Agent in Ecommerce Application Based on Cloud Environment
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 6
Abstract
— In this paper secure dealer agent mechanism is implemented to provide market oriented approach by using cloud computing environment. Cloud by leveraging technologies, provides thought on market based resource management strategies that encompasses customer driven service management. The resources lie in a large stockpile in agent, from where it would be accessible to everyone. The Technology provided by the cloud for consider implement market oriented for providing services to the consumers. The services provided by the cloud computing to the providers pay for the services. Paper deals with ecommerce dealer agent mechanism transaction that enables business minded approach for the customers which is carried out from cloud computing. The main aim of the paper is to implement the mechanism such that the dealer is the actual ecommerce sites who will add its own product to the agent database. Agent is the one who will maintain all ecommerce sites product database and payment database. Agent searches the product in which ecommerce site the product is available. To start with web services enables the agent to service the product JAX-WS (web service) is used. Trading system is brought in a sense enabling trading. Direct payment is the default feature for buying product which then security concern is solved by PayPal sandbox implementation for secure transaction. The load impact performance of individual website is measured by using Load impact tool.
Authors and Affiliations
Ms. Divya Jyothi , Prof. D. R. Ingle
CLUSTER ANALYSIS OF SSTS FRAMEWORK USING SOCIAL NETWORK ANALYSIS
Educational Data Mining (EDM) is an emerging trend, concerned with developing methods for exploring the large data related to educational system. The data is used to obtain the Implicit and Explicit knowledge distr...
Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks
Privacy is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network...
Optimization of Searches on Social Networks using Graph theory and Formal Concepts Analysis
Social networking system is an online service, platform that focuses on facilitating the building of social relations among people who, for example, share interests, activities, backgrounds, or real-life connection...
Implementation of Citation Parser on the Basis of Knowledge Base Hierarchy
Use of the bibliographical information of publications available on the Internet is an important task in academic research. Accurate reference metadata extraction for publications is essential for the integration...
AUTOMATED AUDITING AND LOGGING MECHANISM FOR SECURE DATA STORAGE IN CLOUD USING PROXY REENCRYPTION
High-speed networks and ubiquitous Internet access become available to users for access anywhere at anytime. Cloud computing is a concept that treats the resources on the Internet as a unified entity, a cloud. Cl...