Mobile App security for E-Commerce

Authors

  • Khean Ouk Department of Computer Science, Royal University of Phnom Penh, Phnom Penh, Cambodia
  • Kimsoung Lim Department of IT, Emperor Bank PLC, Phnom Penh, Cambodia
  • Sen samnang Ouk Department of IT, Royal University of Phnom Penh, Phnom Penh, Cambodia

Keywords:

MAC, SIM card,, NIC, OTP, Cloud database, e-commerce, PIN, Authentication, hybrid algorithm

Abstract

Today is an e-commerce world that most of the population around the world does business with high tech. A long the way to deal with it, many intruders, hackers and unauthorized users are trying to involve that business by playing a role as the owner to cash money from a bank or transferring from one account or credit card or use device to install App on mobile phone while the password or PIN was hacked or belonged to those guys illegally. The hybrid algorithm of RSA and OTP will be implemented, that is the best model to prevent those mistreated action that cause to infect to the system. A PIN and a password will be encrypted with the hybrid algorithm. In the world, there is a unique MAC address used for each NIC. The authentication can be processed unless the receiver obtained its own MAC address in advance (pre-shared key). This key (MAC address) was sent to a cloud server after establishing a connection and then while the receiver log in to the cloud, the MAC address will be sent to that receiver to compare with its own MAC address automatically. All MAC is stored in a Cloud Database data must encrypt with the OTP.

 

References

Karyda, Maria,Mitrou,Lilian “DATA BREACH NOTIFICATION:ISSUES AND CHAL-LENGES FOR SECURITY MANAGEMENT”,10th Mediterranean Conference on Information Systems (MCIS), 2016.

Roland Schlöglhofer, Johannes Sametinger, “Secure and Usable Authentication on Mobile Devices”, Proceedings of the 10th International Conference on Advances in Mobile Computing &multimedia,Bali, 2012.

Khean Ouk, Kimsoung Lim,Sensamnang Ouk, “Message security and Parity bit recovery”, International Journal of Scientific Research in Computer Science and Engineering,Vol.8, Issue.5, pp.01-05,2020.

Downloads

Published

2020-12-31

How to Cite

[1]
K. Ouk, K. Lim, and S. samnang Ouk, “Mobile App security for E-Commerce”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 8, no. 6, pp. 33–37, Dec. 2020.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.