This project entitled "A Standard And Secure E-Commerce Transaction Framework" submitted by Shazzad Khan Arnob, ID No to the Department of Computer Science and Engineering, Daffodil International University, has been accepted as okay for the partial fulfillment of the requirements for the Degree of B.Sc. Department of Computer Science and Engineering Faculty of Science and Information Technology Daffodil International University. I hereby declare that this paper has been prepared by me under the supervision of Ms.
I also declare that neither this article nor any part of this article has been submitted elsewhere for the award of any degree or diploma. In-depth knowledge and keen interest of my supervisor in the field of “A Standard and Secure E-Commerce Transaction Framework using EbXML” to carry out this project. I would like to express my sincere gratitude to Saif Mahmud Parvez, Lecturer, Department of CSE Daffodil International University and Dr.
In the past few years, XML (eXtensible Markup Language) has quickly become the first choice for identifying data exchange formats in new e-business applications and the basis for e-business frameworks such as ebXML, Rosetta Net and web services. Nowadays, ebXML is considered an e-business web service, where web services are a standard proposed by the W3C (World Wide Web Consortium). In web services, good things are offered for the use of XML. But security remains an unsolved problem and one of the biggest obstacles to adoption.
Unauthorized transaction and fraud: business may be more at risk when unauthorized access or fraud may be allowed due to increased transaction automation.
Motivation
Potential loss of management and audit: If appropriate management and audit are not implemented, there will be a major loss of potential data.
Expected Outcome
In this paper, we propose that ebXML business transaction models include web services to solve the risks that allow trading partners to securely exchange XML-based business transactions by applying XML security technology. Generally, a company gives their information to another company and each company has access to their security controls. If XML security is not strong, any company can gain access to control by other companies at any time.
In modern technology, security is more powerful than good business technology and modern framework operation. We designed a business transaction model which is highly efficient to securely exchange business transactions using XML security technologies. There are many security or technologies in the modern world, but we think that XML security is the best piece of security for business security for modern technologies.
BACKGROUND BACKGROUND
- Introduction
- Overview of ebxml
- Privacy and security
- XML security standards
- Unique Key Password
- Research Summary
- Challenges
ebXML's vision is to facilitate global commerce by applying XML security technologies to allow trading partners to securely exchange XML-based business transactions. There are so many well-known security technologies that can be used by ebXML implementers to solve the risks. SSL (Secure Socket Layer) and S/MIME (Multipurpose Secure Internet Mail Extensions) are used to solve the problem of secrecy and authentication.
Common tools such as antivirus software and intrusion detection software can be used to solve the bug detection problem. XML security technologies have the power to implement security such as encryption, digital signature, access control, and authentication. XML and SAML (Security Assertion Markup Language) digital signatures can be used to address unauthorized transaction and fraud issues in electronic business systems .XML digital signatures are used in ebXML to ensure data integrity in messages. XKMS has two parts. XML Key Registration Service Specification (X-KRSS) and XML Key Information Service Specification (X-KISS). X-KRSS is used to register public keys and X-KISS is used to resolve keys specified in XML. signature.
SAML can be leveraged to solve unauthorized transaction and fraud problems in electronic business systems. XML security technologies have the kind of power appropriate for implementing security such as encryption, digital signature, access control, and authentication. So we decided to apply XML security standards to solve the security problem of business transactions. In this regard we have thoroughly read some of the papers which are based on XML security.
Different types of security layer can be used for a safe and strong security model for business transactions. We have designed a business transaction model that is highly efficient for the secure exchange of business transactions. To secure business transactions based on XML, we used digital signatures XML, SAML, XACML, XKMS, Single Sign-On, CPP, CPA.
In general, we can use XML security technology such as XML digital signature, Single Sign-On, CPP, CPA etc. Day by day, XML security is becoming popular for business technology in the global world. If XML security is not strong, then any company can access control information from other companies.
RESEARCH METHODOLOGY
- Introduction
- Research Subject
- Implementation Requirements .1 Information Process .1 Information Process
- Registration
- Messaging Service
- Business Partner Information
- Introduction
- Business Process Specification Schema (BPSS)
- Experimental Results
In fact, the outer layer is the main part of the business transaction model, and another layer is the basic part of ebXML. We store the business partner information in this part and we use XML for high business transaction security. This means that company A needs to send a request to the ebXML registration panel to get some kind of company information.
After that, company A must submit the business information and send the business profile implementation request. As an example, we believe that the core process is the main process of any other major business process. We believe that large elements can be good effects for many industries and companies, but ebXML is the main elements for business transaction security.
In this part we provide how an organization conducts its business for communication of business partners. Company A and Company B log in or log in to the system at any time and see their business information. Company A is requested to the ebXML registration system for business information and also requested for the implementation of the registration of company A profile.
In this part, any other third-party company does not know the business information of these two companies. Company A is a request to the ebXML registration system for company information and also a request for registration of Company A's profile.
CONCLUSION AND IMLICATION FOR FUTURE
Conclusions
Implication of Future