Developing a Secured Mobile-Agent-Based Electronic Commerce Using Crypto-Steganography

Developing a Secured Mobile-Agent-Based Electronic Commerce Using Crypto-Steganography

Loading document ...
Page
of
Loading page ...

Author(s)

Author(s): Araoye O. I., Adewale O.S., Alese B.K., Akinyede O. R.

Download Full PDF Read Complete Article

DOI: 10.18483/ijSci.1550 77 280 82-88 Volume 7 - Feb 2018

Abstract

Mobile agent is gaining attention in the research community because of its potential to replace traditional client-Server application in computer network system. Mobile agent has the ability to migrate autonomously from one server to another server as specified in its itinerary in computer network. Areas where mobile agent profit includes network management, information retrieval and electronic commerce. Mobile agent can be delegated to carry out all stages that are involved in electronic commerce such as Product brokering, Merchant brokering, Negotiation and Purchase. However there are security vulnerability issues with mobile agent system such as the need to ensure confidentiality of information of the agent from malicious parties, integrity of the data of the agent and non-repudiation from parties involves in the transactions. Security measure by agent developers has been mobile cryptography. This research combines Elliptic curve cryptography (ECC) and Steganography known as crypto-steganography to secure its agent. The agent was developed using PHP 5.0, Javascript, HTML, Wampserver and MySQL. The system was tested on a local area network with six computer systems, one of the computers represent client and the other five as servers. Performance evaluation was carried out to test for execution time and workload effect on the system. The result was compared with the existing secured agent-based electronic commerce systems in term of response time. The result shows that the proposed security is faster than RSA but a little slower than ECC only. A trade off was observed between a more secured system and response time of the system.

Keywords

Mobile agent, Electronic Commerce, Crypto-Steganography, Security, Client-Server

References

  1. Antonio, C., Gian, P. P. and Giovanni, V. (1997), Designing Distributed Application with a Mobile Code Paradigm, Proceedings of the 19th International Software conference on Software Engineering, Seattle, USA, 22-32.
  2. Araoye, O. I., Adewale, O. S., Alese, B. K. and Akinyede, O. R. (2017), North Asian International Journal of Sciences, Engineering & IT, Vol3, Issue 11
  3. Bahrammirzaee, A.,Chohra, A.,Madani,K.(2013), An Adaptive Approach for Decision MakingTactics in Automated Negotiation. AppIntell. doi:10.1007/s10489- 0130434-8.
  4. Barnes, S. J.,Vidgen, R.T., (2000), An Integrative Approach to The Assessment of E- Commerce Quality, Working Paper. http:/www.webqual.co.uk/ papers/webqualbookshop.pdf.
  5. Berners-Lee T. (1999), in: Weaving the Web, Orion Business, New York.
  6. Dave S. and Bart P. (2004): Secure e-Commerce Using Mobile Agents on Untrusted Hosts, COSICInternal Report.
  7. Gian, P. P. (1998), Understanding, Evaluating, Formulating and Exploiting Code Mobility, Ph.D Thesis, Politeccnico di Torino, Italy.
  8. Giovanni, V. (1998), Mobile Code Technologies, Paradigms and Applications, Ph.D Thesis, Politecnico di Milano.
  9. Hohl, F. (1998),A Model of Attacks of Malicious Hosts Against Mobile Agents, Proceedings of the ECOOP Workshop on Distributed Object Security 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, INRIA, France,105 -120.
  10. Kannamal, A. and lyenger, N. Ch.S.N. (2007, A Model for Mobile Agent Security in E- BusinessApplications, International Journal of Business and Information, 2(2),185-198.
  11. Kwang, H. J., Tessuo, K. A., Nairo,S. (2000), Design and Implementation of an Agent Based Grocery Shopping system, IEICE, Vol. E83- D, No.ll.
  12. Mario, B. and Gian, P. P. (1998), Evaluating the Tradeoffs of Mobile Code Design Paradigms in Network Management Applications, Proceedings of the 20th International Conference on Software Engineering, Kyoto, Japan, 146-155.
  13. Mario, B., Silvano, G. and Gian P. P. (1997), Exploiting Code Mobility in Decentralized and Flexible Network Management, Proceedings of The First International Workshop on Mobile Agents, Berlin, Germany.
  14. Richard, S., and Jose, G.O. (2009), Security Analysis of an Agent-Mediated Book Trading Application, International Journal of computing and ICT Research, Special Issue 3(1).
  15. Sougata, K., Arifit, D., Zhang, Y., Li, L. and lyengar, Ch.S.N. (2012), Agent-Based Secured e-Shopping UsingElliptic Curve Cryptography, International Journal of Advanced Science and Technology, 38, 93-115.

Cite this Article:

  • BibTex
  • RIS
  • APA
  • Harvard
  • IEEE
  • MLA
  • Vancouver
  • Chicago

International Journal of Sciences is Open Access Journal.
This article is licensed under a Creative Commons Attribution 4.0 International (CC BY 4.0) License.
Author(s) retain the copyrights of this article, though, publication rights are with Alkhaer Publications.

Search Articles

Issue October 2019

Volume 8, October 2019


Table of Contents


Order Print Copy

World-wide Delivery is FREE

Share this Issue with Friends:


Submit your Paper