Big Data Concern With Web Applications: The Growth Enhancement For Free Venture Proposal
Big Data Concern With Web Applications: The Growth Enhancement For Free Venture Proposal
Big Data Concern With Web Applications: The Growth Enhancement For Free Venture Proposal
Key words: Business Hub, Digital Marketing, Business Sharing, Payment, Security
I. INTRODUCTION
Ours Main motto is give priority to low category business such as Tea stall, street vendor, flower shop etc. We encourage them
to register with us free and explain the advantage of them.
Here we provide navigator, advertisement and rating facility to them. New Comer to society or city can easily find
their requirement easily by time saving we providing pan-India search services via the Phone, Web, Mobile and SMS.
In this web application we provide the some facility like free listing map navigation, Advertisement, rating, From
lower Category to higher Category all of them can able to register with us free of cost.
Some of the other services that can be of assistance to you for leisure, health and home convenience are - Courier
Service, Laundry Service, AC Repair, Thyrocare, Metropolis, Order Mineral Water, Book a Table, Doctor's Appointment,
Order Food Online, etc.
II. MODULES
There are two modules in this topic mainly
Security Aspects for Business Profiles,
Security Aspects for Online Transaction.
A. Security Aspects for Business Profiles
Here are three main security issues relevant to doing business online:
Verifying the identity of the person you are doing business with.
Ensuring that messages you send and receive have not been tampered with.
Obtaining evidence of the date, time and place at which a contract was made.
1) Encryption
The process of encryption underpins many information and communications technology security arrangements. Generally, the
encryption process involves encoding a message using an encryption algorithm so that only the sender and intended recipients
can access it. The encryption algorithm uses a key that at the receiving end is used to decode the message.
Data protection: The data protection principle states that 'appropriate technical and organisational measures shall be taken
against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to,
personal data'. It is important to note that data controllers must take into account both the harm that might result from
unauthorised processing and the nature of the data to be protected. The ICO have ordered numerous bodies to use
encryption techniques after personal data was leaked, and in some cases have imposed a fine.
B. Security Aspects for Online Transaction
Security is an essential part of any transaction that takes place over the internet. Customer will lose his/her faith in e-business
if its security is compromised. Here are some payment security basics you should take in consideration:
1) Privacy Policy
You need to have a privacy policy that will make customers comfortable shopping at your site. Customers want to know that
their information will be kept secure and confidential and will not be used for malicious purposes. They need to know what you
plan to do with the data you collect.
2) Secure Transaction
Ensure that your online transactions will be secure. Use SSL (Secure Socket Layer) encryption to ensure your customers’
personal and credit card data is not compromised or exposed to third parties during transactions.
IV. CONCLUSION
From this document we can conclude that for accessing web application we needs to provide security for its data, payment
options and also prevents from intruders from being hacked. And for that purpose we need to provide some of the security
techniques. So that, users will get reliable access to the application and also be sure that their data and credential information
are also secure.
REFERENCES
[1] "SECURITY REQUIREMENTS." National Information Assurance Training and Education Center. IRI, Pocatello, Idaho.
Web. 28 May 2014.
[2] "Security Requirements Engineering: A Framework for Representation and Analysis."IEEE Computer Society. 34.1
(2008): 133-153.
[3] "Authorization." From Wikipedia to encyclopedia. 2014
[4] "Information Technology Security Assessment" Assessment. 2013.
[5] "Web Authentication Security." SANS Institute InfoSec Reading Room. 06 june 2003. Reading
[6] "Common Criteria for Information Technology Security Evaluation. "http://www.commoncriteriaportal.org/. Common
Criteria, Web. 28 May 2014
95