Document 14671617

advertisement
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
34
Increasing Security Reliability in E-Commerce Platform through Customer Tracker and Code Inclusion
1
2
Chukwurah E.E
Mbachu C.B.
1,&2
Department of Electrical and Electronic Engineering, Anambra State University, Uli.Anambra State, Nigeria
Email: 1 messiahmessiah9@yahoo.com
dambac614@gmail.com2
Abstract
E-commerce is fast growing media by which businesses and other market forms are achieved without the physical
presence of the individuals in the business. Some exiting e-commerce platforms suffer from file inclusion vulnerability
which allows an attacker to include a file, usually through a script on the web server and this occurs due to the use of usersupplied input with weak validation. These platform output the contents of the file, execute codes on the client side, web
servers while creating the possibility of cross site scripting (XSS), denial of service (DoS) and data theft/manipulation.
This paper developed a customer tracker and code inclusion analytics (CT-CIA) that monitors the http request of the
customer as well as the browser system details. When these are collected, it is sent to the e-commerce analytics servers in
the form of a long list of parameters attached to a single-pixel image request. The data contained in the request is the data
sent to the e-commerce analytics server, which then generates the processed inclusion code for reliable customer
transaction. The flowchart descriptions and process procedures are detailed while arguing that the approach offers
excellent protection against some methodologies in terms of cost, flexibility, reliability, and intelligence.
Keywords: Customer Tracker (CT), Code Inclusion Analytics (CIA), Hybrid Encryption, Cloud E-commerce Audit,
Feedback Security, SMS System.
IJOART
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
35
1. Introduction
1.1. Background Study
The viability of e-commerce is threatened with various forms of vulnerabilities.confidentiality, integrity, authenticity, access control, privacy,
availability, authorization and accountability are serious issues facing the e-commerce ecosystem [1]. This is because users access the ecommerce accounts by simply logging and shopping without an effective security checks and verification procedures. When the e-commerce
platform runs on the Cloud, this computing approach moves the application software and databases to the large datacentres, where the
management of the data and services are not trustworthy [2]. According to [2], this unique attribute, however, poses many new security
challenges. The challenges include but not limited to accessibility vulnerabilities, virtualisation vulnerabilities, web application
vulnerabilities such as SQL (Structured Query Language) injection and cross-site scripting, physical access issues, privacy and control issues
arising from third parties having physical control of data, issues related to identity and credential management, issues related to data
verification, tampering, integrity, confidentiality, data loss and theft, issues related to authentication of the respondent device or devices and
IP spoofing.
Users need to be assured of their transactions on the e-commerce platforms so as to encourage online transaction paradigm. It should be be
noted that the advent of cloud internet system has facilitated a quantum leap in online presence as more business consignment and
individuals are engaging in more versatile bulk money businesses that the traditional trading security does not guarantee and the globalization
of the world as a global village has made trading online a honey comb. The rapid development of the e-commerce has prompted transaction
security issues to become object of attention. The transmission of information such as the account names, passwords, details of financial
transactions and other requests from the e-commerce portal to the web server, must remain confidential. It is on this note that the information
needs to be transmitted privately, securely and correctly between the e-commerce service provider and the customers. It is therefore important
that the ever increasing population of online marketers be guarded and secured against fraud associated with online businesses. This can be
achieved by incorporating securities that will identify usernames and passwords, generates transaction codes for users and a feedback SMS
security system via mobile phones, show list of users and enable cloud audit at any point in time, also be able to disable users for any
evidence of wrong use of transaction codes or activities likely to be fraud. The E-commerce visitor tracking (EVT) is the analysis of visitor
behaviour on a E-commerce platform under the jurisdiction of assigned privileges. In this case, the forensic analysis of an individual visitor's
behaviour may be used to provide an audit logs and preferences; either during a visit or in the future. In this work, the context understanding
a web site visitor’s behaviour in order to identify buying intentions is very vital.
IJOART
In this research, customer tracking and code inclusion algorithm (CT-CIA) is a useful approach to combat web vulnerabilities. The
background encryption security system in the proposed e-commerce system is based on hybrid XAMP MD5 Random curve cryptography
running on the secure socket layer (SSL), which protects the users and administrators on the e-commerce platform. The E-commerce design
uses a secured administrator interface (customer tracker) that shows list of customer's logins, enables cloud audit at any point in time, can
disable customers when there is element of ambiguity and generates transaction codes i.e. a number generated during registration which
will be sent to the users e-mail or phone via SMS, the user will in turn provide the same code in transaction ID window, after the login
window, this serves as feedback security or extra layer security in the system .The result of the new security scheme randomly generates and
secures the login details dynamically on the server during, authentication, authorization, and verification phases. This form of security is
designed to give any user of this portal confidence and reliability to carry out any transaction on e-commerce platform.
1.2.Our Contribution
Many useful security models have been introduced by researcher, but the unique property of the proposed E-comer CT-CIA is the customers
tracker, cloud audit and transaction code generation that will be sent via SMS to the customers mobile line, this serves as feedback security
which is an extra layer security. This work then explores the intelligent analytics of the CT-CIA to bring about a secure e-commerce event
driven philosophy.
2 .Related Works
In [3], Google Analytics has been developed which works by the inclusion of a block of JavaScript code on pages in a website. In their work,
when users on a website view a page, this JavaScript code references a JavaScript file which then executes the tracking operation for
Analytics. The tracking operation retrieves data about the page request through various means and sends this information to the Analytics
server via a list of parameters attached to a single-pixel image request.
In [4], the authors presented a design of a new security protocol using hybrid cryptographic algorithm for on line transaction. This captured
the combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives (such as
integrity, confidentiality and authentication) which will be achieved with the help of Elliptic Curve Cryptography, Dual-RSA algorithm and
Message Digest MD5. Similarly, In [5], the author proposed a framework based on smart card that allows partners to realize secure
transactions. The proposed solution use smart cards to store keys and perform cryptographic algorithms. Their approach is an e-business
framework based on smart card technology. In this case, Keys, certificates and digital signatures are stored in the card. The card also
performs the on-board cryptography operations. Also, the work in [6], and [7] all focused on Cryptographic Algorithms to secure ecommerce transactions. Possible vulnerabilities as found in all e-payments e.g E-commerce PayPAL have been identified in Figure 1.
According to [8], the three top web site vulnerabilities include:
i. SQL Injection: This uses SQL to change the meaning of database command. (Refer to Figure 2).
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
ii.
iii.
-
36
Browser sends malicious input to server
Bad input checking leads to malicious SQL query
Cross-site request forgery (CSRF): This leverages user session at victim server. (Refer to Figure 3).
Bad web site sends browser request to good web site, using credentials of an innocent victim
Cross-site scripting (XSS): This injects malicious scripts into trusted contexts. (Refer to Figure 4a, b).
Bad web site sends innocent victim a script that steals information from an honest web site.
IJOART
Figure 1: Web Reported Vulnerabilities With Detection Rates [8]
Figure 2: SQL Injection [8]
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
37
Figure 3: Cross-Site Request Forgery [8]
IJOART
Figure 4a: Reflected Cross-Site Scripting [8]
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
38
Figure 4b: Stores Cross-Site Scripting And Reflected XSS [8]
IJOART
The major problem faced by consumers in an online transaction is the security vulnerability identified previously. The insecurity is due to the
fact that 1.
2.
3.
Most of the platforms lack the benefits of validation code inclusion as a service (VCIaaS).
Most of the platforms build weak self-inclusive SQL commands. The use of parameterized and prepared SQL is usually lacking.
Most works do not use Object-relational mapping ORM framework. This is programming technique for converting data between
incompatible type systems in object-oriented programming languages. This creates, in effect, a application object database that can
be used from within the programming language. There are both free and commercial packages available that perform objectrelational mapping, although some programmers opt to create their own ORM tools.
Figure 5: ORM Framework
4.
Secret Validation Token such as < input type=hidden value=23a3af01b> has not been explored in most cases.
5.
Referer Validation such as in facebook (Referer: http://www.facebook.com/home.php) is still the most used validation login
procedure but when wrongly implemented, SQL injection could threatened it.
6.
Custom HTTP Header is sometimes poorly implemented e.g, X‐Requested‐By: XML Http Request
This work adopted CT-CIA as a Secret Token Validation (STV) in which requests include a hard-to-guess secret. The variations are:
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
-
39
Session identifier
Session-independent token
Session-dependent token
Hash Message Authentication Code (HMAC) of session identifier
3. METHODOLOGY
3.1. ORP Framework/Waterfall Model
This work used the ORP framework in which tasks act on object-oriented (OO) objects that are non-scalar values. In this case, logical
representations of the objects are translated into an atomized form that is capable of being stored in the database, while preserving the
properties of the objects and their relationships so that they can be reloaded as objects when needed. With persistence, storage and retrieval
functionality were implemented. This was applied in CT-CIA proposal. Figure 6 shows the waterfall model applied in deriving Figure 5. It
shows the basic steps towards the implementation and integration of the security scheme.
IJOART
Figure 6: CT-CIA Waterfall Flow Diagram.
3.2. Description of CT-CIA Technique
In this case, the CT-CIA is a conceived Hash Message Authentication Code (HMAC). This was used as a specific construction for calculating
a message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key. As a MAC, it
was used to simultaneously verify both the data integrity and the authentication of a customer transaction message. The work employed the
cryptographic hash function, MD5/SHA-1 for use in the computation of e-commerce HMAC. When adapted to MD5, the resulting MAC
algorithm is referred to as e-commerce HMAC-MD5 but when used in SHA1, this is referred to as HMAC-SHA1 accordingly. The
cryptographic strength of the HMAC depended upon the cryptographic strength of the underlying hash function offered by the database logic,
the size of its hash output, and on the size and quality of the key. In operation, an iterative hash function breaks up a message into blocks of a
fixed size and iterates over them with a compression function. In this case, the MD5 operates on 512-bit blocks. The size of the output of
HMAC is the same as that of the underlying hash function, ie MD5 = 128 bits , and SHA-1= 160bits, respectively.
3.3 Security Algorithm
The security key is given by the operator:
\textit{ CT-CIA} [CK, CM] = H\Big(K\oplus opad)\;||\;H\big((CK \oplus ipad)\;||\; CM \bigr)\Bigr)
Where
H is a cryptographic hash function,
CK is a secret key padded to the right with extra zeroes to the input block size of the hash function, or the hash of the original key if
it is longer than that block size,
CM is the message to be authenticated,
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
40
|| denotes concatenation,
⊕ denotes exclusive or (XOR),
opad is the outer padding (0x5c5c5c…5c5c, one-block-long hexadecimal constant),
and ipad is the inner padding (0x363636…3636, one-block-long hexadecimal constant).
This work used the following pseudocode to demonstrate the implementation of the CT-CIA (HMAC) was implemented with MD5. Block
size is 64 (bytes) when using MD5 hash functions.
Function HMAC (key, message)
if (length(key) > blocksize) then
key = hash(key) // keys longer than blocksize are shortened
end if
if (length(key) < blocksize) then
key = key ∥ [0x00 * (blocksize - length(key))] // keys shorter than blocksize are zero-padded (where ∥ is concatenation)
end if
o_key_pad = [0x5c * blocksize] ⊕ key // Where blocksize is that of the underlying hash function
i_key_pad = [0x36 * blocksize] ⊕ key // Where ⊕ is exclusive or (XOR)
return hash (o_key_pad ∥ hash(i_key_pad ∥ message)) // Where ∥ is concatenation
end function
//HMAC_MD5("", "") = 0x74e6f7298a9c2d168935f58c001bad88
//HMAC_SHA1("", "") = 0xfbdb1d1b18aa6c08324b7d64b71fb76370690e1d
//HMAC_SHA256("", "") = 0xb613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c712144292c5ad
End.
IJOART
3.4. Proposed Cloud E-Commerce System
It could be recalled that the proposed e-commerce transaction is developed for products and services using waterfall with a reuse model
shown in Figure 6. The system represents a combination of all the basic functionalities of the e-commerce models leveraging the CT-CIA. In
its operation mode, the e-commerce platform depicts a scenario where a user registers on the platform and a code (HMAC) is generated by
the administrator and sent electronically as SMS to the mobile line (mobile phone) in putted in the transaction window. This now enables the
user to place order of products and services base on the administrator role privilege assignment. The main function of customer tracker work
orders is to initiate work, clarify the work to be done, the delivery date and special instruction with audit logs. The tracker ensures that the
work order tracks the progress of the online activity.
3.4.1. System Elements
In the proposed system model, the key factors include:
i. Cloud Super Admin Authentication Sa
ii. Dedicated Administrator Aarg[Da]
iii. Cloud Customers Cc1,Cc2,............Ccn
iv. Cloud Audit [Sales Audit]
v. Shopping/Order/billing
vi. Customer code generator
3.4.2. Architectural/ Operational Mechanism
In this architecture, the super admin Sa on the cloud portal assigns subsidiary administrators which are depicted Dedicated Administrator
Da1, Da2..............Dan, that coordinates and monitor the activities of numerous registered cloud customers Cc1,Cc2,............Ccn.. From user
perspective, the cloud customers who are legitimately registered are authenticated using HMAC in context and an immediate transaction code
will be generated from the Customers Code Generator and this will be sent as SMS via the customer's mobile number or e-mail. The access
control authentication and encryption algorithm intelligently grants or denies access to platform domain based on the logon and customer
transaction Code status of the cloud customer .The status control serves to enforce discipline on either DA or Cc, while the cloud audit stores
and displays customers transactions information when desired at any point in time in the cloud logs for all DA and Cc. Figure 7 illustrates the
proposed model.
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
41
IJOART
Figure7.Proposed model for the CES
3.4.3 IMPLEMENTATION
The system accepts new registration or prompts for a new registration. Essentially, it is either a customer
logs in or registers before initiating any transaction on the CES. Figure 8 shows CES user interface. The descriptive flow
charts used to develop the entire system model are presented below
Figure 8.E-commerce Cloud Portal (User Interface)
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
42
IJOART
Figure 9 E-commerce Cloud Portal (Login Interface)
Figure 10: E-commerce Cloud Portal (Registration Interface)
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
43
IJOART
Figure 11.E-commerce Cloud Super Admin Interface
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
44
IJOART
Figure 12. E-Commerce Cloud Register Admin Interface
Figure. 13 E-commerce Cloud Customer Info DB
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
45
IJOART
Figure 14: E-commerce Cloud Audit Log Interface
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
46
IJOART
Figure 15: E-commerce Cloud Assigned Administrators Interface
Figure 16: E-commerce Cloud Assigned Administrators Interface
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
47
This work used adobe dream weaver as the integrated development environment with a visual editor that supports Web
technologies such as CSS, JavaScript, and various server-side scripting languages and frameworks including ASP (ASP
JavaScript, ASP VBScript, ASP.NET C#, and ASP.NET VB), Code Fusion, Scriptlet, and PHP. The IDE was configured
with My SQL server in XAMP control panel which has integrated supports for Apache server and MySQL database. In
this work, entire program using the design phase of the SDLC waterfall model with Reuse model was tested using
different data and system platform.
Before the proposed e commerce was made fully operational, it was thoroughly tested on a local host server while
debugging and ensuring there is no syntax errors syntax errors giving rise to successful compilations while testing with
real user test data. After several tests, the reliability of the system was ascertained while making the necessary
documentation. In this research, the e commerce model was designed to run on the high performance data centre network
infrastructure comprising a MikroTik server with local host HP Envy m4 window8 running Apache, MySQL and CS4
adobe Dreamweaver IDE.
IJOART
Figure17 .CES user registration pictorial Framework
Figure 18.CES login Interface pictorial Framework
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
48
Figure 19 CES Shoping Cart (users accepted )
IJOART
Figure 20 CES login Interface( Denying access)
These at a glance show the major display that shows the level of dependability being projected to make security in ecommerce reliable.
4 .Results and Discussion
The display of the user interface was in line with the design flow charts. The flowcharts for the e-ecommerce system
model show the level of reliability of customer’s security. Figure 7 the e-commerce design, in which security was tested
yield satisfactory results. The design of the HMAC specification was observed to eliminate attacks on e-commerce system
based on the key with a hash function. The security of HMAC using MAC = H(key ∥ message) is very robust and reliable.
Unlike in most encryption schemes, the computational overhead of the CT-CIA is lower as the processor spends little time
generating the inclusion code string. Again, in some existing cryptographic algorithms as seen in literature, their methods
suffer from a serious flaw, in that with most hash functions, it is easy to append data to the message without knowing the
key and obtain another valid MAC (length-extension attack). The alternative, appending the key using MAC = H(message
∥ key), suffers from the problem that an attacker who can find a collision in the (unkeyed) hash function can use it quickly
to compromise the e-commerce system. Using MAC = H(key ∥ message ∥ key) is better, but various security papers have
suggested vulnerabilities with this approach, even when two different keys are used. No known extensions attacks have
been found against the current HMAC specification which is defined as H(key ∥ H(key ∥ message)) because the outer
application of the hash function masks the intermediate result of the internal hash. The values of ipad and opad are not
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
49
critical to the security of the algorithm, but were defined in such a way to have a large Hamming distance from each other
and so the inner and outer keys will have fewer bits in common. The security reduction of HMAC does require them to be
different in at least one bit. This is used to generate the authorization code for the e-commerce transaction via mobile
phone SMS. Table 1 summarises a comparison between the proposed and some existing schemes
Table 1: Comparison between Hybrid cryptographic Schemes and CT-CIA schemes (Performance Evaluation)
Parameter
Hybrid Security
Schemes
CT-CIA
Cryptographic
Security
Secrecy
Fuses
cryptographic
uniqueness with
secrecy
Takes a lot of
computation
resources
caters for secrecy
with least overhead
Comparison
process
This is done easily
with
fewer
computation
resources
User convenience requires
huge Requires
less
effort from the memorization of PINs
user
Vulnerability to It can be hacked With
constant
eavesdropping
if discovered by monitoring,
constant
passwords can never
monitoring,
be discovered
Vulnerability to
Highly
Less vulnerable
brute force attack
vulnerable
IJOART
Countermeasures
Counter attacks Counter attacks on
have not yet been password systems are
documented
well documented
Cost
Effectiveness
Very Expensive
PIN code systems are
relatively cheap
5. CONCLUSION
This research work developed a security integrated e-commerce system that leverages intelligent CT-CIA. This new
Security scheme which is based on hybrid XAMP MD5 Random curve cryptography with customer tracker code
inclusion, addresses the vulnerability in e-commerce domain. This scheme enables customers to carry out reliable and
flexible online transaction with ease. The extra security layer or feedback security guaranteed adequate security for online
transactions. Therefore this new security model is expected that over 80%of business owner will be offing their transaction
via this platform. This design of E-commerce security model reliability application is compactable with all browsers after
following the ORP waterfall methodology. A comparison between the proposed scheme and the generalized cryptographic
schemes shows that the performance of the proposed system is very satisfactory.
References
1. Bela, Genge, Adela Beres, Piroska haller, “A Survey on Cloud-based Software Platforms to Implement Secure
Smart Grids”, In IEEE, 2014.
2. S. Subashini, V. Kavitha , “A survey on security issues in service delivery models of cloud computing “, Journal
of Network and Computer Applications, Elesiver Scidirect. 34 (2011) 1–11.
3. Google Analytics. Online
https://developers.google.com/analytics/resources/concepts/gaConceptsTrackingOverview?hl=en, Retrived on
13th Sept.2015.
Copyright © 2015 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 4, Issue 11, November -2015
ISSN 2278-7763
4.
5.
6.
7.
8.
50
S. Subasree And N. K. Sakthivel, “ Design of A New Security Protocol Using Hybrid Cryptography
Algorithms”, IJRRAS 2 (2), February 2010.
Hakim Fourar-Laidi, “A smart card based framework for securing e-business transactions in distributed
systems”, Journal of King Saud University –Computer and Information Sciences, Computer and Information
Sciences (2013) 25, 1–5 http://dx.doi.org/10.1016/j.jksuci.2012.05.002.
Okafor N. I, Okafor K.C, Udeze C.C. & Onwusuru I. M, “3-Tier E-Comp: A Novel E-Commerce Management
Portal Based On Secured SDLC Approach”, Computing, Information Systems, Development Informatics &
Allied Research ISBN 978-2257-44-7(Print) ISSN 2167-1710 (online) Vol. 4 No. 4 Dec. 2013.Pp.1-11.
Okafor KC, Udeze CC, Okafor CM, ISCLOUD V.1.0: An Interactive Cloud Shopping Cart Based On Software
As A Service Computing Model With Hybrid Cryptographic Algorithm”, International Journal Of Engineering
And Computer Science ISSN:2319-7242 Vol. 2 Issue 6 June, 2013 Page No. 1727-1738.
John Mitchell, “Web Application Security”, CS 155, Spring 2010
IJOART
Copyright © 2015 SciResPub.
IJOART
Download