Saturday 17 October 2015

Final report

E-Commerce and E-Business


1.         Abstract
Through the happening to present day development, use of cutting edge mechanisms and tools has ended up being a basic part of our life. Certainly, even minor typical activities like making bills in a business sector have been able to be robotized. We have made in programming to reduce the manual work in all the possible fields. E-Business or e-commerce is a term for any kind of business or business trade that incorporates trade of information over the net. It covers an extent of different sorts of associations, from trading off stock,and also trading data of high security. In this paper we endeavour to brief the distinctive issues stood up by ecommerce site and attempt to give a response to rout the issues.

2.    Introduction
Since the overall business segment is building at a quick phase, the platform on which e-commerce applications can be develop and the technologies that can be used are growing. It is difficult to pick which platform to choose and which technology to skimfrom those that are open in the market. Considering the extent of your ecommerce site (small/medium/large) and the changes that you are going to apply to your site, platform and technology can be picked.

There are two ways/methods open for building an ecommerce site –

1 Hosted ecommerce platforms like Shopify and BigCommerce
2 Open-source Content Organization Structures (CMS) like Magento.

Hosted ecommerce platformdisplays that your ecommerce site/application is hosted on a server that you won't have permission to. Of course, CMS-based portals are encouraged on server space which you should purchase likewise, will be under your control. Each of the above platforms has its own good pros and cons.

Points of interest of using hosted ecommerce platform are according to the accompanying
1. Negligibleadvancement and maintenance.
2. Better tech support.
3. Less complexity to work with.

Points of interest of using CMS platform are
1. Better functionality.
2. Better customization.
3. Supports big stores and refined websites.

A platform is picked considering the necessities of specific ecommerce site. In this paper we have considered picking our platform of technology to be CMS. The inspiration driving why we have picked it is discussed in the later zones of the paper.

Ecommerce course of action requires fine mix of business strategy and best development and platform to execute the site. We picked Clarion Propels, an affiliation comprehended for making diverse ecommerce site. A few affiliations worldwide have trusted Clarion gathering for making their ecommerce portals which achieved high change rates in addition, reduced shopping cartyields.

Those ecommerce development services include:
1. Amazingly imaginative, amazing and simple to utilize with the perfectfront-runner.
2. Optimized for desktop, convenient for tablet view.
3. Easy to useproduct management system to help you with managing your productnormal.
4. Significantly secured and safe shopping cart.
5. Modules including transportation, gift voucher, delivery, subsidiary/agent management.
6. Options for combine ecommerce site with your present account software.
7. SEO redesigned site.

The association has agent nature of 24,000, working round the clock, to meet the client essentials. More quick information about the organizations they give can be seen at "http://www.clariontechnologies.co.in/". In this report we undertaken to cover distinctive issues that are being stood up to in making and keeping up ecommerce areas. We explored distinctive progressions and stages that are delighted in building up an ecommerce platform. Then again, we have discussed quite recently the specific case that is help to overcome the issues which are cleared up in the coming sections of the paper. We proposed a cream method that serves to overcome the present issues, additionallyreorganising and maintenance of the ecommerce sites. We have kept detailed information about the venture in the blog "www.capstoneblog.com". To get any additional information, you may referthe blog.









3.      Issues

Accompanying are the constraints of ecommerce
To organizations
To customers
To society
Absence of viablesecurity

Huge capital expense for equipment

registering gear

Less human communication since they communicate electronically.
Attempt to adapt up to quick advancing and creating innovation
Specialized information for equipment and web direction

Social division between specialized and nontechnical individuals who gotten to be not able to get steady employments, which leads control the social steadiness.

Burden to pick up new prospects

Cost ofInternet access
Reliance on power IT abilities which are rare or immature particularly in the creating nations.

Experience awesome rivalry from neighbourhood worldwide contenders.

Assurance individual information security and protection
Wasted assets because of constantly evolving the technology

Similarity issues in the middle of old and new innovation
Electronicprocessesreplacephysicalcontactand links
Hard to secure the Web totally against unlawful acts. .

Absence of trust in virtual dealers


Item Quality assessment



Absence of pleasure in shopping





The difficulties that an association face while building up an ecommerce site can be arranged into three sorts. They are
1. Mechanical issues which incorporate
i. Security,
ii. Site issues,
iii. Innovation issues including expenses, programming and framework

2. Administrative difficulties which incorporate
i. Individuals and authoritative issues
ii. Administration support

3. Business challenges which incorporate
i. Client administration and
ii. Lawful issues.

The other disputable issues including in ecommerce are

1. Security issues
2. Confidence issues
3. Security issues
4. Authentic issues
5. Protected innovation Rights (IPR)
6. Tariff
7. Content regulations
8. Social issues and
9. Exchange related issues

4.      Issues of E-business Security

In the event that the E-trade to be make fruitful, it is key that each e-business site must have the capacity to give complete authorization, decency, non-renouncement and security to its customers. Many issues are at present confronted by E-business security. These issues have been portrayed in the accompanying segment:

1.          Privacy

The security of the private information of the purchasers is a noteworthy issue that is confronted by the present E-commerce plan of action. There is no security ensured to customers and their private data might effectively be assaulted by programmers. The information that is targeted generally includes the credit card and debit card numbers. This information is then used to make serious financial losses to the clients.It is, for that reason, extremely important that the business owners take the required steps and start investing in the execution of the policies that can help avoid any cyber-attacks. It is essential for the E-commerce business owners to build customers’ complete trust and loyalty. The success of the business is primarily dependent on the level of trust and faith its customers have gained over the past. When the customers feel that their information is safe, they are likely to come back and repetitively opt for the services.

2.          Integrity and Authentication Issues

The procurement of Integrity, Authentication is critical for maintaining the organizations effectively in an online world. Verification is vital to guarantee that just the, confirmed information is being exchanged to the client. Respectability guarantees that just the information that is reliable and right is being transmitted. Non-renouncement is again essential to guarantee that the information that is being transmitted gets effectively received by the customer. In this way, the systems' usage and strategies that guarantee the provisions of these components is essential if E-business must be made mainstream. These elements are critical and the essential structure of E-business security.

3.         Technical Issues

There could be numerous specialized issues like the event of different sorts of specialized assaults that can do a great deal of mischief to the web servers and inevitably the business operations that are brought out through the utilization of E-commerce. The attacks may even influence payment gateways, retailers furthermore social communication sites.

4.          Denial of Service Attack

When the normal tasks or the activities of the website or server are paralyzed, this leads to the occurrence of Denial of Service Attack. There are many problems that are caused by this type of attack. The symptoms of occurrence of such an attack could be many. This attack seems to have occurred when a user is unable to access a website or that particular website has become unavailable. The comparatively slow performance of the network could be another symptom. Also, when there is a sudden increase in the number of spam mails it can be a symptom of Denial of Service Attack.


5.         ICMP Flood

At the point when the genuine parcel is kept from coming to its destination, then it is known as ICMP surge. This is done when the expansive IP bundles are sent with the locations that are false. The essential target of this sort of attack is to keep the data from coming to the required destination utilizing illegalprocedures.

6.         Brute Force Attack

At the point when vast number and all the possible combinations of the keys are tried in order to decrypt a cryptographic technique, it is known as brute force attack. The primary goal is decode the encoded message and this type of attack could lead to serious losses of information that is confidential and sensitive. There could be several combinations and the time consumed in cracking the key may depend upon its complexity.

7.          Phlashing

            At the point where there is a complete denial of the service, it is known as Phlashing. It has the power of fully destroying a system and exploiting it further. The remote system that is targeted by it exploits it so as to make it unable to perform its original tasks and activities. The system that is exploited as a result of this attack needs to be re-installed so as to be able to perform normally.


8.         Non specialized assaults

The attacks that are not of specialized nature are recorded under this class. They are described below

A.         Phishing assaults

At the point when the genuine element is masked with a goal of hacking the private data of the people, it is known as Phishing. The primary focuses of the Phishing attacks could be the online retailer and service provider portals. The basic instance of this sort of attack are sending of false messages to the clients.

B.         Social designing

Social Engineering is the procedure that is completed in order to control individuals so as to get their own data exposed. This is an intense E-business security challenge as there are no way to distinguish the danger from it. The reality is further improved with the human's inclusion mechanisms. The different strategies of Social Engineering are intelligent voice recording, pre-messaging, telephone phishing and so


5.      Technology

In order to ensure the security of E-commerce, the various technologies that may be implemented include:
1.          Application Firewalls
They can be implemented to improve the security of E-commerce as they help in blocking all the attacks that are made to websites.
2.       Encryption
It is a technique that is used to encrypt a message using a public key and then sending it to receiver. The receiver with his private key can decrypt the message. This helps in increasing security to a greater level as the content of the message can’t be decrypted by the attacker even if he succeeds in hacking the message or information.
3.       Security holes
They can be used in order the retrieve warning messages about the vulnerabilities in the security system. This is of great help to the maintenance team who on the detection of the vulnerabilities can take up speedy actions to patch them. They can’t even be used by the maintenance team for carrying out checks at regular intervals.
4.       Protocols
The various protocols can be used for securing the payments that are made over the internet. These protocols therefore provide electronic transaction that is secure and convenient.  It uses the mechanism of encrypting the information that has to be passed through a network. (Prakash and Balachandra, 2015)
6.      Literature review

Security has been a significantconsideration toward ecommerce sites. Confidentialdata is connected with the transactions like mobile number, address, electronic card details and so on. According to the reports "Forty-one percent of Web purchasers studied a year ago by Forrester Exploration of Cambridge, Mass., said they have reached a site to be removed their databases on the grounds that they felt that the association utilized their data unwisely.

This outcomes in loss to the ecommerce business as purchasers lose their trust in the association's honesty. One more issue with the online shopping is that they stay informed regarding all things that you see on the web. With the appearance of ecommerce, huge information and individual preferences of the client also madeready for view without the customer's knowledge. New computational methods permit information mining for purchasing examples and other individual patterns. These information can be utilized to customize a client's ecommerce experience, or enhance a client's internet shopping knowledge. Some feel that their protection has been abused on account of such acts, while a few others fell this as an included advantage as their shopping has turned out to be much easier

Security is one the reasons that limits the clients and associations from taking part in utilization from ecommerce sites. As everything is done over the net, it is hard to track the reason/pin point the source of the information rupture if some data is lost. Remembering of the above reasons, security has given top most need in ecommerce. E-business Security is a part of the information Security system and is particularly connected to the segments that influence e-business that incorporate PC Security, Information security and other more extensive domains of the Data Security system.

One of the real reasons for absence of security in ecommerce is poor configuration and support of site. The majority of the online applications are only Web Administrations outlined and created by designers from diverse associations. Web Administrations can be found in larger part of the online applications that we utilize every day. Some of which incorporate Online Transaction Handling and processing (OLTP) applications, Banking applications, Database Administration applications and so on. As the clients' necessities and clients become complex, the configuration and maintenance of the ecommerce site has gotten to be significantly more mind boggling. Engineers are more packed in adding to a code to meet client prerequisites. Security has turned into a last worry in a number of the creating ventures and it has been considered as extra in a large portion of the cases.

One other concern emerges while picking the language or innovation on which the site to be build. Now and again it happens that one piece of the application is produced in one platform and another is created in some other platform. The issue while creating is that no software tells the designer if the code that is being composed is secure. It just checks for the linguistic structure blunders. Despite the fact that a few platforms like java give intelligence, they recommend just the capacities that can be utilized. In this manner it is totally designer's obligation to build up a configuration which is secure from all dangers and hacks.

In spite of the issues that are being challenged in ecommerce, development has been superior in both developed and developing nations in the past. E-business joins organizations, clients, suppliers, representatives, and merchants. E-trade changes the way business is done. The principle purpose behind the development of the ecommerce is that individuals can do shopping sitting in their seat at home and purchase the results of their decision. They are given with a few pictures of the item. And feedbacks and reviews of the products. Individuals don't get such experience regardless of the fact that they purchase items directly from the shops. Ecommerce additionally decreases different foundation costs which are grateful on the off chance that you need to keep up a retail outlet/store. The main expense that is needed is in keeping up the server and web application.












The following are themajor advantages of e-commerce[20]
To organizations
To consumers
To society
Internationalmarketplace
24 hours access
Enables more workingpractices
Operational cost savings
More choices forpurchasing
Connectspeople
Digitization of productsandprocesses
New markets andPricecomparisons
Facilitatesdelivery ofpublic services
New businessrelationships
Improved deliveryprocesses

Mass customization
Anenvironment of competition


Inventories reduction

Convenientshopping


Lowertelecommunications cost
Access to extensiveinformation

More consumers

Time saving


Businessavailability 24hours


Businessefficiency























Considering the above advantages many countries have been adopting ecommerce as their alternative for shopping. Here are the statics of ecommerce index in various countries By J.P Morgan’s 2013 survey.







The basic architecture of ecommerce application is as shown below

The above Diagram shows real segments included in electronic catalogue merchant server system. As demonstrated over a single layer to handle the item presentation, order processing and payment processing. Correspondingly in this construction model a single database is utilized to store the data and orders. The pages of electronic inventory are made powerfully from the item portrayals contained in the product database. In spite of the different inconveniences of the ecommerce, its future is promising because of the accompanying reasons:

1. The Internet is the suitable and productive medium for studying Ecommerce, where it spares time, costs and activities. Aside that, it offers distinctive choices of items, services and rates.
2. The advancement of trade is connected to the Internet's development, which is advancing quickly.
3. The quick increase of Internet clients lead to fast spread of Ecommerce also, builds its size.
4. The worldwide shapes force the act of E-business, where the majority of the organizations in developed nations and developing nations are moving their business to E-trade as result of its advantages.
5. E-commerce helps to create a competition environment between small and medium companies and large enterprises.
6. The capability of E-business is to improve the execution and procedures productivity of associations.

7. The worldwide outlines are moving towards the improvement of laws and regulations to ensure E-trade forms, the security and the protection of consumers data.

Considering the above points of interest, part of exploration work in done in creating new techniques and executing them utilizing different innovation.

7.       Methodology
We have picked CMS platform for executing the ecommerce site. One the primary reason is that it is an open source. Here are couple of different reasons which drove us to pick CMS platform. Considering the future extent of the venture, we have landed at a surface of picking CMS, which is an open source platform. It equally has a huge advantage in future if the innovation of the ecommerce site is being altered to a next level. It is considerably lessconfusing,to change the innovation, if the project ison CMS framework.

There are numerous CMS platforms accessible in the business, on which an ecommerce site can be expand on. Each of them has its own favourites and disfavours. The CMS platform, which we are going to utilize are
1. Magento
With about 21% of the world's leading ecommerce sites based on the Magento platform, it is by a long shot the most prominent and one of the best ecommerce CMS' being utilized today. Its extreme favourable circumstances are the extensive number of module and expansions accessible which permit the expansion of any new utility, the simplicity of accessibility to any designer alsodrops general improvement and support cost.
Professionals:

·        Strong platform with superior functionality and adaptability
·        Decent Marketing options are available
·        Good supporting team for help with tutorials and examining troubles.
·        More easy to understand when compared with other platforms
·        It is extremely versatile – no need  to move up to another platform, while updating in future
Cons:
·        It requires suitable server space to work capably at great speeds. Smaller servers may bring about pace and other related issues
·        Might be exceptionallypuzzling for organizations that are too small

2. osCommerce
OsCommerce is a genuinely prominent platformtoo, with around 11% of the top sites based on open source advancements utilizing osCommerce. Being one of the best open-source platforms accessible, it has an immense backend support and an extremely dynamic team, however a few clients find that upgrades to the platform has not going accordingly.
Pros:
·        Easy establishment and a simple to-utilize interface
·        Active discussion forum with an expansive strengthen team
·        Large number of modules and additional items permitting the option of most functionalities
Cons:
·        Some clients find that the product updates and outlines are delayed, and remain somewhat outdated

 Technologyare platform can be picked considering the necessities and financial plan of the venture.
8.      Proposed method
We suppose to utilize by blending up these two techniques, Magento and osCommerce. With the assistance of Magento, we can assemble a site which has rich functionalities. But the issue is, it is too difficult and involves more space. It consumes more RAM and slows down other running applications. On the other hand osCommerce stage gives a platform, which conveys a result of less memory space yet with less functionality. In the event that a configuration is brought up utilizing these two systems, it has rich functionalities and involves less space. It will be easy to maintain and protect it from security risks.


We also adding extra security layers to our site to protect from hacking. The front end of protection will be clearly by using firewalls andsecurity frameworks. Firewalls ensures the sites by halting the hackers before they could break into the system. Intrusion detection framework keeps track of the considerable number of procedures, log files and reports of the site. In the event of any strangething in the framework, it alarms the client about it. In this manner essential level of security is maintained. We also add extra efforts to establish safety by setting One Time Passwords (OTPs) while signing in. so that we can get the user information, who are getting to the site. This drops the danger for site from being hacked, as we have all the data about the clients who are accessing.


9.      Conclusion
Number of people are confident about future of E-Business. Ecommerce is a field in which there is consistently space for development. With the innovation changing continually part of alterations and upgrading must be done on ecommerce sites on frequently. The best E-business accomplishments are those who take the right measures and arrangements to guarantee the business security and the user's protection exceptionally well.

The E-business experience challenges as far as high security dangers because of open nature of the Internet and expanding specialized information. Understanding the necessity of business and monitoring of data security resources is expected to guarantee ideal security. Shoppers, organizations and the administrations should guarantee the security of customer's protection rights.

10.    References

[1]Ashwani Garg and Shekhar Singh, “A review on web security vulnerabilities”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January2013.
[2]Mr. Hemant Y. Kharbade and Mr. Avinash Wadhe, “Review study on security threat on HTML5”,
International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 3, March2013.
[3]Mark S. Ackerman and Donald T. Davis, Jr., “Privacy and Security Issues in E-Commerce”, Review chapter for the New Economy Handbook (Jones, ed.), in press.
[4]Zarana Padiya, Yesha Dev and Kethan Bhimani, “Fault management of web services”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 3, March2013.
[5]Randy C. Marchany and Joseph G. Tront, “E-Commerce Security Issues”, Proceedings of the 35th Hawaii International Conference on System Sciences –2002.
[6]Niranjanamurthy M and DR. Dharmendra Chahar, “The study of E-Commerce Security Issues and Solutions”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013.
[7]Yannis Bakos,Henry C. Lucas, Jr., Wonseok Oh, Gary Simon, Siva Viswanathan and Bruce Weber, “
The Impact of E-Commerce on Competition in the Retail Brokerage Industry”, Forthcoming in Information Systems Research, May 2005.
[8]Alev M. Efendioglu, Vincent F. Yip and William L. Murray, “E-commerce in developing countries: issues and influences”
[9]Gatha Kumar and Durai Raj Vincet PM, “The measurement and validation of trust in ecommerce relationships”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 4, April2013.
[10]“Discussion paper on ecommerce in India”,
URL:http://dipp.nic.in/English/Discuss_paper/Discussion_paper_ecommerce_07012014.pdf

[11]Dr. Nada M. A. Al-Slamy, “E-Commerce security”, IJCSNS International Journal of ComputerScience and Network Security, VOL.8 No.5, May 2008.
[12]Niranjanamurthy M, Kavyashree N, Mr S.Jagannath and DR. Dharmendra Chahar, "Analysis of E-Commerce and M-Commerce: Advantages, Limitations and Security issues". IJARCCE Vol. 2, Issue 6, June 2013
[13]Abdulghader.A.Ahmed.Moftah, Siti Norul Huda Sheikh Abdullah and Hadya.S.Hawedi, “Challenges of security, protection and trust on e-commerce: a case of online purchasingin Libya”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 3, May 2012.
[14]A Sengupta, C Mazumdar and M S Barik, “e-Commerce security –A life cycle approach”, Sadhana Vol. 30, Parts 2 & 3, April/June 2005.
[15] V.Srikanth and Dr.R.Dhanapal “Ecommerce online security and trust marks”, International Journal of Computer Engineering and Technology Volume 3, Issue 2, September 2012.
[16]Pradnya B. Rane and Dr. B.B.Meshram, “Transaction Security for E-commerce Application”, International Journal of Electronics and Computer Science Engineering.
[17]Mr.Amit N. Chaudhari and Prof. Priya V. Shirbhate, “The study of E-Commerce Security Issues and Solutions”, International Journal of Research in Science & Engineering, Volume 1, Special Issue 1.
[18]Shazia Yasin, Khalid Haseeb and Rashid Jalal Qureshi, “Cryptography Based E-Commerce Security: A Review”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012.
[19]Raju Barskar, Anjana Jayant Deen, Gulfishan Firdose Ahmed and Jyoti Bharti, “The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology”, International Journal of Computer Science and Information Security, Vol. 8, No. 1, April
2010.
[20]Yang Jing "On-line Payment and Security of E-commerce",International Symposium on Web InformationSystems and Applications, 2009.