Font Size: a A A

Security Issues In E-commerce-set Protocol Improvements And Enhancements

Posted on:2010-10-14Degree:MasterType:Thesis
Country:ChinaCandidate:X J WangFull Text:PDF
GTID:2208360308466037Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The high-speed development of Internet not only offers convenience to communication,but also changes classic business and economic paradigms. Electronic Commerce based on Internet has become a new mode for people to pursue commerce. The prospect of Electronic Commerce is becoming more and more attracting. But at the same time, the security problem is the main cause that restricts its development. The Electronic Commerce security is the most Important Problems of an Electronic Commerce system to function successfully. How to establish a secure and convenient application environment of Electronic Commerce has become a current topic. In the secure application environment electronic transaction should have the same security and reliability as the conventional transaction.The main security threats faced by electronic commerce are as following: the information being intercepted and captured during the transmission on network; the transmitted document being tampered with; the forgery of e-mails; the counterfeit of other's identity and the nonrecognition of done deal etc. These threats will seriously affect the application and popularization of electronic commerce if they can't be solved effectively.Security Electronic Transaction protocol (SET) is an open standard for the commerce industry as a way to facilitate secure payment of card transactions over Internet. SET helps solve many security problems that once stranded the development of electronic commerce by laying down a series of standards and adopting various security code technical measures. At present, it has been acknowledged by IETF and become an actual industrial standard.This paper analyzes the basic concepts, the security infrastructure and payment system of electronic commerce, makes a thorough and comprehensive research on the security technology, authentication and transaction process, points out some deficiencies in SET protocol. And with regard to these deficiencies, the author of this paper puts forward: 1) nesting encryption technologies to improve the poor security, flexibleness and adaptability of SET protocol caused by multi-encryption algorithms; 2) enhancing the mediation function of the banks issuing cards to solve the dissension between the cardholders and the merchants, as well as the storage of the information in transaction. Finally, in allusion to the complexity, slow-speed and high-cost of SET protocol, the author proposes an architecture model of security control, and thoroughly analyzes its working principles and realization.
Keywords/Search Tags:Electronic Commerce(EC), electronic commerce security architecture, SET
PDF Full Text Request
Related items