Development of secure e-commerce protocol

dc.contributor.advisorÖzdemir, Enver
dc.contributor.authorCebeci, Sena Efsun
dc.contributor.authorID744926
dc.contributor.departmentDepartment of Applied Informatics
dc.date.accessioned2024-02-15T13:03:25Z
dc.date.available2024-02-15T13:03:25Z
dc.date.issued2022
dc.descriptionThesis (Ph.D.) -- Istanbul Technical University, Institute of Science and Technology, 2022
dc.description.abstractIncreased security breaches in e-commerce over the previous decade have prompted e-commerce enterprises to take more precautions. The inability to securely retain personal data has resulted in violations primarily involving credit card fraud and the theft of user accounts. In this context, e-commerce companies invest in increasing database security to more securely keep user data. Furthermore, these security flaws demonstrate the critical necessity for security protocols and solutions to be implemented. Existing approaches are insufficient and place undue pressure on e-commerce businesses in terms of calculation and connectivity. Similar database flaws exist in mobile payment systems, and numerous safeguards should be included. In general, user data is maintained encrypted and unencrypted in database systems, and user data can be viewed when the database is compromised. In this thesis, we propose an e-commerce protocol that takes security to the next level by employing a novel technique to address existing security flaws in e-commerce and mobile payment systems. Furthermore, even if the database is taken, this protocol prevents access to personal data, removing users' concerns about privacy. Users will have a right to claim how their data is used and will be able to regulate it. To accomplish these enhanced capabilities, users' data is transformed using mathematical procedures and stored in the database in this modified form. Finally, we implemented the proposed protocol and designed attack scenarios to demonstrate that it has been validated and compared to other known protocols and algorithms. The analysis revealed that the suggested protocol outperforms the compared approaches in terms of execution time.
dc.description.degreePh.D.
dc.identifier.urihttp://hdl.handle.net/11527/24553
dc.language.isotr
dc.publisherInstitute of Science and Technology
dc.sdg.typeGoal 8: Decent Work and Economic Growth
dc.subjectdata encryption methods
dc.subjectcyber security
dc.subjectsecurity protocols
dc.subjectelectronic commerce secret key crypto systems
dc.titleDevelopment of secure e-commerce protocol
dc.title.alternativeGüvenli e-ticaret protokolü geliştirilmesi
dc.typeDoctoral Thesis

Dosyalar

Orijinal seri

Şimdi gösteriliyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
Ad:
744926.pdf
Boyut:
2.9 MB
Format:
Adobe Portable Document Format

Lisanslı seri

Şimdi gösteriliyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
Ad:
license.txt
Boyut:
1.58 KB
Format:
Item-specific license agreed upon to submission
Açıklama