Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/451616
Title: Study of session based dynamic light weight schemes with elliptic curve cryptography for secure e commerce system
Researcher: Menaka, R
Guide(s): Neela madheswari, A
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
secure ecommerce system
curve cryptography
University: Anna University
Completed Date: 2021
Abstract: E-commerce is the systems that use the web or electronic media for online commercial activities that includes services and goods buying and selling, procurement on agreement of terms, comparison for best choice, placing order and authentication, inventory processing, shipment and rapport of customer by electronic payment system. The transaction related to commercial activities will occur in different ways such as business to business, business to consumer, consumer to consumer, peer to peer transaction or in consumer to business manner. newlineThe privacy and anonymity are considered as an important factor, while communicating over publicly in the platform like web. To ensure a high level of security, streamlined random and padding scheme in session portion of internet usage along with crypto system are used that grants high security for small bits of key size. Elliptic Curve Cryptosystem (ECC) uses smaller keys for equivalent strength compared to traditional public- key cryptosystems, the difference in key size increases as security desires to increase. The proposed work is carried out in three phases. newlineDuring the first phase, session based light weight cryptography to improve the performance of web service security is proposed. In this method, at each session the values for ECC is initialized and sent to the user during the starting of the session. Whenever the user access the web service, the method randomly selects the point from the given key set which is used as an encryption key to produce the request. The generated XML file is sent to the server side which identifies the key from the received point. From that point, the proposed method identifies the key being used to perform decryption. Using the identified key, the method extracts the original content to perform the required operation. newline
Pagination: xvi,155p.
URI: http://hdl.handle.net/10603/451616
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File27.88 kBAdobe PDFView/Open
02_prelim pages.pdf3.05 MBAdobe PDFView/Open
03_content.pdf226.7 kBAdobe PDFView/Open
04_abstract.pdf128.61 kBAdobe PDFView/Open
05_chapter 1.pdf735.52 kBAdobe PDFView/Open
06_chapter 2.pdf237.8 kBAdobe PDFView/Open
07_chapter 3.pdf330.44 kBAdobe PDFView/Open
08_chapter 4.pdf363.35 kBAdobe PDFView/Open
09_chapter 5.pdf385.67 kBAdobe PDFView/Open
10_chapter 6.pdf984.41 kBAdobe PDFView/Open
11_annexures.pdf105.36 kBAdobe PDFView/Open
80_recommendation.pdf75.82 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: