E-Commerce Security Research in Big Data Environment

2018 ◽  
Vol 14 (1) ◽  
pp. 63-76 ◽  
Author(s):  
Mei Zhang ◽  
Huan Liu ◽  
Jinghua Wen

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.

Author(s):  
Mei Zhang ◽  
Huan Liu ◽  
Jinghua Wen

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.


Author(s):  
Mei Zhang ◽  
Huan Liu ◽  
Jinghua Wen

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Ying Liu ◽  
Yan Jin ◽  
Qi Liu

In recent years, the rapid development of e-commerce and mobile communications has ushered in a new era in the era of big data and has also given birth to emerging industries such as big data. People are paying more and more attention to data, and all walks of life are trying to analyze data and make use of the potential value of data. Business organizations use big data analysis to reduce business costs, plan real-time traffic routes for thousands of express vehicles to avoid congestion, and use click stream analysis and data mining to avoid fraud. This article combines big data with e-commerce security, deeply studies the composition of e-commerce security system and key security strategies and technologies, and discusses some problems in the combined application of blockchain and electronic settlement. The birth of big data technology can solve the contradictions in today’s e-commerce security, introduce the popular and widely distributed Apache Hadoop platform, deeply study the structure of Hadoop, and focus on the data analysis and processing method products of the second generation of Hadoop YARN. It is recommended to start with data, manage, and monitor e-commerce behaviors and improve the e-commerce security system. Finally, many important aspects that need to be considered in the big data e-commerce security system will be discussed. The analysis results show that the credential management and control system based on blockchain technology proposed in this paper can resist most frauds and realize the safe storage of transaction data and cannot be tampered with. Experiments have proved that the types of vulnerabilities and defects show that improper input is the main reason; the system error rate is mainly concentrated at 0.50%, and all the data indicate that the application of big data blockchain in electronic settlement provides great value, and the security of the electronic economy has increased by at least 60%.


2014 ◽  
Vol 971-973 ◽  
pp. 1924-1927
Author(s):  
Si Wen Guo

with the popularity of electronic commerce, its security problem is more and more attention. As unsafe incidents occurred frequently, people for the security of e-commerce is becoming more and more attention. E-commerce security is a core and the key problem of e-commerce development, the development of efficient and safe electronic commerce management system is very necessary. According to the electronic commerce security architecture, this paper studies and analyzes the network service layer, layer encryption technology, security authentication, transaction protocol layer, potential danger in business system and so on various layers and safety technology, according to the security of the encrypted data and the data transmission performance problems, applying the appropriate encryption algorithm to improve the security and speed of the system.


2021 ◽  
Vol 2 (3) ◽  
pp. 36-42
Author(s):  
Xiaomei Hu ◽  
Yuan Yuan ◽  
Mengjie Wang

Information ability is the basis and premise of college students' survival and career development, the condition of their lifelong learning, and the necessary ability of innovative talents. In order to adapt to the rapid development of the current information society, college students, as an important force of social construction, must cultivate good information ability. Firstly, this paper analyzes the position of college students' information ability in the ability structure. Secondly, it analyzes the constituent elements of college students' information ability in the big data environment. Thirdly, it analyzes the current situation of information ability training of economic and management college students under the big data environment. Finally, combined with the actual situation of Anhui University of Finance and Economics, through the questionnaire, this paper investigates and analyzes the current situation of economic and management college students' information ability, in order to explore the main factors affecting college students' information ability.


Author(s):  
Fatama Sharf Al-deen ◽  
Fadl Mutaher Ba-Alwi

Due to the rapid development in information technology, Big Data has become one of its prominent feature that had a great impact on other technologies dealing with data such as machine learning technologies. K-mean is one of the most important machine learning algorithms. The algorithm was first developed as a clustering technology dealing with relational databases. However, the advent of Big Data has highly effected its performance. Therefore, many researchers have proposed several approaches to improve K-mean accuracy in Big Data environment. In this paper, we introduce a literature review about different technologies proposed for k-mean algorithm development in Big Data. We demonstrate a comparison between them according to several criteria, including the proposed algorithm, the database used, Big Data tools, and k-mean applications. This paper helps researchers to see the most important challenges and trends of the k-mean algorithm in the Big Data environment.


2014 ◽  
Vol 556-562 ◽  
pp. 5797-5800
Author(s):  
Song Jie Gong ◽  
Xue Mei Zhang

The appearance of cloud security system makes the spread of computer viruses possess some new features. The open environment in cloud computing is much more complex, and can not fully adapt to the new application of computer network such as cloud computing. Cloud computing offers the advanced capabilities of sharing, where the computing and storage capabilities are outsourced on demand, With the wide use of cloud computing services, tenants require higher and higher security assurance. Through the research and analyss of security in cloud computing, the design model of anti-spam electronic commerce security system based on cloud computing is presented, and the functional modules of the system are analyzed. Lastly, the construction model of anti-spam electronic commerce security system is advanced.


2018 ◽  
Vol 14 (05) ◽  
pp. 42
Author(s):  
Buying Chen

<span style="font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: DE; mso-ansi-language: EN-US; mso-bidi-language: AR-SA;">Along with the rapid development of Web of Things, the RFID technology is widely applied in every field, but today, the great challenge we face is how to avoid information conflict and collision in the process of acquisition and treatment of massive information. It is the keystone of the study. This paper conducts a comparative analysis on different Tree-based algorithms as improved, and integrated with multiple sub-cycle response mechanism, a Multi-Response Collision Tree algorithm is proposed. And beyond that, this paper simulates and analyzed this algorithm and other improved ones. The results reveal that, compared to other algorithms, MRCT algorithm features a better performance, less recognition cycles, least query time slots on average, and ceiling throughput rate.</span>


Sign in / Sign up

Export Citation Format

Share Document