2113695434A REVIEW ELECTRONIC PAYMENT GATEWAY

advertisement
A REVIEW: ELECTRONIC PAYMENT
GATEWAY SYSTEM
Er.Jaspreet Kaur1,Er.Shiwani Aggarwal2, Gurpreet Kaur3
1
CSE.LCET,KATANI KALAN
Email Address
1raijaspreet@gmail.com
2
IT.LCET,KATANI KALAN
Email Address
2shiwani.aggarwal20@gmail.com
3
IT,PCTE Group of Institutes
Email Address
3gurpreetrai1990@gmail.com
ABSTRACT – This paper discusses a secure and
protected system of electronic payment for
transactions over the Internet. A service provider or
a merchant is paid online with electronic payments.
The online transaction payment system offers a
gateway that utilizes different security tools to
protect the customer’s information of credit or debit
card; it is a channel between the payment
processors and the users. Although the information
or customer’s data is not totally hidden or protected
as the merchant has access to some of the
customer’s information. Trust towards the online
system is imperative for the success of e-commerce.
This paper signifies the perceptions of security and
privacy on online transactions. Customer’s trust is
very important in addition to other known factors.
Keywords: Payment Gateways, Online Payment
Systems, Safe Electronic Transaction, electronic
commerce, Dual Signatures, online trust.
commerce industry, which engages the flow of money that is to
be obtained in electronic form for the products or services
provided. In contrast, internet is also known to be the fake,
fraudulent,
unsecure
and
an
untrustworthy
mode
of
communication for the online payment system. As the frauds and
scams are increasing in the e-commerce online payments
different reliable gateways are also coming into the picture of
internet community. Critical issues involvements in the
transaction security system all over the global world in methods
of securing a financial transaction are conveyed over different
stages of a transaction. Some financial institutions like banks are
in the process of making and providing an proficient and secure
means for online sales and purchase. They are also trying to
motivate the people towards e-commerce.
E-commerce and payment transactions handling in a vigorous,
strong and effective payment system are necessary; this
guarantees the legitimacy and authorization of users and the
payments. A user can conduct online transactions if only he/she
I INTRODUCTION
haves an online account over the system and a valid debit/ credit
card. While taking the responsibility of an online monetary
Advancement in the e- commerce has made the online
transactions as the most convenient, easy and reliable form of
doing payments in the financial transactions. E-commerce
transaction there is always a sense of uncertainty and lack of
confidence to give information details over the internet. The
system guarantees the authentication of the privacy level of the
industry plays a foremost and imperative role in refurbishing the
user’s information to all the delivery channels. The privacy is to
online business i.e. performing online sales and purchase of
be kept of the transaction details and the customer’s personal
different products over the internet. Internet has provided a
descent and vast platform for the revolution of electronic
information.
Internet and different online systems are now incrementally
commerce application service source that approves payments for
developed making the customers easy to use it. More suitable
online
and convenient ways are now available for the conductance of e-
Payment gateways shield the details by encrypting susceptible
commerce. Secure payment gateways must be ensured for the
information, such as card and account numbers, to guarantee
financial transactions to protect and private the delivery of the
that information is conceded securely amid the customer, the
information details.
trader and the payment processor.
Various methods are available to encrypt and decrypt the
A Working of the payment gateways
transaction and personal details that are exchanging in between
A gateway assists the transmitting of information amid a
the users and the merchant in a secure payment gateway
payment portal (e.g. a website, cell phone or an IVR service)
technology. For a transaction, occurring over the internet,
and acquiring bank or the Front End Processor. When a
through a secure channel includes a total of three parties i.e. a
customer orders a product or service variety of tasks is
user who is paying, a service provider/ merchant to whom the
performed by the online payment gateway to continue process
money is paid via a system and the financial organization like
the transaction.
retailers, e-businesses, bricks
and
clicks.
banks or any other payment processing subsidiaries such as
payza, paypal, etc. In such situation, all of the three are
2.1.1) Placement of order takes place by the customer on
associated
pressing the 'Submit Order' or any other comparable button.
through
a
safe
and
protected
means
of
communication. The persons interfering the network traffic
Credit card details are also entered using any authentic service.
gains access to the sensitive information of the customers such
as credit/ debit card nos. account information, identity numbers
2.1.2) Encryption of the information by user’s browser to send
and many more. To secure the information the gateways in the
to the merchant's web server is the next step. Several methods
online system utilizes different encryption algorithms and
are available for encryption in which one of them is
cryptographic techniques.
via SSL (Secure Socket Layer)
2.1.3) Direct payment to the merchant bypassing the merchant's
II HISTORY
To establish an online transaction, one needs to form a payment
systems from the user’s web browser. This lessens the
gateway on the e-commerce site that enables online shopping
merchant's PCI-DSS conformity obligations without redirecting
and offers the customers to pay by debit or credit card. Choosing
the user away from the site.
the secure and authentic payment gateway is one of the most
difficult steps. The channel takes the billing information
2.1.4) Forwarding of details by the merchant/ trader to the
submitted by the user’s computer, through a protected server,
payment gateway occurs. This is another connection of
and towards the service provider account that is present in the
encryption to a payment server that is hosted by the gateway.
financial institution. The entry transaction is invisible and
flawless to the customer, but to those worried about the
sanctuary,
An
it
is
online payment
no
matter
which
gateway system
but
invisible.
is
an
e-
2.1.5) Payment processor receives the transaction details by the
payment gateway used by the merchant's obtaining bank.
2.1.6) The card association (i.e. Visa/ Master Card) receives the 2.1.16)
The total of the approved funds is deposited in to the
merchant’s nominated account through bank after a day or so. It
details from the payment processor.
may be on the same bank as if the merchant do banking with the
2.1.7) The arrival of the authorization request by a credit card
same bank.
issuing bank and fraud occurs then the debit or credit checks and 2.1.17) It takes almost 3 days to complete the process from
send a rejoinder to the processor (via same method) with a authorization to settlement.
response code [such as: approved or denied].
2.1.8)
Some gateways also provide their customers various tools to
A response code is utilized at the time of failure of a
transaction and defines it why it happens such as it can occur
because of unavailable bank link or insufficient funds. In the
meantime, the card issuer holds an agreement linked with that
detect fraud and to calculate tax on the payment. Geo-location,
velocity analysis on patterns, blacklist lookups, computer finger
print technology, list of OFAC and other such tools are used to
detect fraud.
merchant and customer for the approved amount. This impact
III SECURE PAYMENT GATEWAY SYSTEM
the consumer's ability as it decreases the line of credit available
INFRASTRUCTURE: REUIREMENT ISSUES
to the customer.
2.1.9)
The payment gateway receives the authorization reply
Acceptance and trust of the clients plays a significant role in ecommerce world as online transactions are concerned. Most of
from the processor.
2.1.10) The payment gateway then forwards it to the website or
any other interface that is utilized to process the payment. There
it is inferred as an applicable response then relayed back to the
card holder and the merchant; it is the Authorization or "Auth"
the customers pays for the thing before seeing it in the concrete
form, as the payment is done electronically. Integrated software
and hardware is used to pay for the goods and services through
online system. This system is called EPS and its main objectives
are to increase security of payment, customer satisfaction and its
2.1.11) This process will take approximately 2 to 3 seconds.
2.1.12) The merchant then assures that all the orders are
completed and then the whole process is repeated but that time
consumed is termed as Clear. The word Clear is initiated when
the merchant had accomplished the transaction. After this
convenience and to enhance efficiency. These type of systems
are not matured yet abut some appreciable improvements have
been done in this field. There are many other methods and
functions through which we can enable the implementation of
EPS.
procedure the issuing bank clears the auth and then it prepares
to settle the deal with the merchant acquiring bank.
2.1.13)
The
merchant
then
offers
all
the
approved
authorizations in a batch that may be the end of the day to the
acquiring bank for the settlement through its processor.
2.1.14)
The batch settlement request of the credit card issuer is
made by the acquiring bank.
2.1.15)
The next day the acquiring bank makes a settlement
payment with the credit card issuer.
Figure 1 Electronic payment scheme
access it to make it inconveniencing for him or to have some
A EPS SECURITY MODEL
other impact. Just for an example, if anyone breaks any website
CIA triad is one of the widely applicable security models but it
of a specific search engine its rival will get more opportunity to
is very simple. There are three main and key principles, which
become popular.
should be present in any secure system, they are availability,
confidentiality and integrity. The whole subject of Security
3.1.4) Public Key Cryptography: Two keys are used in public
analysis is applicable through these principles. Its security
key cryptography; the first key is used publicly and the second
should be from encrypted data on internet to the user’s internet
one is used privately in order to encrypt and decrypt data. It is
history. Breach in any of the three principles can cause great in-
the process through which, we can assure the integrity, security
convenience and consequences for the all parties concerned. To
and accuracy of the data; by changing it to an unreadable form
have a secure electronic funds transfer is more crucial to e-
for the user called cipher text. The one who have the private key
commerce. To assure the integrity and security of every
can decrypt the data into the plain form to make it useable for
electronic transaction all the described security measures or
him. Public key cryptography is a method in which two keys are
some of them directly relates to EPS. These technologies are
used, one is public and second is private but in contrast to this
digital signatures, authentication, certificate and public key
system, private key cryptography uses one key for encryption.
cryptography.
The benefit of using two key techniques is to allow the
businesses to give away the public key to anyone who wants to
3.1.1)
Confidentiality:
To
hide
information
from
the
send a message to them. The sender has the ability to encrypt
unauthorized users and people is known as confidentiality. It is
the data and can send it to the receiver through internet or any
the most obvious aspect of the CIA triad when we talk about the
public network. Then the receiver who has the private key can
security. But it is also correspondingly one of the main thing
decrypt the data and it is clearly that the private key is not
that is most often attacked. There are many methods through
publicly known.
which confidentiality could be ensured; like encryption and
cryptography. These methods use to transfer the data from one
3.1.5) Digital Signature: The digital signature is the electronic
computer to another safely.
one that is used to authenticate some message or any document
rather than the written signature by the individuals. The latest
3.1.2) Integrity: To ensure that the data transferred is accurate
and it is not changed from the original text is the ability that is
known as integrity. It should be the representation of the
original source; it is attacked in such a manner that it is often
changed before sending it to the receiver computer.
3.1.3) Availability: The administration should also make the
data and information accessible to all the authorized users all the
time. Very important factor should be considered. The attack on
this principle is done by not allowing the authorized user to
technology of E-check also enables the digital signature to only
applied for document blocks rather than the whole document.
This allows the user to separate the part of the document from
the original one without compromising the integrity of the
digital signature. This helps the businesspersons to transfer the
legal documents over the web in a safer way. A digital signature
is not a very complex system it is just an electronic message,
which is encrypted with a private key.
IV KEY THREATS TO INSECURE ONLINE
TRANSACTION SYSTEM
4.6.2) Chosen Plaintext and Chosen Cipher text Attacks: A
chosen plaintext attack is in which a cryptanalyst encrypt the
Almost every computer either they are government/personal or
plaintext of the chosen and studies the consequential ciphertext.
belongs to an organization they are severely affected by the
This is against the asymmetric cryptography, in which a
security threats. The security threats while making the
cryptanalyst accesses to a public key.
authentication requirements are described below:
An attack where a cryptanalyst prefers a cipher text and put
A Online Guessing: An unauthorized person connects to the
effort to establish a matching plaintext is a chosen ciphertext
verifier via any network; and tries to achieve a secret token that
attack. This is done with a decryption oracle that is a machine
may be password etc in the attack. He has the goal to affect the
capable of decrypting without revealing the keys. This is often
legal user.
executed on attacks vs. the public key encryption; it commences
B Session Hijacking: Hijacking is the security attack in which
with a ciphertext and investigates for corresponding publicly
the person tries to attempt to take over the application user
situated plaintext data.
session. Session hijacking is done with the technique that the
V EMERGING ISSUES WHILE ERFORMING
session may be protected with initial authentication transaction
ONLINE TRANSACTIONS
in the beginning of the session but not thereafter.
A Do I need to upgrade my online accounts to use Extended
C Phishing: This is also called verifier impersonation attack in
Validation (EV) certificates?
which the attacker behaves to fool the user into exposing the
EV certificates don’t require the updating of online account and
secrets.
information details; some mails trick the individual into giving
D Replay: In replay attack, the attacker replays and record a
financial and personal details by saying that it is needed to
few parts of a preceding successful authentication protocol
upgrade the account. They trick by saying that it is need to
operation to the verifier to gain access to susceptible data.
secure the account with an EV certificate. Internet Explorer, a
E Exploit attack: The exploit attacker knows a security
web browser, supports the EV certificate natively and there is no
problem of an operating system and influences that knowledge
additional need other than to visit a website. If bank uses an EV
by utilizing the vulnerability.
certificate, the address bar at the browser will be green and if
F Cryptographic Attack Methods: These are six attack
green bar is not available, then the website does not utilize an
methods, comprising three ciphertext-based plaintext-based and
Extended Validation certificate.
three plaintext-based methods:
4.6.1) Known Plaintext &Ciphertext: Only Attacks
A plaintext attack is where a cryptanalyst has right of use to a
plaintext and to the analogous ciphertext. It seeks to determine
an association between the two. A ciphertext-only attack is one
in which a cryptanalyst accesses to a ciphertext but do not has
access to the equivalent plaintext. The Caesar Cipher frequency
study uses to split the cipher.
B If a website offers secure transactions, does it mean that a
website is safer to use?
It is not necessary that if a website practices a secure financial
transaction than the website is also a safe page to visit; the
secure and encrypted connection is not an assurance for a safer
use. A safe connection only promises the identity of a website,
supported on the information offered by the certifying
organization. Consideration should only be giving to a personal
information to a secure and trusted website.
C How can I increase the safety of my online transactions?
that the user does not have to install any additional software
In the absence of certification of safety on website, you can
to get digital certificate.
reduce online privacy or the different security problems of
utilizing a website that you are acquainted with and trust.
Internet Explorer cannot identify if an owner of a website is
trustworthy or not. It is always recommended to use the sites
that are previously used by you and the trusted family and
friends. Phishing Filter of Internet Explorer helps identify the
fraudulent and fake websites
ACKNOWLEDGEMENT
It is our pleasure that we have such seniors, research fellows
and other committee members that we like to thank them. It
would be not be possible to complete this paper without their
help and guidance. Want to give special thanks to Mr.Pankaj
Singh as he inspired us and motivated us with their vast
D What does it mean to have a mixed content?
experience in this field. Lastly, we would also like to thank
Mixer content comprises of secure and the non-secure content,
God for his showers of blessings on us.
that identifies that a webpage is on the way to display the secure
and non-secure elements web server connections (HTTPS/SSL
REFERENCES
[1] Jiangtao Li and Ninghui Li. OACerts : Oblivious Attribute
and HTTP. This occurs with financial transactions occurring in
Certificates, CERIAS and Department of Computer Science, Purdue
the stores or other sites that depicts banners, images, scripts or
University
anything receiving from a unsecure network. The mixed content
[2] Mohamed Nabeel, Elisa Bertino. CloudMask Private Access
display is at a risk that a non-secure webpage may be capable of
accessing the information from the secure content.
Control in the Cloud, Purdue University, West Lafayette, Indiana,
USA
[3] Ning Shang, Mohamed Nabeel, Federica Paci, Elisa Bertino. A
Privacy-Preserving Approach to Policy-Based Content
CONCLUSION
We have to examine the security measures of various
Dissemination, Purdue University,West Lafayette, Indiana, USA
companies before choosing a payment method as the
H. Hussmann. Touch me once and I know it’s you!: implicit
reputation of our business depends upon it. The provider
authentication based on touch screen patterns. In Proceedings of the
should have proper arrangements and security techniques.
128-bit digital certificate is the way through which the data
[4] De Luca, A. Hang, F. Brudy, C. Lindner, and
2012 ACM annual conference on Human Factors in Computing
Systems, CHI ’12, pages 987–996, New York, NY, USA, 2012.
[5] R. Biddle, S. Chiasson, and P. van Oorschot. Graphical
could be secured. The warehouse where data is stored and
passwords: Learning from the first twelve years. Technical report
payment gateway services are housed should have proper
TR-11-01, School of Computer Science, Carleton University,
physical and informational security arrangements. Firewall
January 2011.
and intrusion detection systems should have been installed
[6] Ajeet Singh, Gurpreet Kaur, M.H Khan, Manik Chandra,
Shahazad,
National Conference on Information, Computational Technologies and e-
on the providers operating system. It should also have
Governance (NCICTG 2010) in Laxmi Devi Institute of Engineering &
database security and transaction security in that place. The
Technology, Alwar (Raj), India ,”The Secure Electronic Payment System Using
data cryptography and authenticity checking is the benefit
SET Protocol Approach. 19 to 20 Nov- 2010.
of the online transactions. The merchant is not allowed to
see the payment information and customer can use the
system easily. Another advantage of using this system is
[7] Ajeet Singh, M.H Khan, Manik Chandra, Shahazad “Implementation of
Payment System for Internet Transaction” International conference on
concurrent Techno and Environ search-in Bhopal, India, 4th-5th Dec. 2010.
Download