E-commerce Security System

8.2 E-commerce Security System

In the above e-commerce infrastructure, the security issue in e-commerce is not discussed in detail. But it does not mean that the consideration of security in e-commerce system could be neglected or is in the minor position. Oppositely, the e-commerce system built on the basis of Internet not only needs to handle various security issues, but also must meet some specific security control requirements in e-commerce interaction. Therefore, in the transition process from traditional trade mode based on the paper to the electronic trade mode, how to keep the electronic trade mode secure as the traditional mode is the focus, and also is one of key problems in the widely application of e-commerce.

This section will discuss the security issue in the e-commerce infrastructure, and detail the solution of security issue in e-commerce through analyzing noumenal security architecture of network and the specific security factors and control methods of e-commerce.

1. OSI security architecture

OSI security architecture instituted by ISO is an academic basis for study and design computer network system and for estimating and improving existing systems. OSI security architecture defines functions of security services, security mechanism and security management, and presents the logical relations among OSI network layers, security service and security mechanism. OSI prescribes five standard security services:

Object authentication security service: both sides of communication authenticate the validity and authenticity of each other, to prevent cheat.

Access control service: used to prevent unauthorized users to use the system resources illegally.

Data secrecy service: used to prevent information to be intercepted or betrayed by illegal entities.

Data integrity service: used to prevent the change, insert, delete exchanged data form illegal entities and lost of data.

Preventing denying security service: used to prove occurred operations, and prevent the denying of the happened behaviors.

Security service is implemented by security mechanism. OSI defines eight types of security mechanisms: encryption mechanism, signature mechanism, access control mechanism, data integrality mechanism, authentication exchange mechanism, business flow filling mechanism, route control mechanism and notarization mechanism. The relation of security mechanism and security service is shown in Table 8.1.

8 E-commerce Architecture and System Design

Table 8.1 The relation of security mechanism and security service

Data Deny Mechanism

Security Object

Access

Data of

Authentication Control Secreting Integrality Preventing

Encryption

Ĝ Signature

Ĝ Ĝ Access Control

Data Integrality Ĝ Ĝ Authentication

Exchange

Business Flow Fill

Route Control

Notarization Ĝ

2. E-commerce security factor

(1) Validity: Controlling and preventing the hidden threat caused by network failure, operation error, application error, hardware failure, system software error and computer virus, to guarantee trade data valid at certain time and in certain place.

(2) Confidentiality: E-commerce is built on the open Internet environment, and maintaining business confidentiality is an important safeguard for widely spreading e-commerce application. Therefore, it’s necessary to prevent illegal access of information and to prevent information from to be wiretaped in the transmission.

(3) Integrality: E-commerce system should prevent to generate, update and delete information arbitrarily, avoid losing and repetition of information and guarantee the order of information transmission.

(4) Reliability: It’s impossible to distinguish handwriting signature and seal in the non-paper e-commerce mode, so reliable identifiers are needed for individuals, enterprises or countries involved in information transmission in an e-commerce transaction.

The security factors and security service of various e-commerce and network are all implemented by security technologies. The e-commerce security technologies based on Internet mainly include: data encryption, authentication and digital signature and firewall.

PKI is used as core technology of information security in the security subsystem of e-commerce infrastructure. The detailed process and data flow are briefly explained below, taking example mutual authentication between e-commerce entities as example.

Assuming that e-commerce entity A and B adopt RSA public key to authenticate each other, the protocol is shown as follows:

A sends its identity to B.

B chooses a random number R D , and encrypts it with A’s public key to get y1, then sends y1 and y2 which is generated by encrypted y1 with its private key to A.

Introduction to E-commerce

Figure 8.19 Mutual Authentication Process of e-commerce Entities Based on PKI

8 E-commerce Architecture and System Design

After A receives y1 and y2, it validates y2 with B’s public key. If the result is the same as y1, then B is confirmed.

A decrypts y1 with its private key to obtain R D ; at last, A encrypts R D with B’s public key to obtain y3, and sends y3 to B. After B receives y3, it decrypts it with its private key. If obtain R D , it assures that the other party is A, otherwise a hacker. After that a cycle of authentication process is finished.

We can see that, the above simple protocol model has four behavior bodies: Entity A, Entity B, hacker and management organization adopted PKI framework. The hacker could cheat A or B, entities such as CA and certificate database in PKI take charge of work such as distributing and protecting public key. The flow chart of the protocol is shown as Fig. 8.19.

The whole mutual authentication process could be described with PASCAL-like language as the following:

Program Authentication_Process //Description of sub-process and function; Procedure Send_To(Message_Sender,Message_Receiver,Message); //Function of

authentication entity sending information; Procedure Show_Message(Message: String); //Display system prompt information; Procedure Authentication_Terminated(); //Authentication error, system exits

abnormally; Procedure Authentication_Finished(); //Authentication is finished, exit

normally; Function Encrpt(Key,Message): Message; //Encrypt Message with Key; Function Decrpt(Key,Message): Message; //Decrypt Message with Key; Function Get_Public_Key(Entity): Key; //Get public key of Entity; Function Get_Private_Key(Entity): Key; //Get private key of Entity;

Begin //Body of authentication process; Send_To(A,B,IdentifierOfA); //A sends its identifier to B Y1:=Encrpt(Get_Public_Key(A),Random()); //B encrypt random number with

A's public key; Y2:=Encrpt(Get_Private_Key(A),Y1); //B encrypts Y1 with its private key; Send_To(B,A,Y2); If (Y1<>Decrpt(Get_Publc_Key(B),Y2))Then

Begin Show_Message("Cracker Imitates B")˗ Authentication_Terminated(); //Authentication error, abort protocol

End Else Begin R D :=Decrpt(Get_Private_Key(A),Y1);

Y3:=Encrpt(Get_Public_Key(B),R D );

Send_To(A,B,Y3);

If (R D <>Decrpt(Get_Private_Key(B),Y3))Then

Begin Show_Message("Cracker Imitates A");

Introduction to E-commerce

Authentication_Terminated(); End Else Begin Show_Message("Authentication is Finished"); Authentication_Finished();

End End End

In terms of Petri net theory, the specific data flow and information flow in the mutual authentication protocol could be analyzed in detail. The more detailed analysis is omitted here, we refer the interested readers to related resources.

Dokumen yang terkait

AN ALIS IS YU RID IS PUT USAN BE B AS DAL AM P E RKAR A TIND AK P IDA NA P E NY E RTA AN M E L AK U K A N P R AK T IK K E DO K T E RA N YA NG M E N G A K IB ATK AN M ATINYA P AS IE N ( PUT USA N N O MOR: 9 0/PID.B /2011/ PN.MD O)

0 82 16

Anal isi s L e ve l Pe r tanyaan p ad a S oal Ce r ita d alam B u k u T e k s M at e m at ik a Pe n u n jang S MK Pr ogr a m Keahl ian T e k n ologi , Kese h at an , d an Pe r tani an Kelas X T e r b itan E r lan gga B e r d asarkan T ak s on om i S OL O

2 99 16

The Effectiveness of Computer-Assisted Language Learning in Teaching Past Tense to the Tenth Grade Students of SMAN 5 Tangerang Selatan

4 116 138

Modul TK E 2016 150 hlm edit Tina M imas

2 44 165

Membangun aplikasi e-commerce pada Toko Reafshop Bandung

1 26 687

Pengaruh Persepsi Kemudahan dan Kepuasan Wajib Pajak Terhadap Penggunaan E Filling (Survei Pada Wajib Pajak Orang Pribadi Di Kpp Pratama Soreang)

12 68 1

PENGARUH ARUS PENGELASAN TERHADAP KEKUATAN TARIK PADA PENGELASAN BIMETAL (STAINLESS STEEL A 240 Type 304 DAN CARBON STEEL A 516 Grade 70) DENGAN ELEKTRODA E 309-16

10 133 86

Factors Related to Somatosensory Amplification of Patients with Epigas- tric Pain

0 0 15

TEKNIK PERLAKUAN PENDAHULUAN DAN METODE PERKECAMBAHAN UNTUK MEMPERTAHANKAN VIABILITAS BENIH Acacia crassicarpa HASIL PEMULIAAN (Pretreatment Technique and Germination Method to Maintain the Viability of Acacia crassicarpa Improved Seed)

0 1 11

The Risk and Trust Factors in Relation to the Consumer Buying Decision Process Model

0 0 15