A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System

  • Akhilesh Dwivedi
  • Abhishek Dwivedi
  • Suresh Kumar
  • Satish Kumar Pandey
  • Priyanka Dabra
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 178)


Semantic Web Services (SWS) are crucial function of the Semantic Web, traditionally focused on discovery and composition of e-services. In the area of e-commerce services, e-commerce processes require the confidentiality of customer information, the integrity of product offers and the availability of the vendors’ servers. E-commerce extends the banking a good chance, but also creates a set of new risks and vulnerability such as security threats. Through the electronic transaction security is the most important phenomena to enhance the banking transaction security via e-payment transaction. Therefore our main contribution is an essential management and technical requirement for any efficient and effective e-payment transaction activities over Semantic Web.


Anonymity Confidentiality E-commerce Semantic Web Security E-services and Vulnerability 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kowalczyk, R., Ulieru, M., Unland, R.: Integrating Mobile and Intelligent Agents in Advanced E-commerce: A Survey. In: Kowalczyk, R., Müller, J.P., Tianfield, H., Unland, R. (eds.) NODe-WS 2002. LNCS (LNAI), vol. 2592, pp. 295–313. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    E-Payment, Malaysian Electronic Clearing Corporation Sdn. Bhd-My Clear (2010),
  3. 3.
    Glushko, R.J., Tenenbaum, J.M., Meltzer, B.: An xml framework for agent-based e-commerce. Commun. ACM 42(3), 106 (1999)CrossRefGoogle Scholar
  4. 4.
    Trastour, D., Bartolini, C., Priest, C.: Semantic web support for the business-to-business e-commerce lifecycle. In: Proceedings of the 11th International Conference on World Wide Web. ACM, USA (2002)Google Scholar
  5. 5.
    Schoop, M.: Semantic Web Technology for Electronic Commerce. In: Lechner, U. (hrsg.) (ed.) Proceedings of the Tenth Research Symposium on Emerging Electronic Markets, pp. S.1–S.9. University of Bremen, Bremen (2003), Google Scholar
  6. 6.
    Chaum, D.: Untraceable electronic mail, return address, and digital pseudonyms. Communication of the ACM 24, 84–88 (1981)CrossRefGoogle Scholar
  7. 7.
    Gulcu, C., Tsudik, G.: Mixing Email with Babel. In: Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS 1996), pp. 2–16. IEEE Computer Society, Washington, DC (1996)CrossRefGoogle Scholar
  8. 8.
    Joseph, P.T.: E- commerce: An Indian Perspective, 2nd edn. PHI (2006) ISBN: 8120327888Google Scholar
  9. 9.
    Kumar, S., Prajapati, R.K., Singh, M., De, A.: Realization of Threats and Countermeasure in Semantic Web Services. IJCTE 2(6), 919–924 (2010) ISSN: 1793-821XGoogle Scholar
  10. 10.
    Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology 1982. LNCS, pp. 199–203. Springer (1982)Google Scholar
  11. 11.
    RSABSAFE: Crypto-C Cryptographic Components for C Library Reference Manual Version 5.0 (2011)Google Scholar
  12. 12.
    Kong, H., Zeng, Z., Yan, L., Yang, J., Yao, S., Sheng, N.: Combine Elliptic Curve Cryptography with Digital Watermark for OWL-Based Ontology Encryption. In: Computational Intelligence and Security, CIS 2009, pp. 511–515 (2009)Google Scholar
  13. 13.
    Kumar, S., Prajapati, R.K., Singh, M., De, A.: Security Enforcement using PKI in Semantic Web. In: International Conference on Computer Information Systems and Industrial Management Applications (CISIM), pp. 392–397 (2010), doi:10.1109/CISIM.2010.5643507Google Scholar
  14. 14.
    Hassler, V.: Security Fundamentals for E-Commerce. Artech House Publishers (2000) ISBN: 1580531083Google Scholar
  15. 15.
    Kessler, G.C., Todd Pritsky, N.: Internet Payment Systems: Status and Update on SSL/TLS, SET,and IOTP (August 2000),
  16. 16.
    Jiang, L., Chen, H., Teng, F., Zhong, Q.S.: A Security Evaluation Method Based on Threat Classification for Web Service. Journal of Software 6(4), 595–603 (2011), doi:10.4304/jsw.6.4.595-603CrossRefGoogle Scholar
  17. 17.
    Basagiannis, S., Katsaros, P., Pombortsis, A.: Synthesis of attack actions using model checking for the verification of security protocols. Wiley Journal of Security and Communication Networks 4(2), 147–161 (2011)CrossRefGoogle Scholar
  18. 18.
    Ekelhart, A., Fenz, S., Tjoa, A.M., Weippl, E.R.: Security Issues for the Use of Semantic Web in E-Commerce. In: Abramowicz, W. (ed.) BIS 2007. LNCS, vol. 4439, pp. 1–13. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  19. 19.
    Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Van Herreweghen, E., Waidner, M.: Design, implementation, and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications 18(4), 611–627 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Akhilesh Dwivedi
    • 1
  • Abhishek Dwivedi
    • 2
  • Suresh Kumar
    • 3
  • Satish Kumar Pandey
    • 1
  • Priyanka Dabra
    • 1
  1. 1.Department of Information TechnologyDronacharya College of EngineeringGreater NoidaIndia
  2. 2.Department of MCARaj Kumar Goel Engineering CollegeGhaziabadIndia
  3. 3.Department of Computer Science & EngineeringAmbedkar Institute of Advance Communication Technology & Research, Govt. of NCT of DelhiNew DelhiIndia

Personalised recommendations