Professional Documents
Culture Documents
Iciitvol.2 621 625
Iciitvol.2 621 625
net/publication/264127297
CITATIONS READS
0 785
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Malik Sikander Hayat Khiyal on 31 May 2016.
Sundas Iqbal
Dr. Malik Sikander Hayat Khiyal
Graduate, Department of Software Engineering, Fatima
Chairperson, Department of Computer Science and
Jinnah Women University, Rawalpindi, Pakistan
Software Engineering, Fatima Jinnah Women University,
sundas.iqbal87@gmail.com
Rawalpindi, Pakistan
m.sikandarhayat@yahoo.com
Aihab Khan
Department of Computer Science, Fatima Jinnah
Women University, Rawalpindi, Pakistan
aihabkhan@yahoo.com
Abstract —People use more and more internet as a purchasing the proposed model of electronic payments for providing
tool, for doing so they have to communicate their personal confidentiality of information, ensurance of payment
banking information. This is sensible data that is need to be integrity by authentication of transaction. After studying the
protected by secure exchanges. For that a secure electronic different electronic architectures, the set have been
payment infrastructure is needed. .In response to this need the implemented with its secure characteristics for developing
Secure Electronic Transactions (SET) specification has been countries. The system is implemented according to the
proposed by a consortium headed by Visa and Master Card. requirements available resources, assets and technology of
The proposed system is made secure enough, so that only the local environment.
authorized customer can relay fearlessly and make electronic
transactions access it .For this purpose techniques of II. RELATED WORK
encryption and decryption have been applied for the security
of information Guan et. al. [2] proposed architecture for the Secure
Agent Fabrication Evolution and Roaming (SAFER) that
Keywords e-commerce, electronic payment system, Secure further facilitate e-commerce using agent technology. In this
electronic transactions (set) paper, the authors explore the electronic payment aspect of
SAFER. For implementation they selected the Secure
I. INTRODUCTION Electronic Transaction (SET) protocol and E-cash. On the
In the area of e-commerce payment is one of the major basis that SET (Loeb, 1998) protocol satisfies the three
elements. Generally payment made through e-payment is criteria of compatibility, scalability and security has chosen
mode of on-line transaction. The purpose of on-line as the payment scheme. By applying to a local Community
transaction is to allow the purchaser and vendor to made Administration Centre (CAC) a network client can join a
agreements between them without their physical presence. SAFER community. After accepting the application of
For this purpose the vendor and purchaser are provided the applicant, CAC issues a digital certificate to the applicant.
facility of website. Web store manages the transfer of funds This certificate can be used by trusted remote hosts to
from the internet user to the e-merchant. The money may identify clients’ agents that roam to. On member’s request
come from a mobile phone, from a digital wallet (e-money), all agents are fabricated by the Agent Factory under these
from a credit card, from a prepaid account or from a micro- organized communities. Individual owners can be controlled
billing system. Recently, sudden increase of publicity has by Agent Butler, a coordinating entity after customization.
indicated the growth of the Internet and the possibilities for In order to separate the communication either the
clients and merchants to experience a new shopping trend coordination between the parties at certain stages during
called electronic commerce. In the use of electronic payment payment process or exchange of all encrypting the messages
process, the safety factors involved in the six areas, which among different entities, the SET protocol is more suitable.
include Confidentiality of information, non-repudiation of In the payment confirmation stage, Certificate Authority,
information, validity of information, integrity of the Payment Gateway, the Owner and Merchant Host are all
information, Confidentiality of information, authenticity of involved in message exchanges. In addition, the Certificate
the transaction status, reliability of the system[1]. Authority and the Payment Gateway are requested to
validate the Owner’s payment information, then the
A. Contributions Merchant send out the payment confirmation to the SET
This analytical research has provided an insight that how payment agent,. The whole process is time consuming. [3]
the secure electronic transactions (SET) are implemented on
V2-622
2010 International Conference on Intelligence and Information Technology (ICIIT 2010)
V2-623
2010 International Conference on Intelligence and Information Technology (ICIIT 2010)
V2-624
2010 International Conference on Intelligence and Information Technology (ICIIT 2010)
SET based. If this system is to be implemented in Pakistan Journal of Research and Practice in Information Technology,
then strong support of government is needed as there is not Vol. 36, No. 2, May 2004
much awareness of credit card based electronic [3] Ganesh Ramakrishnan,” Secure Electronic Transaction (SET)
Protocol“, Information Systems Control Journal, CISA, Volume 6,
2000
REFERENCES
[4] Hua Jiang, Jing Yang, “On-line Payment and Security of E-
[1] UETA Task Force, “Guidelines for the Management of Electronic commerce”, Proceedings of the 2007 WSEAS International
Transactions and Signed Records”, Department of Information Conference on Computer Engineering and Applications, Gold
Resources and the Texas State Library and Archives Commission, Coast, Australia, January 17-19, 2007 545
September 2002
[5] www.mastercard.com
[2] Sheng-Uei Guan, Sin Lip Tan and Feng Hua,” A Modularized
Electronic Payment System for Agent-based E-commerce”,
V2-625