Full Paper View Go Back

Mobile App security for E-Commerce

Khean Ouk1 , Kimsoung Lim2 , Sen Samnang Ouk3

Section:Research Paper, Product Type: Journal-Paper
Vol.8 , Issue.6 , pp.33-37, Dec-2020


Online published on Dec 31, 2020


Copyright © Khean Ouk, Kimsoung Lim, Sen Samnang Ouk . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Khean Ouk, Kimsoung Lim, Sen Samnang Ouk, “Mobile App security for E-Commerce,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.6, pp.33-37, 2020.

MLA Style Citation: Khean Ouk, Kimsoung Lim, Sen Samnang Ouk "Mobile App security for E-Commerce." International Journal of Scientific Research in Computer Science and Engineering 8.6 (2020): 33-37.

APA Style Citation: Khean Ouk, Kimsoung Lim, Sen Samnang Ouk, (2020). Mobile App security for E-Commerce. International Journal of Scientific Research in Computer Science and Engineering, 8(6), 33-37.

BibTex Style Citation:
@article{Ouk_2020,
author = {Khean Ouk, Kimsoung Lim, Sen Samnang Ouk},
title = {Mobile App security for E-Commerce},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2020},
volume = {8},
Issue = {6},
month = {12},
year = {2020},
issn = {2347-2693},
pages = {33-37},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2170},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2170
TI - Mobile App security for E-Commerce
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Khean Ouk, Kimsoung Lim, Sen Samnang Ouk
PY - 2020
DA - 2020/12/31
PB - IJCSE, Indore, INDIA
SP - 33-37
IS - 6
VL - 8
SN - 2347-2693
ER -

160 Views    282 Downloads    64 Downloads
  
  

Abstract :
Today is an e-commerce world that most of the population around the world does business with high tech. A long the way to deal with it, many intruders, hackers and unauthorized users are trying to involve that business by playing a role as the owner to cash money from a bank or transferring from one account or credit card or use device to install App on mobile phone while the password or PIN was hacked or belonged to those guys illegally. The hybrid algorithm of RSA and OTP will be implemented, that is the best model to prevent those mistreated action that cause to infect to the system. A PIN and a password will be encrypted with the hybrid algorithm. In the world, there is a unique MAC address used for each NIC. The authentication can be processed unless the receiver obtained its own MAC address in advance (pre-shared key). This key (MAC address) was sent to a cloud server after establishing a connection and then while the receiver log in to the cloud, the MAC address will be sent to that receiver to compare with its own MAC address automatically. All MAC is stored in a Cloud Database data must encrypt with the OTP.

Key-Words / Index Term :
MAC, SIM card, NIC, OTP, Cloud database, e-commerce, PIN, Authentication, hybrid algorithm

References :
[1].Karyda, Maria,Mitrou,Lilian “DATA BREACH NOTIFICATION:ISSUES AND CHAL-LENGES FOR SECURITY MANAGEMENT”,10th Mediterranean Conference on Information Systems (MCIS), 2016.
[2]. Roland Schlöglhofer, Johannes Sametinger, “Secure and Usable Authentication on Mobile Devices”, Proceedings of the 10th International Conference on Advances in Mobile Computing &multimedia,Bali, 2012.
[3]. Khean Ouk, Kimsoung Lim,Sensamnang Ouk, “Message security and Parity bit recovery”, International Journal of Scientific Research in Computer Science and Engineering,Vol.8, Issue.5, pp.01-05,2020.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation