Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps
Abstract
:1. Introduction
- We design a robust protocol that achieves lightweight, high-performance encryption operations through the ElGamal algorithm for key generation, and the Fernet algorithm for information encryption and decryption operations.
- We propose the utilization of an information leak detection mechanism in key generation, encryption, and decryption processes to ensure that merchants’ information is not exposed.
- We test the performance of our e-commerce application transaction protocol using the Scyther high-security proof tool.
2. Literature Review on Commerce Transaction Requests Encryption
3. Importance of the E-Merchant in E-Commerce Transactions
4. Basic Concepts about Applied Cryptography Mechanisms
4.1. ElGamal Algorithm
4.2. Fernet Algorithm
4.3. Data Leakage Detection Technique
- The distributor enters their login information.
- The distributor enters the data (for instance, text files) into the database.
- After logging into the system, the agent requests a specific file, or the distributor uploads all files for the agents appropriately, along with the private key.
- The distributor delivers the desired file to the requested agents, who then add some fictitious objects.
- According to his/her demands (explicit requests or sample requests), agents will download the files.
- The distributor will search for the leaked data and locate the file if any agents (fake agents) release the information to a third party [32].
5. Proposed Protocol to Secure E-Commerce Transactions
5.1. Employing Secret-Key and Public-Key Encryptions
5.1.1. ElGamal
- Select a large prime number at random q;
- Select a random number g, which referred a random multiplicative to as a generator component;
- Select a third number at random from 1 … q − 1 as the private key;
- Calculate y by using the formula: as the public key;
- should be kept secret as a private key, q, g and y are published as public key ().
5.1.2. Fernet
5.1.3. DLD
5.2. Purchase and Payment Requests
5.3. Procedures of Proposed Protocol
- Using an ELG asymmetric encryption technique, our protocol generates large random keys that are both private and public. The random keys 1024-bit are then divided into 256-bit chunks to accommodate the keys of FER algorithm.
- This public key is used to encrypt e-commerce requests between and . When e-commerce requests are transferred from to or vice versa, our protocol employs strong encryption with high encryption randomness, thus making it difficult to hack.
- The FER and ELG keys will be used to decrypt the required information. / device receives a decrypted message that is intractable to perforate by a hacker.
- We employ DLD technology to safeguard information, particularly information, against leakage throughout the key generation, encryption, as well as decryption procedures.
- Concealing security parameters and request information on devices of networks, particularly keys, is critical in situations of device hacking.
5.3.1. Key Generation Procedure
- We generate 1024-bit public and private keys using parameters q and g were mentioned by the ELG algorithm in Section 5.1.1;
- We divide the public key into parts , , and with a key size of 256 bits that fits the key size of the FER algorithm, which is 256 bits;
- We perform XOR operations on keys such as and , following which we obtain the final key, ;
- We add an to each final key and perform the operation;
- We use DLD to process the leakage probability () of a () data group from the guilty party to a group of s’ agents ();
- We hide the keys of score ()= and . In the case of the following connection, we do not generate keys. However, we change the for each key (). This ID is associated with the key, and not the user (see Algorithm 1).
Algorithm 1 Keys generation procedure. |
Input: q, g values and , t-threshold Output: and keys with a 256-bit length 1: Using ELG to generate and with 1024-bit length 2: Dividing into four parts with a 256-bit length 3: Four sub-keys: , , and 4: Applying ⊕ with sub-keys 5: Obtaining with 256-bit length 6: Adding for each key, Computing 7: Computing 8: If Declare as Info leakage 9: Else repeat step 7 10: Protecting and on the device 11: Computing 12: Storing 13: Next connection go to step 4 with changing |
5.3.2. Encryption Procedure
Algorithm 2 Encryption procedure. |
Input: , keys with 256-bit, and , t-threshold Output: and 1: Extracting 2: Extracting 3: Using 256-bit with Ferent encryption 4: Encrypting 5: 6: If Declare as Info leakage 7: Else repeat step 5 8: Storing 9: Storing connection order on the sender side |
5.3.3. Decryption Procedure
Algorithm 3 Decryption procedure. |
Input: keys with 256-bit, and , t-threshold Output: 1: Extracting 2: Extracting 3: Using 256-bit with FER decryption 4: Using 5: Decrypting 6: 7: If Declare as Info leakage 8: Else repeat step 6 9: Saving in the dataset 10: Storing 11: Storing 12: Storing connection order on the receiver side |
6. Analysis of Proposed E-Commerce Apps’ Reliability and Effectiveness
6.1. Security Examination of a Variety of E-Commerce Threats
6.1.1. Camera and Double Swipe
6.1.2. Collusive Attack
6.1.3. Dictionary Attack
6.1.4. Impersonalization
6.1.5. Pharming
6.1.6. Smishing
6.1.7. Snooping
6.1.8. Unfair Evaluation Attack
6.1.9. Vishing
6.2. Security Analysis Using Scyther
6.2.1. Description of Scyther with Proposed E-Commerce Protocol
6.2.2. Scyther Test Results
6.3. Performance Results and Discussion
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
DLD | Data leakage detection |
E-commerce | Electronic commerce |
ELG | ElGamal algorithm |
FER | Fernet algorithm |
Group of merchants’ agents | |
Hybrid Encryption | Integration of ELG and FER algorithms |
Merchant | |
Leakage probability | |
Salt | Random value for encryptions and keys |
Score of computation process | |
Data group | |
Trust server |
References
- Kumbhakar, D.; Sanyal, K.; Karforma, S. An optimal and efficient data security technique through crypto-stegano for e-commerce. Multimed. Tools Appl. 2023, 82, 21005–21018. [Google Scholar] [CrossRef]
- Cybersource. 2023 Global Ecommerce Payments and Fraud Report. Technical Report, Cybersource A Visa Solution. 2023. Available online: https://www.cybersource.com/en-us/solutions/fraud-and-risk-management/fraud-report.html#cw-243544106 (accessed on 1 June 2023).
- RecordedFuture. Annual Payment Fraud Intelligence. Technical Report, Recorded Future Products. 2022. Available online: https://www.recordedfuture.com/annual-payment-fraud-intelligence-report-2022 (accessed on 3 June 2023).
- Al-Zubaidie, M.; Zhang, Z.; Zhang, J. Efficient and secure ECDSA algorithm and its applications: A survey. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 2019, 11, 7–35. [Google Scholar] [CrossRef]
- Al-Zubaidie, M.; Zhang, Z.; Zhang, J. REISCH: Incorporating lightweight and reliable algorithms into healthcare applications of WSNs. Appl. Sci. 2020, 10, 2007. [Google Scholar] [CrossRef] [Green Version]
- Al-Zubaidie, M.; Zhang, Z.; Zhang, J. PAX: Using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system. Int. J. Environ. Res. Public Health 2019, 16, 1490. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Jintcharadze, E.; Iavich, M. Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems. In Proceedings of the 2020 IEEE East-West Design & Test Symposium (EWDTS), Varna, Bulgaria, 4–7 September 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar]
- Al-Zubaidie, M.; Zhang, Z.; Zhang, J. RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications. Secur. Commun. Netw. 2019, 2019, 3263902. [Google Scholar] [CrossRef]
- Sidik, A.P.; Efendi, S.; Suherman, S. Improving one-time pad algorithm on Shamir’s three-pass protocol scheme by using RSA and ElGamal algorithms. In Proceedings of the Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2019; Volume 1235, p. 012007. [Google Scholar]
- Ali, G.; Dida, M.A.; Elikana Sam, A. A Secure and efficient multi-factor authentication algorithm for mobile money applications. Future Internet 2021, 13, 299. [Google Scholar] [CrossRef]
- Tyagi, S. Enhancing security of cloud data through encryption with AES and Fernet algorithm through convolutional-neural-networks (CNN). Int. J. Comput. Netw. Appl. 2021, 8, 288–299. [Google Scholar]
- Dong, Z. Construction of mobile e-commerce platform and analysis of its impact on e-commerce logistics customer satisfaction. Complexity 2021, 2021, 6636415. [Google Scholar] [CrossRef]
- Abdul Hussien, F.T.; Rahma, A.M.S.; Abdul Wahab, H.B. A secure environment using a new lightweight AES encryption algorithm for e-commerce websites. Secur. Commun. Netw. 2021, 2021, 9961172. [Google Scholar] [CrossRef]
- Kota, C. Secure File Storage in Cloud Using Hybrid Cryptography. Available at SSRN 4209511. 2022. Available online: https://ssrn.com/abstract=4209511 (accessed on 25 June 2023).
- Koppaka, A.K.; Lakshmi, V.N. ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data. Int. J. Pervasive Comput. Commun. 2022. [Google Scholar] [CrossRef]
- Charles, V.B.; Surendran, D.; SureshKumar, A. Heart disease data based privacy preservation using enhanced ElGamal and ResNet classifier. Biomed. Signal Process. Control 2022, 71, 103185. [Google Scholar] [CrossRef]
- Ahmed, S.; Ahmed, T. Comparative analysis of cryptographic algorithms in context of communication: A systematic review. Biomed. Signal Process. Control 2022, 12, 161–173. [Google Scholar] [CrossRef]
- Al-Zubaidie, M. Implication of lightweight and robust hash function to support key exchange in health sensor networks. Symmetry 2023, 15, 152. [Google Scholar] [CrossRef]
- Muhajjar, R.A.; Flayh, N.A.; Al-Zubaidie, M. A perfect security key management method for hierarchical wireless sensor networks in medical environments. Electronics 2023, 12, 1011. [Google Scholar] [CrossRef]
- Parvathi, R.; Girish, M.; Sandeep, M.G.; Abhiram, K. Secured blockchain technology for agriculture food supply chain. J. Pharm. Negat. Results 2022, 13, 357–361. [Google Scholar] [CrossRef]
- He, H.; Zhang, B. Strategy analysis of multi-agent governance on the e-commerce platform. J. Theor. Appl. Electron. Commer. Res. 2023, 18, 1–18. [Google Scholar] [CrossRef]
- Li, Z.; Ren, L.; Li, Z.; Chen, J.; Tian, X.; Zhang, Y. Price dispersion, bargaining power, and consumers’ online shopping experience in e-commerce: Evidence from online transactions. Math. Probl. Eng. 2023, 2023, 6638665. [Google Scholar] [CrossRef]
- Sugito, P. Sales multiplize through e-commerce training For Batik craftsman in Paiton Probolinggo. Empower. Soc. 2023, 6, 9–16. [Google Scholar]
- Shyaa, G.S.; Al-Zubaidie, M. Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography. Appl. Sci. 2023, 13, 7085. [Google Scholar] [CrossRef]
- Asri, R.; Nasution, M.K.; Suherman, S. Modification of chipertext ElGamal algorithm using split merge. In Proceedings of the Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2019; Volume 1235, p. 012054. [Google Scholar]
- Arboleda, E.R. Secure and fast chaotic ElGamal cryptosystem. Int. J. Eng. Adv. Technol 2019, 8, 1693–1699. [Google Scholar]
- Jain, A.; De, P. Enhancing database security for facial recognition using Fernet encryption approach. In Proceedings of the 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 2–4 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 748–753. [Google Scholar]
- Prashanth, C.; Teja, D.B.S.; Lavanya, V. Securing the Data in Cloud Using Fernet Technique; Technical Report; EasyChair: Stockport, UK, 2022. [Google Scholar]
- Habibu, T.; Luhanga, E.T.; Sam, A.E. Developing an algorithm for securing the biometric data template in the database. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 361–371. [Google Scholar] [CrossRef] [Green Version]
- Singh, A.; Ikuesan, R.A.; Venter, H. Secure storage Model for digital forensic readiness. IEEE Access 2022, 10, 19469–19480. [Google Scholar] [CrossRef]
- Gupta, I.; Singh, A.K. A holistic view on data protection for sharing, communicating, and computing environments: Taxonomy and future directions. arXiv 2022, arXiv:2202.11965. [Google Scholar]
- Patil, R.C.; Kumar, A.; Narmadha, T.; Suganthi, M.; Rao, A.V.S.R.; Rajesh, A. Data leakage detection in cloud computing environment using classification based on deep learning architectures. Int. J. Intell. Syst. Appl. Eng. 2022, 10, 281–285. [Google Scholar]
- WTO. 38 Free Payment Receipt Templates (Excel|Word|PDF). 2023. Available online: https://www.wordtemplatesonline.net/payment-receipt-templates/ (accessed on 20 May 2023).
- Odunze, D. Cyber victimization by hackers: A criminological analysis. Public Policy Adm. Res. 2018, 8, 08–15. [Google Scholar]
- Kaushik, D.; Gupta, A.; Gupta, S. E-commerce security challenges: A review. In Proceedings of the International Conference on Innovative Computing & Communications (ICICC), Delhi, India, 20–22 February 2020; pp. 1–4. [Google Scholar]
- Badotra, S.; Sundas, A. A systematic review on security of e-commerce systems. Int. J. Appl. Sci. Eng. 2021, 18, 1–19. [Google Scholar]
- Alqassab, A.; Hikmat Ismael, Y. EMV electronic payment system and its attacks: A review. AL-Rafidain J. Comput. Sci. Math. 2022, 16, 23–29. [Google Scholar] [CrossRef]
- Xiao, Y.; Zhou, C.; Guo, X.; Song, Y.; Chen, C. A novel decentralized e-commerce transaction system based on blockchain. Appl. Sci. 2022, 12, 5770. [Google Scholar] [CrossRef]
- Liu, X.; Ahmad, S.F.; Anser, M.K.; Ke, J.; Irshad, M.; Ul-Haq, J.; Abbas, S. Cyber security threats: A never-ending challenge for e-commerce. Front. Psychol. 2022, 13, 4863. [Google Scholar] [CrossRef] [PubMed]
- Roy, S.; Sharmin, N.; Acosta, J.C.; Kiekintveld, C.; Laszka, A. Survey and taxonomy of adversarial reconnaissance techniques. ACM Comput. Surv. 2022, 55, 1–38. [Google Scholar] [CrossRef]
- Weichbroth, P.; Wereszko, K.; Anacka, H.; Kowal, J. Security of cryptocurrencies: A view on the state-of-the-art research and current developments. Sensors 2023, 23, 3155. [Google Scholar] [CrossRef] [PubMed]
- Awan, I.A.; Shiraz, M.; Hashmi, M.U.; Shaheen, Q.; Akhtar, R.; Ditta, A. Secure framework enhancing AES algorithm in cloud computing. Secur. Commun. Netw. 2020, 2020, 1–16. [Google Scholar] [CrossRef]
- Al-gohany, N.A.; Almotairi, S. Comparative study of database security in cloud computing using AES and DES encryption algorithms. J. Inf. Secur. Cybercrimes Res. 2019, 2, 102–109. [Google Scholar] [CrossRef]
- Devassy, N. Research Project Questions. Ph.D. Thesis, National College of Ireland, Dublin, Ireland, 2023. [Google Scholar]
- Sylfania, D.Y.; Juniawan, F.P.; Pradana, H.A. Blowfish–RSA comparison analysis of the encrypt decrypt process in android-based email application. In Proceedings of the Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019), Palembang, Indonesia, 16 November 2019; Atlantis Press: Amsterdam, The Netherlands, 2020; pp. 113–119. [Google Scholar]
Attack | [34] 2018 | [35] 2020 | [9] 2021 | [36] 2021 | [28] 2022 | [37] 2022 | [38] 2022 | [1] 2022 | [39] 2022 | [40] 2022 | [41] 2023 | Proposed Protocol |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Camera and double swipe | ✓ | ✓ | ✓ | ✓ | ||||||||
Collusive | ✓ | ✓ | ||||||||||
Dictionary | ✓ | ✓ | ✓ | ✓ | ||||||||
Impersonalization | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||
Pharming | ✓ | ✓ | ✓ | |||||||||
Smishing | ✓ | ✓ | ✓ | ✓ | ||||||||
Snooping | ✓ | ✓ | ||||||||||
Unfair evaluation | ✓ | ✓ | ✓ | ✓ | ||||||||
Vishing | ✓ | ✓ | ✓ | ✓ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Al-Zubaidie, M.; Shyaa, G.S. Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps. Future Internet 2023, 15, 262. https://doi.org/10.3390/fi15080262
Al-Zubaidie M, Shyaa GS. Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps. Future Internet. 2023; 15(8):262. https://doi.org/10.3390/fi15080262
Chicago/Turabian StyleAl-Zubaidie, Mishall, and Ghanima Sabr Shyaa. 2023. "Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps" Future Internet 15, no. 8: 262. https://doi.org/10.3390/fi15080262
APA StyleAl-Zubaidie, M., & Shyaa, G. S. (2023). Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps. Future Internet, 15(8), 262. https://doi.org/10.3390/fi15080262