3
IJIRST || National Conference on Latest Trends in Networking and Cyber Security || March 2017 ©IJIRST 2017 Published by IJIRST 44 Survey of Payment Integration and Data Maintenance issues Riddhi Vaghela 1 Upadhyay Monika 2 Mrs. Neha Minocha 3 3 Internal Guide 1,2 Department of Computer Engineering 1,2 Sal Institute of Technology and Engineering Research AbstractThis payment integration and data maintenance issue survey deliberated over the security of electronic payment systems and management of huge amount of data. In our research, we focused on either dominant systems or new attempts and innovations to improve the level of security of the electronic payment systems. This survey consists of the Card-present (CP) transactions and a review of its dominant system. A data warehouse stores materialized views of data from one or more sources, with the purpose of efficiently implementing decision-support or OLAP queries. One of the most important decisions in designing a data warehouse is the selection of materialized views to be maintained at the warehouse. The goal is to select an appropriate set of views that minimizes total query response time and the cost of maintaining the selected views, given a limited amount of resource, e.g., materialization time, storage space, etc. In this article, we have developed a theoretical framework for the general problem of selection of views in a data warehouse. We present polynomial-time heuristics for a selection of views to optimize total query response time under a disk-space constraint, for some important special cases of the general data warehouse scenario: 1) an AND view graph, where each query/view has a unique evaluation, e.g., when a multiple-query optimizer can be used to general a global evaluation plan for the queries, and 2) an OR view graph, in which any view can be computed from any one of its related views, e.g., data cubes. We present proofs showing that the algorithms are guaranteed to provide a solution that is fairly close to (within a constant factor ratio of) the optimal solution. We extend our heuristic to the general AND-OR view graphs. Finally, we address in detail the view- selection problem under the maintenance cost constraint and present provably competitive heuristics. Key words: Data maintenance, Electronic Payment Systems, QR codes, Security, Secured transmission I. INTRODUCTION Here kindly describe about payment integration and data maintenance issue, Nowadays the payment approaches via the internet and the network has been growing at a furious pace. In this way, the variety of the electronic payment systems consists of a numerous types to achieve a strong level of the security. However, in parallel, the attacks procedures and strategies are as advanced as the security solutions. In this comprehensive survey, we tried to mention and determine all attempts in both sides (i.e. attacks strategies and security solutions). In this way, we chose the most dominant electronic payment systems and the most successful attack strategies against them. The rest of this paper consists of Section : A review of dominant CP transactions system i.e. EMV including several researches at Cambridge university to designate variant types of attacks against this standard including MITM, pre-play and relay attacks which demonstrates lack of a secure authentication method that is one of the main purpose of using the smart cards instead of magnetic stripe cards which are not able to participate in authentication process. The evaluation of the EMV migration from RSA cryptosystem to ECC based cryptosystem The evaluation of the Card-not-present transactions approaches including 3D Secure, 3D SET, SET/EMV and EMV/CAP The impact of concept of Tokenization and the role of Blind Signatures schemes in electronic cash and E-payment systems, respectively. Using quantum key distribution (QKD) in electronic payment systems to achieve unconditional security rather than only computational assurance of the security level by using traditional cryptography. The assessment of the electronic currency and peer to peer payment systems such as bit coin. Near Field Communication (NFC) and contactless payment systems along with the evaluation of the related technologies such as Google wallet, Android Pay and Apple Pay. Now if we talk about Quick Response, QR codes are two-dimensional matrix barcodes that are used to encode information. In recent years, they have more and more found their way into our everyday lives. They were initially invented to track automotive parts during the production process. Nowadays, they have been adapted for a variety of use cases. QR codes are cheap to produce and easy to deploy. Therefore, they became the medium of choice in billboard advertising to access potential customers. One of the most commonly found use case is URL encoding to make information instantly available. Besides a broad range of advantages, QR codes have been misused as attack vector for social engineers. Attackers encode malicious links that lead e.g. to phishing sites or to execute fraudulent code. These malicious QR codes can be printed on small stickers and pasted over already 2 existing QR codes. Furthermore, attackers can modify selected modules from white to black and vice-versa in

Survey of Payment Integration and Data Maintenance … of Payment Integration and Data Maintenance issues Riddhi Vaghela1 Upadhyay Monika2 Mrs. Neha Minocha3 3Internal Guide 1,2Department

  • Upload
    dokhue

  • View
    216

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Survey of Payment Integration and Data Maintenance … of Payment Integration and Data Maintenance issues Riddhi Vaghela1 Upadhyay Monika2 Mrs. Neha Minocha3 3Internal Guide 1,2Department

IJIRST || National Conference on Latest Trends in Networking and Cyber Security || March 2017

©IJIRST 2017 Published by IJIRST 44

Survey of Payment Integration and Data

Maintenance issues

Riddhi Vaghela1 Upadhyay Monika2 Mrs. Neha Minocha3

3Internal Guide 1,2Department of Computer Engineering

1,2Sal Institute of Technology and Engineering Research

Abstract— This payment integration and data maintenance issue survey deliberated over the security of electronic payment

systems and management of huge amount of data. In our research, we focused on either dominant systems or new attempts

and innovations to improve the level of security of the electronic payment systems. This survey consists of the Card-present

(CP) transactions and a review of its dominant system. A data warehouse stores materialized views of data from one or more

sources, with the purpose of efficiently implementing decision-support or OLAP queries. One of the most important decisions

in designing a data warehouse is the selection of materialized views to be maintained at the warehouse. The goal is to select

an appropriate set of views that minimizes total query response time and the cost of maintaining the selected views, given a

limited amount of resource, e.g., materialization time, storage space, etc. In this article, we have developed a theoretical

framework for the general problem of selection of views in a data warehouse. We present polynomial-time heuristics for a

selection of views to optimize total query response time under a disk-space constraint, for some important special cases of

the general data warehouse scenario:

1) an AND view graph, where each query/view has a unique evaluation, e.g., when a multiple-query optimizer can be used

to general a global evaluation plan for the queries, and

2) an OR view graph, in which any view can be computed from any one of its related views, e.g., data cubes. We present

proofs showing that the algorithms are guaranteed to provide a solution that is fairly close to (within a constant factor ratio

of) the optimal solution. We extend our heuristic to the general AND-OR view graphs. Finally, we address in detail the view-

selection problem under the maintenance cost constraint and present provably competitive heuristics.

Key words: Data maintenance, Electronic Payment Systems, QR codes, Security, Secured transmission

I. INTRODUCTION

Here kindly describe about payment integration and data maintenance issue, Nowadays the payment approaches via the internet

and the network has been growing at a furious pace. In this way, the variety of the electronic payment systems consists of a

numerous types to achieve a strong level of the security. However, in parallel, the attacks procedures and strategies are as

advanced as the security solutions. In this comprehensive survey, we tried to mention and determine all attempts in both sides

(i.e. attacks strategies and security solutions). In this way, we chose the most dominant electronic payment systems and the

most successful attack strategies against them.

The rest of this paper consists of Section :

A review of dominant CP transactions system i.e. EMV including several researches at Cambridge university to designate

variant types of attacks against this standard including MITM, pre-play and relay attacks which demonstrates lack of a

secure authentication method that is one of the main purpose of using the smart cards instead of magnetic stripe cards

which are not able to participate in authentication process.

The evaluation of the EMV migration from RSA cryptosystem to ECC based cryptosystem

The evaluation of the Card-not-present transactions approaches including 3D Secure, 3D SET, SET/EMV and EMV/CAP

The impact of concept of Tokenization and the role of Blind Signatures schemes in electronic cash and E-payment systems,

respectively.

Using quantum key distribution (QKD) in electronic payment systems to achieve unconditional security rather than only

computational assurance of the security level by using traditional cryptography.

The assessment of the electronic currency and peer to peer payment systems such as bit coin.

Near Field Communication (NFC) and contactless payment systems along with the evaluation of the related technologies

such as Google wallet, Android Pay and Apple Pay.

Now if we talk about Quick Response, QR codes are two-dimensional matrix barcodes that are used to encode

information. In recent years, they have more and more found their way into our everyday lives. They were initially invented to

track automotive parts during the production process. Nowadays, they have been adapted for a variety of use cases. QR codes

are cheap to produce and easy to deploy. Therefore, they became the medium of choice in billboard advertising to access

potential customers.

One of the most commonly found use case is URL encoding to make information instantly available. Besides a broad

range of advantages, QR codes have been misused as attack vector for social engineers. Attackers encode malicious links that

lead e.g. to phishing sites or to execute fraudulent code. These malicious QR codes can be printed on small stickers and pasted

over already 2 existing QR codes. Furthermore, attackers can modify selected modules from white to black and vice-versa in

Page 2: Survey of Payment Integration and Data Maintenance … of Payment Integration and Data Maintenance issues Riddhi Vaghela1 Upadhyay Monika2 Mrs. Neha Minocha3 3Internal Guide 1,2Department

Survey of Payment Integration and Data Maintenance issues

(IJIRST/Conf/NCLTNCS/2017/010)

45

order to override the originally encoded content as proposed in [2]. Even though many real world examples have been reported

in the media [4], there has been little research conducted on human-computer interaction and security aspects of QR code based

attacks. In this work, we provide a comprehensive overview of the most relevant use cases of QR codes and the associated

attack vector with an emphasis on phishing. We conducted a comprehensive literature survey to determine the state of the art

regarding user studies and exemplary attacks. Additionally we identified the major research challenges to improve the security

of QR codes and contribute questions and directions toward secure and usable QR code processing. The main contributions of

this paper are as follows:

We provide a comprehensive overview on the most relevant use cases and identify associated attack vectors.

We systemize the state of the art in the research community.

We identify the major research challenges to improve QR code security with

an emphasis on usability and security aspects.

II. METHOD

Over payment integration and data maintenance issue related survey paper firstly analyze the boundaries of the conventional

model of the 3 payment, then puts forward a kind of online payment model of the third-party payment based on the two-way

management method; it stresses integration of the logistics, information flow, fund flow, business flow and government affairs

flow in E-commerce to reduce the online payment risks of the customers, and it emphasizes the structure and the security

measures of the collaborative management model of the online third-party payment.[1]

The construction of the online payment market has been the hot spot of the development of electronic-commerce, and

how to improve the electronic payment market to solve the bottleneck of e-commerce payment is the focal point. This paper

uses the standardize methods to analyze the problems in the development of the third-party payment and holds that much

importance should be attached to risks in the development of third-party payment, and take some procedures such as increase

supervision, improve the legal system and business and services novelty to promote the growth of third-party payment in our

country.[3]

In the context of the growth of e-commerce on the Internet, a lot of electronic payment systems have been set up in

order to secure online payments. To understand the success of Internet payment system it is essential to analyze the strategies

of e-commerce actors: customers, "cyber merchants", managers of networks (telecommunications and payment), suppliers of

electronic payment services and banks. Our results provide objective explanations of the success factors of Internet payment

systems, and the domination of SSL card payment in the market. Only PayPal could, in the middle term, compete with the SSL

card payment. Moreover, failed experiences show that it is necessary to consider network effects and which business models to

implement in order to avoid killing a new Internet payment system before it is launch.[5]

Through third-party brokers paid model: Its characteristic is as follows: Bank card information is not open to the

broadcast network, is paid by users. Both businessmen trusted third party (agents) to complete (See fig. 2.)

SET (security electronic transaction) model: "Secure Electronic Transactions," and referred to the SET. In an open

Internet is a understanding of the global agreements and standards for secure electronic transactions. Their characteristics are

as follows: SET transactions participants to provide certification to ensure data security, integrity and non-repudiation of

transactions, in particular to ensure that no information leaked to the cardholder's account for the businesses. Guarantee the

safety of the SET. Such a system more suited to the B to C mode of transaction (See Fig.4).[6]

Fig. 2: Through third-party brokers paid model

Page 3: Survey of Payment Integration and Data Maintenance … of Payment Integration and Data Maintenance issues Riddhi Vaghela1 Upadhyay Monika2 Mrs. Neha Minocha3 3Internal Guide 1,2Department

Survey of Payment Integration and Data Maintenance issues

(IJIRST/Conf/NCLTNCS/2017/010)

46

Fig. 4: SET model

Providing integrated access to multiple,distributed , heterogeneous databases and other information sources has

become one of the leading issues in database research and industry [6 ]. In the research community, most app roaches to the

data integration problem are based on the following very genera l two-step process:

1) Accept a query, determine the appropriate set of inform at ion sources to answer the query, and generate the appropriate

sub queries or command s for each information source .

2) Obtain results from the inform at ion sources, perform appropriate translation, and merging of the information , and return

the l answer to the user or application. We refer to this process as a lazy or on-demand approach to data integration, since

in format ion is extracted from the sources only when queries are posed.

III. CONCLUSION

In this comprehensive survey, we evaluated all most dominant electronic payment systems and the most successful attack

strategies against them, including: Card- present (CP) transactions along with a review of the dominant card-present standard

i.e. EMV including several researches to determine several types of attacks against this standard including MITM, pre-play and

relay attacks which demonstrates lack of a secure authentication method that is one of the main purpose of using the smart cards

instead of magnetic stripe cards which is participating in authentication process.

we provided a comprehensive overview of the state of the art research regarding QR code security and usability. We

identified the most significant use cases and the attack vectors associated with them. To do so, we conducted an extensive

literature survey.

With the explosive spread of the Internet, electronic financial transactions such as online banking have become a

universally accepted common practice. Unfortunately, electronic financial transactions as such are offering a new revenue

model to organized hackers. While innovations in security measures for electronic financial transactions are urgently called for,

the conventional communication security measures through authentication like OTP and encryption using SSL are no longer

satisfactory countermeasures for all transactions of online banking.

REFERENCES

[1] Yan Wu ; Sch. of Econ., HuaZhong Normal Univ., Wuhan, China -"The Analysis on the Problems of Third-Party

Payment"- International Conference on Management and Service Science (MASS), E-ISBN : 978-1-4244-5326-9 IEEE

24-26 Aug. 2010

[2] Thair, A. ; Sch. of Design, Commun. & IT, Univ. of Newcastle, Callaghan, NSW, Australia ; Luo Suhuai ; Peter,

S."Consumer acceptance of mobile payments: An empirical study" 4th International Conference on New Trends in

Information Science and Service Science (NISS),E-ISBN : 978-89-88678-17-6 IEEE 11-13 May 2010

[3] Sahut, J.-M. ; Amiens Sch. of Manage., Amiens-"Security and Adoption of Internet Payment "Emerging Security

Information, Systems and Technologies, 2008. SECURWARE '08. Second International Conference on E-ISBN :978-0-

7695-3329-2 - IEEE Aug. 2008

[4] Yang Jing, China "On-line Payment and Security of E-commerce" Proceedings of the 2009 International Symposium on

Web Information Systems and Applications (WISA’09)ISBN 978-952-5726-00-8 May 22-24, 2009

[5] R. Gross and A. Acquisti, “Information Revelation and Privacy in Online Social Networks,” Proc. ACM Workshop Privacy

in the Electronic Soc. (WPES 05), AC Press, 2005, pp. 71–80.

[6] http://www.awwwards.com/18-online-payment-services-and-systems.html

[7] http://sixrevisions.com/tools/online-payment-systems

[8] http://www.tipsandtricks-hq.com/7-advantages-to-using-paypal-to-buy-online-2668

[9] ttp://techwelkin.com/how-to-use-paypal-how-does-paypal-work

[10] Niranjanamurthy M, DR. Dharmendra Chahar - Analysis of E-Commerce and M-Commerce: Advantages, Limitations and

Security issues - IJARCCE - Vol. 2, Issue 6, June 2013.

[11] M Niranjanamurthy, DR. Dharmendra Chahar "The study of E-Commerce Security Issues and Solutions" - Vol. 2, Issue

7, July 2013