An Enriched Information Security Framework from Various Attacks in the IoT

Abstract

Security in various E-commerce Applications includes an efficient framework in Information Security especially in Computer Security, Data Security and other online transactions in E-commerce applications. Security in E-Commerce application plays an important role for the secure and scalable transaction which includes various dimensions such as security-integrity, Confidentiality, Non-repudiation, Privacy etc. Hence for the Security of Online Transactions in E-Commerce based application various Security algorithms are implemented. Although these Security algorithms are efficient and provides Security from various attacks but Data Storage during the transactions and Computational time of the algorithms is also important. The existing architecture proposed for the security of online e-transactions in web applications provides security from different attacks and is efficient in terms of computational parameters, but there are certain issues which need to be overcome such as: Security Prevention from different attacks during Online Transactions in Web Mining especially in E-commerce Applications, Increase use of Computational Cost at the Client and Server Side. The Proposed framework provides Security prevention from various attacks especially in IoT. The methodology implemented here works on the basis of authenticating the validity of the User by allocating a challenge value and hope that our proposed framework will be more effective and efficient.

Authors and Affiliations

Mohammad Salman Husain, Dr. Mohammad Haroon

Keywords

Related Articles

Forecasting the Water Vapour Distribution Over India Using Artificial Neural Networks

Atmospheric water vapour plays an important role in radio communications for both terrestrial and earth space communication systems as well as for global climate change studies. Hence the water vapour data and its inform...

Dynamic Security Implementation in MANETS

Security has become a primary concern in order to provide reliable communication between mobile nodes. Inherent characteristics of Mobile ad hoc networks like open peer-to-peer network architecture, shared wireless mediu...

How Do Project Managers Evaluate and Plan for R& D Project

Various types of projects, including software development research project, product development, construction, engineering, plant maintenance and others can apply this critical path method (method of scheduling).In order...

Optimizing Supply Chain Demand Forecasting and Inventory Management Using Large Language Models

This paper explores the potential for optimizing the Internet of Things by integrating machine learning and computer vision technologies and its implications for U.S. national security and economic competitiveness. First...

Review Analysis of Cyber Security in Healthcare System: A Systematic Approach of Modern Development

The healthcare industry provides medical devices such as pharmaceuticals. The third-party vendor can also pose a risk to the organization. Cyber security if they are not properly vetted and do not have adequate security...

Download PDF file
  • EP ID EP747637
  • DOI 10.21276/ijircst.2020.8.4.3
  • Views 57
  • Downloads 0

How To Cite

Mohammad Salman Husain, Dr. Mohammad Haroon (2020). An Enriched Information Security Framework from Various Attacks in the IoT. International Journal of Innovative Research in Computer Science and Technology, 8(4), -. https://europub.co.uk/articles/-A-747637