An Enriched Information Security Framework from Various Attacks in the IoT

Abstract

Security in various E-commerce Applications includes an efficient framework in Information Security especially in Computer Security, Data Security and other online transactions in E-commerce applications. Security in E-Commerce application plays an important role for the secure and scalable transaction which includes various dimensions such as security-integrity, Confidentiality, Non-repudiation, Privacy etc. Hence for the Security of Online Transactions in E-Commerce based application various Security algorithms are implemented. Although these Security algorithms are efficient and provides Security from various attacks but Data Storage during the transactions and Computational time of the algorithms is also important. The existing architecture proposed for the security of online e-transactions in web applications provides security from different attacks and is efficient in terms of computational parameters, but there are certain issues which need to be overcome such as: Security Prevention from different attacks during Online Transactions in Web Mining especially in E-commerce Applications, Increase use of Computational Cost at the Client and Server Side. The Proposed framework provides Security prevention from various attacks especially in IoT. The methodology implemented here works on the basis of authenticating the validity of the User by allocating a challenge value and hope that our proposed framework will be more effective and efficient.

Authors and Affiliations

Mohammad Salman Husain, Dr. Mohammad Haroon

Keywords

Related Articles

Convergence of Hybrid Grey Wolf Optimization with Heuristic Approaches for Enhanced Job Shop Scheduling

This scholarly inquiry examines the utilization of the Hybrid Grey Wolf Optimization Algorithm (HGWOA) in addressing the Job Shop Scheduling Problem (JSSP), a combinatorial optimization problem commonly encountered withi...

Comparative Study and Utilization of Best Deep Learning Algorithms for the Image Processing

Deep learning has gained immense popularity in scientific computing, and its algorithms are widely used in complex problem-solving industries. Every deep learning algorithm use different types of neural networks to perfo...

Material Bottlenecks in the Future Development of Green Technologies

Reducing emissions global economies demands the development of "green technology," which entails a reorganization of the energy sector to use renewable energy sources and nitrogen transportation systems. This reconstruct...

A Review on Drinking Water Treatment with Disinfectant

The majority of the world's natural water sources are not always safe to consume untreated. Raw water from rivers, lakes, ponds, and groundwater can include microorganisms. Waterborne diseases can be contracted by consum...

Distributed and Grid Computing: An Analytical Comparison

CPU utilization is an important aspect of distributed and grid computing environment. The computing nodes can be overloaded, i.e., they can have more jobs than their capacity such that no more jobs can be associated to t...

Download PDF file
  • EP ID EP747637
  • DOI 10.21276/ijircst.2020.8.4.3
  • Views 63
  • Downloads 0

How To Cite

Mohammad Salman Husain, Dr. Mohammad Haroon (2020). An Enriched Information Security Framework from Various Attacks in the IoT. International Journal of Innovative Research in Computer Science and Technology, 8(4), -. https://www.europub.co.uk/articles/-A-747637