Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: http://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2017, 5(2), 83-89
DOI: 10.12691/jcsa-5-2-5
Open AccessArticle

Design and Implementation of a Secure Online Electronic Transaction (SOET) System for a Cashless Society

Etuh E1, , Obiniyi A.A2, Yusuf O. S3 and Akinyele O.A4

1Department of Mathematics and Computer Science, Arthur Jarvis University, Akpabuyo, Nigeria

2Department of Computer Science, Ahmadu Bello University, Zaria, Nigeria

3Department of Physics, Arthur Jarvis University, Akpabuyo, Nigeria

4ICT Department, Hephzit Technology, Osogbo, Nigeria

Pub. Date: August 15, 2017

Cite this paper:
Etuh E, Obiniyi A.A, Yusuf O. S and Akinyele O.A. Design and Implementation of a Secure Online Electronic Transaction (SOET) System for a Cashless Society. Journal of Computer Sciences and Applications. 2017; 5(2):83-89. doi: 10.12691/jcsa-5-2-5

Abstract

Business transaction since inception from trade by barter to modern e-commerce system constantly faced the challenges of how to minimise fraudulent activities around it. With the advent of Internet, trading has become a global activity where the location of one’s goods and services is no longer important provided there is a connection to the “market”. Serious attention must be given to the security challenges facing the “Market” arising from online authentication mechanisms. Prevalent ones today uses what the user knows (password) or what the user have (token) for authentication, there is a need for a more reassuring proof of identity to make cashless economy a huge success and ensure effective participation in the contemporary E-market. The research work- Secure Online Electronic Transaction (SOET) System integrates the functionality of biometric credential as authentication mechanism to ensure secured transactions over the network in an E-market of a cashless society.

Keywords:
authentication E-commerce E-payment E-market E-transaction cashless society

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

Figures

Figure of 7

References:

[1]  wikipedia. (2012). trade. http://en.wikipedia.org/wiki/Trade.htm 2012 [Apr. 26, 2012].
 
[2]  Lebergott, S. (1993). Pursuing happiness –. American consumers in the Twentieth Century. Princeton University Press, pp. 69.
 
[3]  Hassler, V. (2001). “Security Fundamentals for E-Commerce”. Massachusetts: Artech House, pp. 28.
 
[4]  Ezumba, S. “The Transition to a Cashless Economy in Nigeria”. http://www.reinventrebuild.com/nigeriaone.php 2011 [Feb. 6, 2013].
 
[5]  CBN. “Further Clarifications on Cash-less Lagos Project. Retrieved from Central Bank of Nigeria, 2006-2011”. http://www.cenbank.org/out/pressrelease/gvd/cashlesslagos Project.pdf May 6, 2011 [Nov. 19, 2013].
 
[6]  Ikhilae, E., Jibueze, J., and Igbonwelundu, A. P.” Wanted: Laws on cashless economy”. http://www.thenationonlineng.net/2011/index.php/law/43356-wanted-laws-on-cashless-economy.html. 2012 [Feb. 6, 2012].
 
[7]  Deichler, A. “Fraudwatch: A Threat to a Cashless Economy” http://www.afponline.org/pub/res/news/Fraudwatch__A_Threat_to_a_Cashless_Economy.html 2011 [Feb. 6, 2012].
 
[8]  Forouzan, B. A. (2007). “Data Communications and Networking” (Fourth ed.). New York,: McGraw-Hill Companies, Inc.New York, pp. 352.
 
[9]  Todorov, D. (2007). Mechanics of User Identification and Authentication: Fundamentals of Identity Management. USA: Taylor and Francis Group, LLC. pp.7-10.
 
[10]  Pfleeger, C. P. (1989). Security in Computing. Upper Saddle River, NJ 07458: Prentice Hall, Inc. pp. 196-241.
 
[11]  Blackburn, D., Miles, C., Wing, B., Shepard, K., Atkins, J., Basu, S., et. al. ‘Biometrics “Foundation Documents”., from National Science and Technology Council’s (NSTC) Subcommittee on Biometrics’ http://www.biometrics.gov/Documents/Blackburn_Australia_Conference_May08.pdf.org/biometrics.pdf May 08, 2005 [Apri. 03, 2013].
 
[12]  Ratha, N., Connell, J., & Bolle, R. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM systems journal, 40, 615-634.
 
[13]  Magno, B. M. “Survey of User Authentication”. Naval Postgraduate School Monterey, M Sc Computer Science, California, 1996.
 
[14]  Carrillo, C. M. “Continous Biometric Authentication for Authorized Aircraft Personnel: A Proposed Design”. M Sc Thesis, Naval Postgraduate School Monterey, California, 2003.
 
[15]  JVL. (2012). Isis Mobile Wallet. Retrieved December 15, 2012, from American Express: http://www.onlineamericaexpress.com/mobilewallet 2012 [Dec. 15, 2012].
 
[16]  Ismaili, H. E., Houmani, H., & Madroumi, H. (2014). “A Secure Electronic Transaction Payment Protocol Design and Implementation”. International Journal of Advanced Computer Science and Applications, pp. 172-180.