E-Commerce Security Research in Big Data Environment

E-Commerce Security Research in Big Data Environment

Mei Zhang, Huan Liu, Jinghua Wen
DOI: 10.4018/978-1-7998-8957-1.ch055
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.
Chapter Preview
Top

1. Introduction

In September 2008, the “Big Data: Science in the petabytes Era” has been published in the famous magazine “Science.” So. the “Big Data” has become a hotspot of academia and industry (Feng Deng-Guo et al., 2014). Since 1997, the company-- IBM put forward the concept of e-business (Electronic Business), as an emerging industry, which has been developed rapidly in recent 20 years. Today in the prosperous development of e-commerce, the emergence of big data increased the development of e-commerce to a new national strategy level (Wang, 2014).

E-commerce, as a digital platform, is developing rapidly, which carries a large amount of material and the structure and unstructured data. When a lot of data are growing at the same time, the security of data collection, storage and analysis has become an urgent problem to be solved in e-commerce. Recently, Internet users increase rapidly, and the network interactive ways increase variously, which has brought great convenience for information communication and information sharing. People do business activities through network, which has been a kind of fashion. At the same time, huge amounts of business transaction data are emerging constantly in the information space. These data, as the most basic organization form of e-commerce activities, are for saving energy. Data as biological cells has replicability, infectivity, transmissibility and diffusivity. When infected, it spreads quickly. The spread of transmission channels and fields is often beyond people’s expectation (Chen, 2013) When people enjoy convenient communications, resource sharing and many other benefits which are brought by network, e-commerce information security is faced with unprecedented potential threats. Traditional means of data collection and analysis, faced with the arrival of the era of big data, has become overwhelmed. In the big data environment, e-commerce security research is particularly urgent and important.

Recently, scholars at home and abroad did a lot of researches on e-commerce security issues. Shu Xiwang (Shu, 2013) generalized the e-commerce security issues, especially the latest research results of e-commerce security issues. On this base, combined with the relevant technology of the big data and cloud computing, e-commerce security issues which are based on big data and cloud computing environment have been analyzed. Wang Shanjun(Wang Shanjun,2013)leaves the electronic commerce system such as the information flow, logistics and cash flow as the main research object. She used analytic hierarchy process, the most commonly used, in the Information security risk analysis to analyze security problems which caused by the three factors, and puts forward an effective e-commerce security evaluation model. Si Yingshuo (Si, Yang & Liu, 2011) analyzed E-commerce system security hierarchy by synthesis, aiming at security requirements. He put forward a kind of quantitative risk assessment model. Meng Xiao Ming (Meng Xiaoming,2006)based on OGSA security architecture and multistage agency chain thought, shows the e-commerce security structure based on grid environment, and evaluated and analyzed its safety performance. Du Yansui (Du, 2015) analyzed how cloud computing impacts development of electronic commerce. He puts forward security problems of e-commerce based on cloud computing, and gives corresponding countermeasures. However, scholars at home and abroad about the e-commerce security research which under the big data environment is relatively scarce.

This paper attempts to base on the data resources in e-commerce, and the big data views on the existing e-commerce security system, and strive to use big data analysis and processing method to enhance the defense capabilities of e-commerce security system, at the same to seek social reality in electronic commerce the common characteristics of crime phenomenon such as e-commerce theft, e-commerce fraud and so on. This behavior’s safety certificate is to guarantee the safety of the e-commerce market. In the cloud computing of big data environment, using cloud computing technology reasonably is to support the intelligent management for the enterprise.

Complete Chapter List

Search this Book:
Reset