v1 Covered
v1 Covered
v1 Covered
Research Article
DOI: https://doi.org/10.21203/rs.3.rs-721329/v1
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Read Full License
Cloud Computing based E-commerce management ontransaction
security concepts
1*,2
Huaibei Vocational and Technical College,Huaibei 235000,China.
3
IT and Environment, Charles Darwin University,Australia.
4
Department of Computer Science and Engineering, Adhiyamaan College of
Engineering, India
*Correspondence: [email protected]
Abstract
In recent years, world commerce and the economy have grown. Trade-in in
numerous nations, including Nigerians, became the primary market trend.
Furthermore, the tendency of world economic transformation is technological
trading [13-14]. The geographic accessibility of both the online and offline is
responsible for this. Different forms of trade routes have been established on
the internet, promoting commercial, corporate accounts via virtualization [15].
Electronic commerce (EC) has been announced as a prominent and expanding web
application by the developing digital technologies, allowing clients, suppliers, and
workers to accomplish various purposes and solutions [16].
The rest of the research as follows: section 2 illustrates the background of the
e-commerce systems. The proposed Cloud Computing-based E-commerce
management (CCECM) approach is designed and implemented in section 3. The
software analysis and performance evaluation of the proposed CCECM method is
discussed in section 4. Section 5 shows the conclusion and future scope of the
proposed CCECM approach.
An overview can be provided of the principles and cloud variations and the
professionals and downsides of e-commerce cloud technology. They analyze the
advantages and difficulties of cloud technology and its uses in e-government and
e-commerce [19]. The cloud services principles are given based on the business
problem and the consequences for the e-commerce market. The classic e-
commerce companies and the industry are impacted by cloud services, offer an
overview of cloud computingtechnology, emphasize security issues, summarize
features, networking security issues, and remedies [20].
The techniques and methods for execution are not given. A cloud-based e-
commerce design has been introduced, which addresses critical e-commerce
problems such as connectivity and flexibility [27].A 3G-based, cloud-based,
mobile e-commerce system with 2D-Barcode technologies is provided to
increase application efficiency. The investigation shows that the technique is
interesting concerning ease and security and does not examine diverse
information accurate measures [28].
The flexibility in the industry space and significant backing for technology and
equipment have made cloud storage one of the most critical technologies for
ICT experts. It offers the foundation for on-demand, self-serve computing
services with all-around access to networking, location-independent pooling of
resources, fast flexibility, and an economic model pay per usage [31]. The study
has grown from ongoing virtualized, dispersed systems, computing systems,
connectivity, and World Wide Web (WWW) and programming solutions.
Figure 1 shows the architecture of the proposed CCECM approach. It has three
layers, namely the user layer, cloud layer, and business application layer.The
capacity managing component is accountable, in addition to the underlying
hardware, for pooling the equipment capabilities and implementing necessary
accessibility control lists depending on the accessible underlying hardware. The
administration of the latter two levels plays a significant function. The
software/hardware capabilities are loosely connected. The system deployment
to various virtual machines can be done without interruptions based on the
virtualized and planning approach.
This computing model has five main features, three types of services, and four
different deployments.Architecture's essential aspects:
Complete access to the network: Use standard devices via the internet to
enhance client systems, including cellphones, tablets, desktops, and workplaces.
The opportunity to use the supplier's cloud-based apps is given to the consumer.
Apps may be accessed via thin client interaction, a web browser, or a program
interface from several mobile terminals. The server does not maintain and
operate the fundamental cloud architecture, including networking, computers,
software platforms, storing, or different application features, with the
potential exception of the restricted user, particular program custom functions.
The proposed model has four cloud architectures: private cloud, public cloud,
communication cloud, and hybrid cloud for communication.
A solitary firm with several customers provides the network architecture for
specific use (e.g., business model). The organization, a person or group, or some
combinations of them can own, administer and run it, and it can take place at or
out of facilities.
Cloud computing is available to the entire public for unrestricted use. It might
be owned, controlled, and administered by or together with a company, academic
or governmental organization. It is available at the cloud supplier's facilities.
For this item and specific forms that must be followed, the business regulation
of the layout can include the addition of a product from the synopsis section
over and over again to increase the amount. Particular data transmission is also
included to communicate to the card issuer.Different SaaS solutions can deliver
numerous capacity elements that enable companies to operate and control
business operations using the cloud platform. They include Sales Monitoring,
Product Development, Evaluation, Administration, Management Information
Systems, Self-Servers Login Page, Systems Integration, Financial and Accounts
Payable, and more. Thus, the proposed structure would ensure that IT personnel
on software and hardware are recruited and trained.
Level of Cloud Applications –It is the layer displayed to cloud users. Customers
generally access the web-based services supplied by this level and charge
penalties for use.
Cloud Midstream Level — Normally, between windows operating systems and the
applications, the cloud gateway level is located. It provides the customer with
different features. It assists in developing enterprise systems and facilitates
multiple operations, threaded and communication, andmicroservice
architecturaldesigns.
Figure 2 shows the flowchart of the proposed CCECM approach. Initially, the
decision problem hierarchy is designed. Then the criteria are identified using
the goals and alternatives. Based on the requirements, a group decision is made.
The decision-makers can help to evaluate the other options and assign criteria
weights based on the decision. Finally, the best alternative decision is chosen
for the problem given. There are the following steps to the suggested selection
technique.
3.3.1 Stage 1
3.3.2. Stage 2
This stage puts together in the firm under examination a party of five
executives from various functions. The participants all acknowledged a shared
problem (i.e., cloud technology) and tried to achieve a collective conclusion. The
ultimate judgment was subject to configuration management. Agreement within
the collective decision-making indicates that the ending is agreeable to every
member truly. With the configuration management, all team members feel
equitable opportunities to influence the collective decision and accept it.
3.3.3. Stage 3
The relevance of the criterion was evaluated and stated in this stage using the
fuzzy language factors. For convenience, the included features of
theseundefined linguistic parameters are random triangle factors. Linguistic
words were also utilized to assess options.
3.3.4. Stage 4
The necessary rating was produced by applying the proposed CCECM technique.
The ideal approach was selected as the best option with the most significant
proximity, the most considerable distance from the anti-ideal approach.
Phase 1:
𝑉𝑡 = 𝑣𝑦𝑡 is converted into a vector of two-fold language choices𝑉𝑡 = (𝑣𝑦𝑡 , 0). The
decision vector is denoted as 𝑉𝑡 and the element of the matrix is denoted as 𝑣𝑦𝑡 .
Phase 2:
𝑇
The 2-fold grammatical weighted group 𝑉 𝑇 = (𝑉̂𝑦 , 𝛽̂𝑦 ) is expressed in Equation
(1)
1
𝑉̂𝑦 , 𝛽̂𝑦 = ∆𝑣 ( ∑𝑘𝑡=1 ∆𝑣 −1 (𝑣𝑦𝑡 , 0)) ; 𝑦 = 1,2, ⋯ , 𝑛 (1)
𝑘
The weight of the fuzzy matrix is denoted as 𝑉 𝑇 , the element of the matrix is
denoted as 𝑉̂𝑦 , 𝛽̂𝑦 . The variation in the weight is denoted as ∆𝑣 . The inverse of
the variation is denoted ∆𝑣 −1. The element of the fuzzy decision matrix is
denoted as 𝑣𝑦𝑡 .
Phase 3:
𝑇
The standardized 2-fold weighted matrix 𝑣 𝑁 = (𝑉̂𝑦 , 𝛽̂𝑦 ) is expressed in Equation
(2)
̂𝑦 )
̂𝑦 ,𝛽
(𝑉̂𝑦 , 𝛽̂𝑦 ) = ∆𝑣 (
(𝑉
̂1 ),(𝑉
̂1 ,𝛽 ̂2 ),⋯,(𝑉
̂2 ,𝛽 ̂𝑛 ))
̂𝑛 ,𝛽
) ; 𝑦 = 1,2, ⋯ , 𝑛 (2)
max((𝑉
The mean of the weight of the fuzzy matrix is denoted as (𝑉̂𝑦 , 𝛽̂𝑦 ), the mean
fuzzy decision matrix element is denoted as (𝑉̂𝑦 , 𝛽̂𝑦 ).
Phase 4:
𝑡 𝑡
𝐴𝑡 = 𝑎𝑥𝑦 is converted into a vector of two-fold language choices𝐴𝑡 = (𝑎𝑥𝑦 , 0).
Where 𝐴𝑡 is the fuzzy decision alternative matrix where the elements of this
𝑡
matrix are denoted as 𝑎𝑥𝑦 .
̂ 𝑥𝑦 ) is
Phase 5: The 2-fold linguistics vector of collaborative decisions 𝐴 = (𝑎̂𝑥𝑦 , ∝
expressed in Equation (3)
1
̂ 𝑥𝑦 ) = ∆𝑙 ( ∑𝑘𝑡=1 ∆𝑙 −1 (𝑎𝑥𝑦
(𝑟̂𝑥𝑦 , ∝ 𝑡
, 0)) ; 𝑦 = 1,2, ⋯ , 𝑛, ; 𝑥 = 1,2, ⋯ , 𝑚. (3)
𝑘
̂ 𝑥𝑦 ). The
The linguistic elements of the fuzzy matrix are denoted as (𝑟̂𝑥𝑦 , ∝
weight variation of the linguistic variable is denoted as ∆𝑙 and the inverse of the
linguistic variable is denoted as ∆𝑙 −1 . The elements of the fuzzy alternative
𝑡
matrix are denoted as 𝑎𝑥𝑦 . The number of criteria is denoted as k.
̂
The mean decision vector weight is denoted as (𝑟̅̂𝑥𝑦 , ∝
̅ 𝑥𝑦 ), the linguistic variable
is denoted as ∆𝑙 , the inverse of the linguistic variable is denoted as ∆𝑙 −1 . The
mean decision matrix is denoted as (𝑉̂ , 𝛽̂ ). The weight of the decision matrix is
𝑦 𝑦
Phase 7: The positive and negative decisions are expressed in Equations (5) and
(6)
The positive decision matrix is denoted as (𝑟 + , 𝑎+ ) with elements (𝑟𝑥+ , 𝑎𝑥+ ). The
negative decision matrix is denoted as (𝑟 − , 𝑎 − ) with elements (𝑟𝑥− , 𝑎𝑥− ).
Phase 8: The lengths from the excellent response and the unfavorable ideal
solutions of each option are computed in Equations (9) and (10)
1
(𝜀𝑥+ , 𝛿𝑥+ ) = ∆𝑙 ( ∆−1 2𝑡 ̂ 𝑥𝑦 ), (𝑟𝑥+ , 𝑎𝑥+ ))))
𝑙 (𝑚 ((𝑟̂𝑥𝑦 , ∝ (9)
𝑛
1
(𝜀𝑥− , 𝛿𝑥− ) = ∆𝑙 ( ∆−1 (𝑚2𝑡 ((𝑟̂𝑥𝑦 , ∝
̂ 𝑥𝑦 ), (𝑟𝑥− , 𝑎𝑥− )))) (10)
𝑛 𝑙
∆−1 − −
𝑙 (𝜀𝑥 ,𝛿𝑥 )−1
(𝜀𝑥 , 𝛿𝑥 ) = ∆𝑙 (((
(∆−1 − − −1 + + ) 𝑡") + 1) (11)
𝑙 (𝜀𝑥 ,𝛿𝑥 )−1)+(∆𝑙 (𝜀𝑥 ,𝛿𝑥 )−1)
The final decision is denoted as (𝜀𝑥 , 𝛿𝑥 ), the fuzzy linguistic variable is denoted
as ∆𝑙 .The inverse of the fuzzy linguistic is denoted as ∆−1
𝑙 .The negative and
positive alternative is denoted as (𝜀𝑥− , 𝛿𝑥− ) and (𝜀𝑥+ , 𝛿𝑥+ ), respectively.
Figures 4(a) and 4(b) show the computation cost and communication cost
analysis of the proposed CCECM approach, respectively. The simulation is
carried out by using the amazon consumer dataset. The order, delivery,
retrieve, and dispute settlement are analyzed in the simulation for multiple
users in different locations. The respective computation cost and communication
cost are analyzed and plotted for the proposed CCECM approach compared with
the existing FEA model. The results show that the proposed CCECM method has
the highest performance of the current model.
Table 1. Simulation cost analysis of the proposed CCECM approach
Table 1 shows the simulation cost analysis of the proposed CCECM approach.
The simulation analysis is done to deliver, retrieve, and dispute settlement of
the different consumers over different time. The computational cost and
communication cost of the proposed CCECM approach are analyzed and
compared with the existing model. The result indicates that the proposed
CCECM method has the highest performance of the current model. The dispute
settlement usually takes more time than the others.
Figures 5(a) and 5(b) shows the root mean squared error (RMSE) and mean
average error (MAE) analysis of the proposed CCECM approach, respectively.
The simulation is carried out by varying the number of datasamples from a
minimum of 1000 to a maximum of 10000 with a step size of 1000. The
respective RMSE and MAE of the proposed CCECM approach areanalyzed and
plotted in the above figures. As the number of samples increases, the
performance increases in terms of a decrease in the error. The result indicates
that the proposed CCECM approach has the lowest error for all the situations.
FL 64 67
NN 72 74
RF 68 71
BC 79 81
FEA 81 85
CCECM 89 91
Table 2 shows the simulation outcome analysis of the proposed CCECM approach.
The simulation is analyzed for the proposed CCECM method, and the result is
compared with the existing models such as fuzzy logic (FL), neural network
(NN), random forest (RF), blockchain (BC), andfuzzy e-commerce approach
(FEA). The simulation outcomes such as accuracy and precision are analyzed and
tabulated in the above table. The results indicate that the proposed CCECM
method has the highest performance.
Figures 6(a) and 6(b) show the accuracy and precision analysis of the proposed
CCECM approach, respectively. The simulation outcomes, such as the precision
and accuracy of the proposed CCECM method,areanalyzed and compared with
the existing models such as FL, NN, RF, BC, and FEA. The results indicate that
the proposed CCECM approach has the highest performance of current models
in all the scenarios. The proposed CCECM method produces higher marks
because of the multi-criteria fuzzy model and cloud computing technology.
Acknowledgement:
This work was sponsored in part by the Humanities and Social Science Research
Project of Universities in Anhui Province(SK2020A0724) ; Anhui Provincial
Teaching Demonstration Class(2180);Anhui Provincial Quality Engineering
Major Online Teaching Reform Research Project(2020zdxsjg313).
Ethics Declarations
Ethical approval
This article does not contain any studies with human participants or animals
performed by any of the authors.
Author Statement
Conflict of interest
References
1. Seth, S., Johari, R., & Gupta, K. (2020). Design and Development of E-
Commerce–Oriented PaaS Application in Cloud Computing Environment.
In Applications of Cloud Computing (pp. 131-152). Chapman and Hall/CRC.
2. Thota, C., Manogaran, G., Lopez, D., &Sundarasekar, R. (2021).
Architecture for big data storage in different cloud deployment models.
In Research Anthology on Architectures, Frameworks, and Integration
Strategies for Distributed and Cloud Computing (pp. 178-208). IGI
Global.
3. Nguyen, T. N., Liu, B. H., Nguyen, N. P., & Chou, J. T. (2020, June). Cyber
Security of Smart Grid: Attacks and Defenses. In ICC 2020-2020 IEEE
International Conference on Communications (ICC) (pp. 1-6). IEEE.
4. Jolfaei, A., Jan, M. A., Kant, K., & Usman, M. (2021). Guest Editorial:
Configuration Security for Industrial Automation and Control Systems.
IEEE Transactions on Industrial Informatics, 17(6), 4206-4209.
5. Alanezi, A., Abd-El-Atty, B., Kolivand, H., El-Latif, A., Ahmed, A., El-
Rahiem, A., ... & S Khalifa, H. (2021). Securing digital images through
simple permutation-substitution mechanism in cloud-based smart city
environment. Security and Communication Networks, 2021.
6. Shakeel, P. M., Baskar, S., Fouad, H., Manogaran, G., Saravanan, V., &
Montenegro-Marin, C. E. (2021). Internet of things forensic data analysis
using machine learning to identify roots of data scavenging. Future
Generation Computer Systems, 115, 756-768.
7. Hiremath, P. N., Armentrout, J., Vu, S., Nguyen, T. N., Minh, Q. T., &
Phung, P. H. (2019, November). MyWebGuard: toward a user-oriented tool
for security and privacy protection on the web. In International
Conference on Future Data and Security Engineering (pp. 506-525).
Springer, Cham.
8. Billah, M. F. R. M., Saoda, N., Gao, J., & Campbell, B. (2021, May). BLE Can
See: A Reinforcement Learning Approach for RF-based Indoor Occupancy
Detection. In Proceedings of the 20th International Conference on
Information Processing in Sensor Networks (co-located with CPS-IoT
Week 2021) (pp. 132-147).
9. Singh, A. K., Thakur, S., Jolfaei, A., Srivastava, G., Elhoseny, M. D., &
Mohan, A. (2021). Joint encryption and compression-based watermarking
technique for security of digital documents. ACM Transactions on
Internet Technology (TOIT), 21(1), 1-20.
10. Manogaran, G., Baabdullah, T., Rawat, D. B., & Shakeel, P. M. (2021). AI
Assisted Service Virtualization and Flow Management Framework for 6G-
enabled Cloud-Software-Defined Network based IoT. IEEE Internet of
Things Journal.
11. Galiveeti, S., Lo’aiTawalbeh, M. T., & Abd El-Latif, A. A. Cybersecurity
Analysis: Investigating the Data Integrity and Privacy in AWS and Azure
Cloud Platforms. Artificial Intelligence and Blockchain for Future
Cybersecurity Applications, 329.
12. Gao, J., Wang, H., & Shen, H. (2020, August). Machine Learning Based
Workload Prediction in Cloud Computing. In 2020 29th International
Conference on Computer Communications and Networks (ICCCN) (pp. 1-9).
IEEE.
13. Abdel-Basset, M., Gamal, A., Elhoseny, M., Chakrabortty, R. K., & Ryan, M.
(2021). A Conceptual Hybrid Approach from a Multicriteria Perspective
for Sustainable Third-Party Reverse Logistics Provider Identification.
Sustainability, 13(9), 4615.
14. Nguyen, T. N., Le, V. V., Chu, S. I., Liu, B. H., & Hsu, Y. C. (2021). Secure
Localization Algorithms Against Localization Attacks in Wireless Sensor
Networks. Wireless Personal Communications, 1-26.
15. Manimuthu, A., Dharshini, V., Zografopoulos, I., Priyan, M. K., &
Konstantinou, C. (2021). Contactless Technologies for Smart Cities: Big
Data, IoT, and Cloud Infrastructures. SN Computer Science, 2(4), 1-24.
16. Jegadeesan, S., Azees, M., Kumar, P. M., Manogaran, G., Chilamkurti, N.,
Varatharajan, R., & Hsu, C. H. (2019). An efficient anonymous mutual
authentication technique for providing secure communication in mobile
cloud computing for smart city applications. Sustainable Cities and
Society, 49, 101522.
17. Abdel-Basset, M., Mohamed, R., Sallam, K., &Elhoseny, M. (2020). A novel
decision-making model for sustainable supply chain finance under
uncertainty environment. Journal of Cleaner Production, 269, 122324.
18. Ramasamy, P., Ranganathan, V., Palanisamy, V., & Kadry, S. (2020).
Securing one-time password generation using elliptic-curve cryptography
with self-portrait photograph for mobile commerce application.
Multimedia Tools and Applications, 79(23), 17081-17099.
19. Shaikh, J. R., Beniwal, R., & Iliev, G. (2019). Cryptography and
optimization-driven support vector neural network to mitigate DoS
attacks in E-commerce. In Applications of computing, automation and
wireless systems in electrical engineering (pp. 551-561). Springer,
Singapore.
20. Sharma, A., & Banati, H. (2020). Building a Trustworthy Ethical Approach
to Cloud Computing. In Data Communication and Networks (pp. 159-181).
Springer, Singapore.
21. Dijesh, P., Babu, S., & Vijayalakshmi, Y. (2020). Enhancement of e-
commerce security through an asymmetric key algorithm. Computer
Communications, 153, 125-134.
22. Shanbhog, M. (2021). Cloud Computing Adoption: Influencing Factors on
Online Firms. In Innovative Data Communication Technologies and
Application (pp. 799-808). Springer, Singapore.
23. Meng, S., He, X., & Tian, X. (2021). Research on Fintech development
issues based on embedded cloud computing and big data
analysis. Microprocessors and Microsystems, 83, 103977.
24. Guan, Z., Wang, N., Fan, X., Liu, X., Wu, L., & Wan, S. (2020). Achieving
Secure Search over Encrypted Data for e-Commerce: A Blockchain
Approach. ACM Transactions on Internet Technology (TOIT), 21(1), 1-17.
25. Mo, Y. (2019). A data security storage method for IoT under the Hadoop
cloud computing platform. International Journal of Wireless Information
Networks, 26(3), 152-157.
26. Jiang, W., Wang, Y., Jiang, Y., Chen, J., Xu, Y., & Tan, L. (2019). Research
on mobile internet mobile agent system dynamic trust model for cloud
computing. China Communications, 16(7), 174-194.
27. Singh, H., Bhasin, A., & Kaveri, P. (2019). SECURE: Efficient resource
scheduling by swarm in cloud computing. Journal of Discrete
Mathematical Sciences and Cryptography, 22(2), 127-137.
28. Guimaraes, T., & Paranjape, K. (2019). User support as moderator for
cloud computing user satisfaction. International Journal of Cloud
Computing, 8(2), 150-165.
29. Sehgal, N. K., Bhatt, P. C. P., & Acken, J. M. (2020). Foundations of cloud
computing and information security. In Cloud Computing with Security (pp.
13-48). Springer, Cham.
30. Wangfi, S., Wang, W., & Tan, Y. (2020). Internet cross-border service
model based on 5G environment and cloud computing data
platform. Microprocessors and Microsystems, 103520.
31. Siddiqui, Z., Tayan, O., & Khan, M. K. (2018). Security analysis of
smartphone and cloud computing authentication frameworks and
protocols. IEEE Access, 6, 34527-34542.