Advertisement

E-commerce Transaction Information Security Model Based on Big Data Analysis

  • Yang Wang
  • Meng Tu
  • Jiejie CuiEmail author
Conference paper
  • 39 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1147)

Abstract

The emergence of the Internet is a major change in human history. We have changed the traditional way of living and working, breaking time and geographical constraints, and bringing human society into the information age. With the continuous development of information technology, economic globalization and information networking have become an irreversible trend in the process of world economic development. Economic globalization is based on the information network, which promotes economic globalization. As a result of the combination of the two, e-commerce is an inevitable choice for modern economic development. The purpose of this article is to analyze the information security of e-commerce transactions based on big data. Through fuzzy comprehensive evaluation method and algorithm of Vague set. The fuzzy comprehensive evaluation method based on fuzzy set theory is based on fuzzy set. Vague set is more capable of describing uncertain information than fuzzy set. Therefore, this paper uses Vague set algorithm for analysis. This article evaluates the information security of an e-commerce company and uses questionnaires to interview relevant experts to obtain the original data. Using the algorithm of Vague set to process the data, it is concluded that according to the principle of maximum membership, and based on the above results, it can be concluded that the category of the e-commerce company’s data security in the evaluation set V is safe.

Keywords

Information network Fuzzy comprehensive evaluation method Questionnaire survey E-commerce transaction 

References

  1. 1.
    Tian, X., Liu, L.: Does big data mean big knowledge? Integration of big data analysis and conceptual model for social commerce research. Electron. Commer. Res. 17(1), 169–183 (2017)CrossRefGoogle Scholar
  2. 2.
    Zhao, W.W.: Research on social responsibility of e-commerce platform. IOP Conf. Ser. Mater. Sci. Eng. 439(3), 032063 (2018) CrossRefGoogle Scholar
  3. 3.
    Mahdiraji, H.A., Zavadskas, E.K., Kazeminia, A.: Marketing strategies evaluation based on big data analysis: a CLUSTERING-MCDM approach. Ekonomska Istraživanja Econ. Res. 32(1), 2882–2898 (2019)CrossRefGoogle Scholar
  4. 4.
    Kurniawan, E., Riadi, I.: Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM. Int. J. Comput. Sci. Inf. Secur. 16(1), 139–147 (2018)Google Scholar
  5. 5.
    Al-Zubaidie, M., Zhang, Z., Zhang, J.: Efficient and secure ECDSA algorithm and its applications: a survey. Int. J. Commun. Netw. Inf. Secur. 11(1), 7–35 (2019)Google Scholar
  6. 6.
    Dai, H., Zhang, X., Yang, D.: Research on multichannel transmission of security information in MAC layer based on zoom and forward in VANETs. Cluster Comput. (2), 1–6 (2018) Google Scholar
  7. 7.
    Prisha, P., Neo, H.F., Ong, T.S., et al: E-commerce security and identity integrity: the future of virtual shopping. J. Comput. Theor. Nanosci. 23(8), 7849–7852 (2017)Google Scholar
  8. 8.
    Wu, X., Wu, T., Khan, M.: Game theory based correlated privacy preserving analysis in big data. IEEE Trans. Big Data PP(99), 1 (2017) Google Scholar
  9. 9.
    Kamoun, F., Halaweh, M.: A fuzzy classification approach to assess e-commerce security perception. Int. J. Bus. Inf. Syst. 9(1), 108–126 (2017)Google Scholar
  10. 10.
    Li, D., Cai, Z., Deng, L.: Information security model of block chain based on intrusion sensing in the IoT environment. Cluster Comput. 22(Z1), 1–18 (2019)Google Scholar
  11. 11.
    Huang, A.: A risk detection system of e-commerce: researches based on soft information extracted by affective computing web texts. Electron. Commer. Res. 18(22), 1–15 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Chongqing Intellectual Property SchoolChongqing University of TechnologyChongqingChina
  2. 2.Graduate SchoolDong-A UniversityBusanKorea

Personalised recommendations