E-Commerce Security Research in Big Data Environment

E-Commerce Security Research in Big Data Environment

Mei Zhang, Huan Liu, Jinghua Wen
Copyright: © 2018 |Pages: 14
DOI: 10.4018/IJEIS.2018010104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.
Article Preview
Top

1. Introduction

In September 2008, the “Big Data: Science in the petabytes Era” has been published in the famous magazine “Science.” So. the “Big Data” has become a hotspot of academia and industry (Feng Deng-Guo et al., 2014). Since 1997, the company-- IBM put forward the concept of e-business (Electronic Business), as an emerging industry, which has been developed rapidly in recent 20 years. Today in the prosperous development of e-commerce, the emergence of big data increased the development of e-commerce to a new national strategy level (Wang, 2014).

E-commerce, as a digital platform, is developing rapidly, which carries a large amount of material and the structure and unstructured data. When a lot of data are growing at the same time, the security of data collection, storage and analysis has become an urgent problem to be solved in e-commerce. Recently, Internet users increase rapidly, and the network interactive ways increase variously, which has brought great convenience for information communication and information sharing. People do business activities through network, which has been a kind of fashion. At the same time, huge amounts of business transaction data are emerging constantly in the information space. These data, as the most basic organization form of e-commerce activities, are for saving energy. Data as biological cells has replicability, infectivity, transmissibility and diffusivity. When infected, it spreads quickly. The spread of transmission channels and fields is often beyond people’s expectation (Chen, 2013) When people enjoy convenient communications, resource sharing and many other benefits which are brought by network, e-commerce information security is faced with unprecedented potential threats. Traditional means of data collection and analysis, faced with the arrival of the era of big data, has become overwhelmed. In the big data environment, e-commerce security research is particularly urgent and important.

Recently, scholars at home and abroad did a lot of researches on e-commerce security issues. Shu Xiwang (Shu, 2013) generalized the e-commerce security issues, especially the latest research results of e-commerce security issues. On this base, combined with the relevant technology of the big data and cloud computing, e-commerce security issues which are based on big data and cloud computing environment have been analyzed. Wang Shanjun(Wang Shanjun,2013)leaves the electronic commerce system such as the information flow, logistics and cash flow as the main research object. She used analytic hierarchy process, the most commonly used, in the Information security risk analysis to analyze security problems which caused by the three factors, and puts forward an effective e-commerce security evaluation model. Si Yingshuo (Si, Yang & Liu, 2011) analyzed E-commerce system security hierarchy by synthesis, aiming at security requirements. He put forward a kind of quantitative risk assessment model. Meng Xiao Ming (Meng Xiaoming,2006)based on OGSA security architecture and multistage agency chain thought, shows the e-commerce security structure based on grid environment, and evaluated and analyzed its safety performance. Du Yansui (Du, 2015) analyzed how cloud computing impacts development of electronic commerce. He puts forward security problems of e-commerce based on cloud computing, and gives corresponding countermeasures. However, scholars at home and abroad about the e-commerce security research which under the big data environment is relatively scarce.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing