Skip to main content

Design and Implementation of Secured E-Business Structure with LTL Patterns for User Behavior Prediction

  • Conference paper
  • First Online:
Advances in Data Science, Cyber Security and IT Applications (ICC 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1098))

Included in the following conference series:

  • 721 Accesses

Abstract

E-business applications are implemented for performing services of user transactions. Analysis performance of customer preferences can be enhanced based on E-business structure and predefined formula patterns. Linear temporal logic (LTL) provides multiple formula patterns for obtaining better query of user requirements. Protecting and verifying users’ preferences and transactions are major concerns for enhancing E-business applications. This paper presents a design of a secured B2C and G2C E-business framework based on 3D secure mechanism. Advanced formula patterns are applied to the secured E-business structure for enhancing analysis performance and predicting users’ behavior. Enhanced web server logs are generated and optimized with an authentication algorithm to record and secure infinite traces of event actions. The secured E-business framework is implemented for optimizing key metrics of user behavior and enhancing business analysis and user insights. Experimental results are conducted for displaying the efficiency for the enhanced web server logs and flag parameter algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ciarniene, R., Stankeviciute, G.: Theoretical framework of E-Business competitiveness. In: International Scientific Conference of Economics and Management, Procedia - Social and Behavioral Sciences, Elsevier, vol. 123, pp. 734–739 (2015)

    Google Scholar 

  2. Chao, K.: E-services in E-business engineering. J. Electron. Comm. Res. Appl. 16(2), 77–81 (2016). ELSEVIER

    Article  Google Scholar 

  3. Basu, A., Muylle, S.: Assessing and enhancing E-Business processes. J. Electron. Comm. Res. Appl. 10(4), 437–499 (2011)

    Article  Google Scholar 

  4. Saha, G., Desai, M., Ghosh, A., Saha, N.: Digital signature modeling in E-business. In: IEEE International Conference on E-business Engineering, pp. 350–354 (2014)

    Google Scholar 

  5. Ping, G.: Analysis the application of E-business for the tourism enterprises’ performance evaluation in China. J. Energy Procedia 5, 849–854 (2011). ELSEVIER

    Article  Google Scholar 

  6. Ahrens, A., Zascerinska, J.: A comparative study of engineering and business students’ attitude to E-business application. In: IEEE International Conference on E-Business, pp. 31–38 (2014)

    Google Scholar 

  7. Carmona, C.J., Ramirez, S., Torres, F., Bernel, E., Del Jesus, M.J., Garcia, S.: Web usage mining to improve the design of an E-commerce website: OrOliveSur.com. J. Expert Syst. Appl. 39, 11243–11249 (2012)

    Article  Google Scholar 

  8. Su, Q., Chen, L.: A method for discovering clusters of E-commerce interest patterns using click-stream data. J. Electron. Comm. Res. Appl. 14(1), 1–13 (2015). ELSEVIER

    Article  MathSciNet  Google Scholar 

  9. Hemapriya, A., Bhuvaneswari, M., Muneeswaran, K.: Reconstruction of user sessions from web server log. In: IEEE International Conference on Computing and Communication Technologies, pp. 37–42 (2015)

    Google Scholar 

  10. Ahrens, A., Zascerinska, J.: A framework for selecting sample size in educational research on E-Business application. In: IEEE International Conference on E-Business, pp. 39–46 (2014)

    Google Scholar 

  11. Sergio, H., Alvarez, P., Fabra, J., Ezpeleta, J.: Analysis of users’ behavior in structured E-commerce websites. IEEE Trans. Access J. 5, 1–17 (2017)

    Article  Google Scholar 

  12. Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient discovery of understandable declarative process models from event logs. In: Ralyté, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol. 7328, pp. 270–285. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31095-9_18

    Chapter  Google Scholar 

  13. Zugal, S., Pinggera, J., Weber, B.: The impact of testcases on the maintainability of declarative process models. In: Halpin, T., Nurcan, S., Krogstie, J., Soffer, P., Proper, E., Schmidt, R., Bider, I. (eds.) BPMDS/EMMSAD -2011. LNBIP, vol. 81, pp. 163–177. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21759-3_12

    Chapter  Google Scholar 

  14. Rezaei, R., Chiew, T., Lee, S.: A review on E-business interoperability frameworks. J. Syst. Softw. 93, 199–216 (2014). ELSEVIER

    Article  Google Scholar 

  15. Mostafa, A.M., Alroudhan, J., Hassan, M.M.: LTL formula patterns for enhancing the performance analysis for e-business structure. J. Theor. Appl. Inf. Technol. 97(8), 2429–2439 (2019)

    Google Scholar 

  16. Alvarez, P., Fabra, J., Hernandez, S., Ezpeleta, J.: Alignment of teacher’s plan and students’ use of LMS resources: analysis of moodle logs. In: IEEE International Conference on Information Technology Based Higher Education and Training, pp. 1–8 (2016)

    Google Scholar 

  17. Burattin, A., Cimitile, M.: Online discovery of declarative process models from event streams. IEEE Trans. Serv. Comput. 8(6), 1–14 (2015)

    Article  Google Scholar 

  18. Poggi, N., Muthusamy, V., Carrera, D., Khalaf, R.: Business process mining from E-Commerce web logs. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 65–80. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40176-3_7

    Chapter  Google Scholar 

  19. Colaco, J., Mittal, J.: An efficient approach to user navigation pattern prediction. In: IEEE International Conference on Advances in Electrical, Electronics, Information, Communication, and Bioinformatics, pp. 420–424 (2016)

    Google Scholar 

  20. Zhang, Q., Segall, R.: Web mining: a survey of current research, techniques, and software. Int. J. Inf. Technol. Decis. Making 7(4), 683–720 (2008)

    Article  Google Scholar 

  21. El Haddad, G., Aïmeur, E., Hage, H.: Understanding trust, privacy and financial fears in online payment. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 28–36 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayman Mohamed Mostafa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mostafa, A.M. (2019). Design and Implementation of Secured E-Business Structure with LTL Patterns for User Behavior Prediction. In: Alfaries, A., Mengash, H., Yasar, A., Shakshuki, E. (eds) Advances in Data Science, Cyber Security and IT Applications. ICC 2019. Communications in Computer and Information Science, vol 1098. Springer, Cham. https://doi.org/10.1007/978-3-030-36368-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36368-0_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36367-3

  • Online ISBN: 978-3-030-36368-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics