STRUCTUREAL DEASIGN OF SECURE E-COMMERCE WEBSITES EMPLOYING MULTI-AGENT SYSTEM
The vast growth in electronic trading and monetary transactions results to increase the importance of E-commerce applications rapidly. In order to accomplish the fully functioning, reliable, scalable, secure, efficient and user-friendly E-commerce applications, sufficient system analysis and design processes are important. Shopping over the internet requires offering secure payment method.
Providing security for each individual online consumer at the same time (particularly for large websites) is a time-consuming effort that can result in a variety of issues, including response delays, customer orders being lost, and system freeze or crash, all of which impair system performance.
This work seeks to present a new multi-agent system prototype structure that solves the challenge of security while avoiding issues that might degrade system performance. By creating integrated system taking into account the three parties the e-commerce, the e-bank and the customer, the main concentration is to create an archeticture that helps in decreasing the website traffic and supportng the security with effective performance. To simulate the real systems a recommendation system is created based on the customer behaviors to increase system performance in helping the customers to find their favorite products and solve problems like cold start, sparsity of user‐item matrix, scalability, and changes in user interest.
This is done by creating a commercial environment (e-commerce and e-bank websites) and a software agent that is installed on the client's device to handle the purchase and ciphering procedures without the need for the consumer to intervene. The security process involve preprocessing phase followed by a modified lightweight AES employing chaotic tent map to generate encryption key.
 F. T. A. Hussien, A. M. S. Rahma and H. B. A. Wahab, “A secure E-commerce Environment using Multi-agent System,” Intelligent Automation & Soft Computing , vol. 34, no. 1, pp. 499–514 , 2022.
 Asia Ali Al-Karkhi, “Task recovery in self-organized multi-agent systems for distributed domains,” Ph.D. dissertation, University of Essex, England, 2018.
 A.A. Mayyadah, “Providing security for nfc-based payment systems using a management authentication server, “in 4th International Conference on Information Management (ICIM), IEEE , Oxford, UK, pp.184-187, 2018.
 N.A. Mohd and Z.F. Zaba, “Review of usability and security evaluation model of e-commerce website,” Procedia Computer Science, vol.161, pp. 1199-1205, 2019.
 M.A. Hussain “A study of information security in e- commerce applications,” International Journal of Computer Engineering Science (IJCES), vol.3, no. 3, pp.1-9, 2013.
 R. Canlas, “Capturing security mechanisms applied to e-commerce :an analysis of transaction security,” International Journal of Security and its Applications , vol.15, no. 2, pp. 1-10, 2021.
 S. Shawon, M. Rahman and R. Luckey, “E-commerce systems security for small businesses,” International Journal of Network Security & Its Applications, vol. 5, no. 2, pp. 193-210, 2013.
 I. AA. Abdul-Jabbar and S. M. Kadhim, “ Copyright protection service for mobile images,” Engineering & Technology Journal, vol. 34, no. 4, pp. 444-450, 2016.
 X. Hao, S. Xiao-Hong and Y. Dian, “Multi-agent system for e-commerce security transaction with block chain technology, “IEEE International Symposium in Sensing and Instrumentation in IoT Era ISSI, Shanghai, China, pp.123-134, 2018.
 Y. Huang, J. Debnath, M. Iorga, A. Kumar and B. Xie, “CSAT: a user-interactive cyber security architecture tool based on nist-compliance security controls for risk management, “ IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, USA, pp. 707-697, 2019.
 M.I. ALadan.,” E-commerce security challenges: a taxonomy,” Journal of Economics, Business and Management, vol. 4, no.10 pp. 589-593, 2016.
 P.D. Shah and R.S. Bichkar, “Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure, “ Engineering Science and Technology, an International Journal, vol. 24, no.3,pp. 782-794, 2021.
 S. Ehikioya and E. Guillemot, “A critical assessment of the design issues in e-commerce systems development,” Engineering Reports, vol.2, no. 3, pp. 1-24, 2020.
 P. Palpunavam, H Foon, T. S. Ono and C.C. Teo, “E-commerce security and identity integrity: the future of virtual shopping,” Journal of Computational and Theoretical Nanoscience, vol. 23, no. 8, pp. 7849-7852, 2017.
 Tarek Helmy, “ COLLABORATIVE MULTI-AGENT-BASED E-COMMERCE FRAMEWORK,” International Journal of Computers, Systems and Signals, Vol. 8, No 1, pp. 3-12,2007.
 Faiz Al-Shrouf1, Aiman Turani2, and Khalil Al-Shqeerat, “ Software Agents for E-Commerce Data Workflow Management,” J.M. Zain et al. (Eds.): ICSECS 2011, Part II, CCIS 180, pp. 96–106, 2011.
 Sougata Khatua*1, Zhang Yuheng 2, Arijit Das 3 and N.Ch.S.N. Iyengar, “ A MULTI AGENT BASED E-SHOPPING SYSTEM,”, Journal of Global Research in Computer Science , Volume 2, No. 4, pp. 44-54, 2011.
 Bala M. Balachandran and Masoud Mohammadian, “DEVELOPMENT OF A FUZZY-BASED MULTI-AGENT SYSTEM FOR E-COMMERCE SETTINGS ,” Procedia Computer Science 60 ( 2015 ) 593 – 602.
 Y. Hedin and E. Moradian, “Security in multi-agent systems,” Procedia Computer Science, vol. 60, pp. 1604 – 1612, 2015.
 A. G. Briones, P. Chamoso and A. Barriuso,” Review of the main security problems with multi –agent systems used in e-commerce application,” Advances in Distributed Computing and Artificial Intelligence Journal, vol. 5, no. 3, pp. 55 – 61, 2016.
 M.P. Gupta and A. Dubey, “E-commerce study of privacy, trust and security from consumer’s perspective,” International Journal of Computer Science and Mobile Computing, vol. 5, no. 6, pp. 224-232, 2016.
 N. Cooharojananone, K. Akasarakul, T. Wongkhamdi, P. Pruetthiwongwanich and K. Atcha, “The study of the local community products (otop) website characteristics toward buyer decision using eye tracking,” IEEE 12th International Conference for Internet Technology and Secured Transactions (ICITST), Cambridge, UK, pp. 411-416, 2018.
Copyright (c) 2022 Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat A bdul Wahab
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.