other sites and charging for premium service portals can
generate massive revenue. Besides that, content providers are a part of B2C business models. Content
providers make money by charging subscription fees in distributing information content, such as digital news,
also provides music, photos, video and artwork over the Web. This type has been used in the practical part of
the proposed system.
C: Consumer-to-Consumer (C2C): provides a way for consumers to sell to each other, with the help of an online
market maker and promotes the opportunity for consumers to transact goods or services to other consumers.
The rules of this community to compete are operated by the customer itself, check and decide his own basic
transaction prices. In C2C, the consumer depends on the market maker to provide a catalogue and search
engine.
d. Peer-to-Peer (P2P): enables Internet users to share files and computer resources directly without having to go
through a central Web server.
e. Mobile Commerce (M-commerce): refers to the use of wireless digital devices to enable transactions on the
Web. Many types of transaction can be conducted by mobile consumers, including stock (trade, price
comparisons, banking), which enabled by Computer-mediated networks.
E-Commerce Challenges
-Infrastructure requirements & Cost: E-commerce systems require new technologies that can touch many of
a company's core business processes, therefore significant investments in hardware, software, staffing, and
training is required.
-Value: Businesses companies want to know that their investments in E-commerce systems will produce a
return.
-Diversity of providers: The delivery of services is carried out by a large number of providers, some of which
are charitable or nonprofit organizations, others are commercially established.
-Security: A company's assets must be protected against misuse, whether accidental or malicious but that
protection should not compromise a site's usability or performance nor make its development too complex.
-Existing Systems: Companies need to be able to harness the functionality of existing applications into E-
commerce systems therefore Internet E-commerce systems integrate existing systems in a manner that avoids
duplicate function and maintains usability, performance, and reliability.
-Interoperability: The linking of trading partners' applications in order to exchange business documents and
must work together well in order to achieve business objectives. Interoperation between businesses reduces
costs and improves performance and enables the implementation of more dynamic value chains.
-Multiple relationships among providers: The Department purchases services on behalf of consumers from
many provider organizations but the agency from which services are purchased is not necessarily the agency
which provides the services.
-Governmental and political complexity: The provider field is not the only one characterized by only diverse
stakeholders and complex arrangements. The Government sector itself is divided along many lines.
Security Obstacle
In E-Commerce system security hardware, software, and environment are the main critical and
vulnerable points. Hardware security includes any devices used in running the E-Commerce website like
network devices, web servers, database servers and client’s computer. Securing the network with a properly
configured firewall device that is only allowing ports needed for accessing the E-Commerce website which is an
essential part of network security. The web server and database server should be isolated from other networks
using a network DMZ (demilitarized zone) to reduce possible intrusion from compromised computers on other
networks behind the firewall. A DMZ is a separate network added between a protected network and an external
network, in order to provide an additional layer of security. Software and routinely released patches should be
regularly updated to fix holes in security. Website pages, where confidential information is being entered,
should be secured with strong cryptography algorithm [10].The secure an E-Commerce website is a dynamic
process where new threats crop-up every day. To build a secure E-commerce application, the following five
security features must be included [11, 12, 13]:
-Authentication: to establish proof of identities and ensures that the origin of an electronic message or
document is correctly identified.
-Integrity: message should not be tempered in transit.
-Non repudiation: non repudiation does not allow the sender of a message to refute the claim of not sending
that message.
-Access control: determines who should be able to access what.
-Availability: resource should be available to authorized parties at all times.
Security Problem
-The Distributed Denial of Service (DDoS): This type of attack makes an attempt to prevent legitimate users
from accessing some services or resources, which they are eligible for. DDoS attack affect the availability of site
to users as server is overwhelmed with fake requests generated by attackers. No actual damage is done to the
victim site.
-SQL Injection: Because the present encryption protection only can guarantee the security of data transmitting
on the internet, but cannot check the content of data content filled by the user, and sent to the web server. If the
attacker has filled the data that include the vicious SQL query instruction in the web page form, these query
instruction together with HTML file will drill through the firewall and reach at to web server. When it is
executed on the server, the vital information will be compromised.
-Price Manipulation: The total payable price of the purchased goods is stored in a hidden HTML field of a
dynamically generated web page. In this attack an attacker can use a web application proxy to simply modify the
amount that is payable, when this information flows from the user's browser to the web server. The final payable
price can be manipulated by the attacker to a value of his choice.
-Session Hijacking: Session hijacking refers to taking control of a user session after successfully obtaining or
generating an authentication session ID. The attacker mostly uses brute force or reverse engineered session IDs
to get control of legitimate user’s web application session while that session is still in progress.
-Cross-site script (XSS): Cross-site scripting uses known vulnerabilities in web-based applications, their
servers, or plug-in systems they rely on. Exploiting one of these, they fold malicious content into the content
being delivered from the compromised site. When the resulting combined content arrives at the client-side web
browser, it has all been delivered from the trusted source, and thus operates under the permissions granted to
that system. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access-
privileges to sensitive page content, session cookies, and a variety of other information maintained by the
browser on behalf of the user as shown in figure 1.
Non-Technical Obstacles
- High implementation costs
- Fear of providing personal data
- The inability of the consumer to see the product visually before buying it online.
- The proliferation of commercial fraud
- The low level of awareness and knowledge about the E-commerce.
electronic products as shown in figure 2. The user can access to the E-commerce system homage to buy a
product by using his Visa-ID. After the user enters the VISA_ID the system will check it this ID is correct or
not. In case it's true the system redirect the user to purchase page else the system will show message that this ID
is not correct. In purchase page the user will enter the quantity and confirm the purchasing process. After that
the system will check if there is enough quantity in store and enough amount of money in VISA to complete the
purchase process. The Database is designed by using WAMP server (Windows Apache MysqlPhp) as shown in
figure 3 and it consist of four tables.
Conclusion
-Privacy and Security in E-commerce System
a. Using user name and password to maintain security for accounts and to prevent unauthorized access. Provide
secure account management against automated tools. Also sensitive information like password is stored as an
encrypted text and not as a plaintext
b. Prevent SQL Injection into input fields taken from the forms by using mysql_real_escape_string( ) which
increase the security.
c. Using cryptography functions by using Message-Digest 5, known simply as MD5, is one of the quickest and
simplest ways to add security to the files and messages that send and transfer in order to encrypt the sensitive
information. In this paper, MD5 function is used to encrypt the VISA-ID information of the customer to provide
more security to this sensitive data and compare it with the encrypted data stored in data base as shown in
algorithm 1.
Algorithm. 1.
I. $visa_id=md5($visa_id1);
II. $query4=mysqli_query($con, "select *from users wherevisa_id='$visa_id'");
III. If visa_id match with the value of inventory in the database then the customer will directed to sell page
otherwise a massage will appear to customer to retry the process.
- Implementation of the Booking System
The Software tools that used to create and implement the system are: PHP server side script interpreter, WAMP
Server that based on Apache server used to provide web, database and ftp services, MySQL data base
management system (DBMS) to store and retrieve data. Figure 4 shows the Home page of an E-commerce
system
Figure 5 shows how the products are selected and presented with some details like product name and price in
products page. After the user selects the products, the system redirects the user to the purchase authentication
page shown in figure 6. The user enters the username and VISA-ID in the textboxes, if the VISA-ID is correct
then the system redirect the user to the sell page to buy the selected products.
The page in figure 6 shows the information of the selected product. The user can enter the quantity
required and confirm the sell process buy select confirm selling checkbox. Figure 7 shows the purchase page.
Figure 8 shows information about the product purchased by the customer. This information includes the product
purchased, the previous charge, current charge, quantity of product purchased and total price.
Figure 9 shows the administrator login page. This page allows the administrator of E-commerce system
to login to the administration phase. It contains two fields; username and password. The Login information are
sent to the server after filling out all fields and the server checks if the user name and password are correct, if
correct it send the administrator to the administration phase, otherwise the page show a message to the user that
the user name or password error.
DOI: 10.9790/0661-18146372 www.iosrjournals.org 69 | Page
Design and Implementation of Secured E-commerce System
Figure 10 shows how the administrator can add new item information to the system. This page contains
fields such item name, item quantity, item code, item price and description. In figure 11 allows the administrator
to edit items information? Figure 12 shows how the administrator can add new user to the E-commerce system
.
Conclusion
The needs of the citizens should always be under consideration when implementing and improving e-
commerce services; because citizens are considered to be at the core of every service and the responsibilities of
the authorities. Implementing and developing e-commerce is not free of any obstacles, and barriers. Therefore,
in this paper it was discussed and accommodates the solution to security was accommodated in the proposed
system.
References
[1] ''Introduction to Computers'' , http://www.b-u.ac.in/sde_book/bcom_ca.pdf
[2] Y. A. Nanehkaran ,''An Introduction To Electronic Commerce'' , INTERNATIONAL JOURNA L OF SCIENTIFIC &
TECHNOLOGY RESEARC H VOLUME 2ISSUE 4 , APRIL 2013. ISSN 2277-8616
[3] R. Lerdorf, K. Tatroe, B. Kaehms, and R. McGredy, "Programming PHP", Published by O’Reilly & Associates, Inc., 1005
Gravenstein Highway North, Sebastopol, CA 95472. http://www.tutorialspoint.com/css/css_tutorial.pdf
[5] M. Niranjanamurthy, D. Chahar, ''The study of E-Commerce Security Issues and Solutions'' , International Journal of Advanced
Research in Computer and Communication Engineering Vol. 2, Issue 7,July 2013, ISSN (Online) : 2278-1021
[6] N. Shafiyah, R. Alsaqour, H. Shaker, O. Alsaqour and M. Uddin, ''Review on Electronic Commerce'', Middle-East Journal of
Scientific Research 18 (9): 1357-1365, 2013 ISSN 1990-9233, © IDOSI Publications, 2013, DOI: 10.5829/idosi.mejsr.
2013.18.9.12421
[7] D. Pandey, V. Agarwal, " E-commerce Transactions: An Empirical Study", IJARCSSE All Rights Reserved Page | 669 Volume 4,
Issue 3,March 2014, ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software
Engineering, Research Paper Available online at: www.ijarcsse.com
[8] P. B. Rane , B.B.Meshram, "Transaction Security for E-commerce Application ", International Journal of Electronics and Computer
Science Engineering 1720 Available Online at www.ijecse.org, ISSN- 2277-1956 ISSN 2277-1956 /V1N3-1720-1726
[9] T. Castleman, P. A. Swatman and Craig M. Parker, ''Issues in the Implementation of Electronic Commerce in the Human Services:
Reflections on the Victorian Initiatives'' , http://www.deakin.edu.au/study-at-deakin/find-a-course/business-analytics
[10] '' E-commerce and Security-1dl018 '',spring 2008, Uppsala University / Computer Science Division / Uppsala Database Laboratory :
E-Commerce and Security - 1DL018, http://www.it.uu.se/edu/course/homepage/ehandel/vt08/.
[11] J. Singh, ''Review of E-Commerce Security Challenges'', International Journal of Innovative Research in Computer and
Communication Engineering (An ISO 3297: 2007 Certified Organization)Vol. 2, Issue 2, February 2014, ISSN(Online): 2320-9801
[12] A. Kahate, ''Cryptography and Network security'', Tata McGraw Hill Education Private Limited, 2ndedition, 2008.
[13] ''SQL Injection'', http://en.wikipedia.org/wiki/SQL_injection. http://www.symantec.com/connect/articles/common-security-
vulnerabilities-e-commerce-systems.
[15] J. Botha, and C. Bothma , P Geldenhuys,''Manging E-commerce'' , Published 2008 by Juta & Company ISBN, 0702173045
(ISBN13: 9780702173042)
[16] ''Critical Threats e-Commerce hosting'', http://www.plaveb.com/blog/3-critical-threats-To e-commerce-hosting.
[17] '' E-Commerce site security'', http://www.applicure.com/solutions/eco. http://www.tutorialspoint.com/css/css_tutorial.pdf.
[19] M. O. El-fitouri , ''E-Commerce in Developing Countries: A Case Study on the Factors Affecting E-commerce Adoption in Libyan
Companies'' , M Othman El-fitouri Int. Journal of Engineering Research and Applications, ISSN :2248-9622, Vol. 5, Issue 1( Part
1), January 2015, pp.102-115, www.ijera.com