Volume 14 , Issue 1 , PP: 34-49, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Rohit Pachlor 1 , R. Mohanraj 2 , K. Sharada 3 , Savya Sachi 4 , K. Neelima 5 , Punyala Ramadevi 6
Doi: https://doi.org/10.54216/JCIM.140103
Secure protection of sensitive data and financial transactions is of the utmost importance in the dynamic world of online trade. In this study, we present a full-stack security architecture that uses five separate algorithms: ECF, Transaction Anomaly Detection, Adaptive Threat Intelligence, Behavioral Biometric Authentication, and Dynamic Encryption Protocol. By creating encryption keys on the fly while the user logs in, the DEP method lays a solid groundwork for safe data transfer. Behavioral biometric authentication (BBA) uses DEP output to verify users based on their distinct behavior, which is an extra layer of security. By combining both current and past threat information, the ATI algorithm is able to constantly adjust security protocols, providing a preventative shield against new dangers. TAD is an expert at detecting anomalies in online purchases, which helps keep financial transactions honest. When ECF and DEP work together, they filter email content, making communication more secure. Flowcharts help to illustrate the interactions between various algorithms, which helps to understand their operations in detail. Every algorithm's importance is brought to light by an ablation study, which shows how each one contributes and how they all work together to affect the overall security posture. The suggested security framework outperforms the state-of-the-art in terms of efficacy, adaptability, and usability, according to performance evaluations conducted using a number of metrics. These findings can help decision-makers build a strong security plan that is specific to the challenges of online shopping. To conclude, the suggested framework is an integrated and complementary strategy that will strengthen online trade in the face of several cyber dangers while simultaneously protecting the confidentiality, authenticity, and availability of all associated communications and transactions.
ATI (Adaptive Threat Intelligence) , BBA (Behavioral Biometric Authentication) , DEP (Digital Commerce , Dynamic Encryption Protocol) , ECF (Email Content Filtering) , Robust Security Framework , TAD (Transaction Anomaly Detection)
[1] E. G. Erickson, Childhood and Society, W.W. Norton, New York, 1963.
[2] A. M. Froomkin, "Just-in-time exchange relationships in industrial markets," Journal of Marketing, vol. 52, no. 4, pp. 52–67, 1988. [Online]. Available: Publisher Site.
[3] "The essential role of trusted third parties in electronic commerce," https://www.law.miami.edu/~froomkin/articles/trusted.htm/, accessed October 2001. [Online]. Available: Google Scholar.
[4] R. Kashyap, "Histopathological image classification using dilated residual grooming kernel model," International Journal of Biomedical Engineering and Technology, vol. 41, no. 3, p. 272, 2023. [Online]. Available: https://doi.org/10.1504/ijbet.2023.129819
[5] J. Kotwal, Dr. R. Kashyap, and Dr. S. Pathan, "Agricultural plant diseases identification: From traditional approach to deep learning," Materials Today: Proceedings, vol. 80, pp. 344–356, 2023. [Online]. Available: https://doi.org/10.1016/j.matpr.2023.02.370
[6] Edwin Ramirez-Asis, Romel Percy Melgarejo Bolivar, Leonid Alemán Gonzales, Sushovan Chaudhury, Ramgopal Kashyap, Walaa F. Alsanie, G. K. Viju, "A Lightweight Hybrid Dilated Ghost Model-Based Approach for the Prognosis of Breast Cancer," Computational Intelligence and Neuroscience, vol. 2022, Article ID 9325452, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/9325452
[7] D. L. Hoffman, T. P. Novak, and M. Peralta, "Building consumer trust online," Communications of the ACM, vol. 42, no. 4, p. 80, 1999. [Online]. Available: Publisher Site.
[8] L. T. Hosmer, "Trust: the connecting link between organizational theory and philosophical ethics," Academy of Management Review, vol. 20, no. 2, pp. 379–401, 1995. [Online]. Available: Publisher Site.
[9] S. Jarvenpaa, N. Tractinsky, and L. Saarinen, "Consumer trust in an Internet STORE: a cross-cultural validation," Journal of Computer-Mediated Communication, vol. 5, no. 2, p. December, 1-37, 1999. [Online]. Available: Publisher Site.
[10] H. W. Kee and R. E. Knox, "Conceptual and methodological considerations in the study of trust and suspicion," Conflict Resolution, vol. 14, no. 3, pp. 357–366, 1970. [Online]. Available: Publisher Site.
[11] K. Karvonen, "Creating trust," in Proceedings of the Fourth Nordic Workshop on Secure IT Systems, pp. 21–36, Kista, Sweden, 1999. [Online]. Available: Google Scholar.
[12] V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.
[13] R. Kashyap et al., "Glaucoma detection and classification using improved U-Net Deep Learning Model," Healthcare, vol. 10, no. 12, p. 2497, 2022. [Online]. Available: https://doi.org/10.3390/healthcare10122497
[14] Vinodkumar Mohanakurup, Syam Machinathu Parambil Gangadharan, Pallavi Goel, Devvret Verma, Sameer Alshehri, Ramgopal Kashyap, Baitullah Malakhil, "Breast Cancer Detection on Histopathological Images Using a Composite Dilated Backbone Network," Computational Intelligence and Neuroscience, vol. 2022, Article ID 8517706, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/8517706
[15] M. A. Raimondo227 ISTEI, "The measurement of trust in marketing studies: a review of models and methodologies," Retrieved on 15 March 2016. [Online]. Available: Google Scholar.
[16] M. Deutsch, "Trust and suspicion," Conflict resolution, vol. 11, no. 4, pp. 265–279, 1958. [Online]. Available: Google Scholar.
[17] Trust and the perception of security, "Interaction architect," January, http://www.interactionarchitect.com/research/report20000103shd.htm, accessed June 2001. [Online]. Available: Google Scholar.
[18] R. Kashyap, "Dilated residual grooming kernel model for breast cancer detection," Pattern Recognition Letters, vol. 159, pp. 157–164, 2022. [Online]. Available: https://doi.org/10.1016/j.patrec.2022.04.037
[19] S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808
[20] G. R. Dowling and R. Staelin, "An examination of the nature of buyer-seller relationships," Journal of Marketing, vol. 61, pp. 35–51, 1997. [Online]. Available: Google Scholar.
[21] G. R. Dowling and R. Staelin, "A model of perceived risk and intended risk-handling activity," Journal of Consumer Research, vol. 21, no. 1, pp. 119–134, 1994. [Online]. Available: Publisher Site.
[22] X. Dreze and F. Zufryden, "Is Internet advertising ready for prime time?" Journal of advertising research, vol. 38, no. 3, pp. 7–18, 1998. [Online]. Available: Google Scholar.