Main Article Content

Alfonso González Briones
University of Salamanca
Spain
Pablo Chamoso
Catholic University of Daegu, Faculty of Information Technology, Daegu
Korea, Republic of
Alberto Barriuso
University of Salamanca
Spain
Vol. 5 No. 3 (2016), Articles, pages 55-61
DOI: https://doi.org/10.14201/ADCAIJ2016535561
Accepted: Nov 15, 2016
Copyright

Abstract

The ability to connect to the Internet from a wide variety of devices such as smart phones, IoT devices and desktops at anytime and anywhere, produces a large number of e-commerce transactions, such as purchases of clothes, ticket entrances for performances, or banking operations. The increasing number of these transactions has also created an increase in the number of threats and attacks by third parties to access user data banks. It is important to control the access procedure to user data so that the number of threats does not continue to grow. To do so, it is necessary to prevent unauthorized access, theft and fraud in electronic commerce, which is required to ensure the safety of these transactions. Many e-commerce platforms are developed through multi-agent-systems because they include certain advantages to control the product, resource management, task distribution, etc. However, there are a number of threats that can jeopardize the safety of the agents that make up the system. These issues must be taken into account in the development of these multi-agent systems. However, existing methods of development do not cover in depth the issue of security. It is necessary to present and classify the potential security flaws of multi-agent systems. Therefore, the present research presents a review of the main vulnerabilities that occur in multi-agent systems responsible for managing e-commerce applications, as well as the proposed solutions to the major security problems on these platform systems. The main conclusions provided by this research is the need to optimize security measures and enhance the different security solutions applied in e-commerce applications in order to prevent identity theft, access to private data, access control, etc. It is therefore essential to continue to develop the security methods employed in applications such as e-commerce as different types of attacks and threats continue to evolve.

Downloads

Download data is not yet available.

Article Details

References

Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multi-agent systems. Artificial Intel-ligence Review, 42(4), 607-636. https://doi.org/10.1007/s10462-012-9343-1

Borselius, N. (2002, June). Security in multi-agent systems. In Proceedings of the 2002 International Conference on Security and Management (SAM'02) (pp. 31-36).

Bouch, A. (2011). 3-D Secure: A critical review of 3-D Secure and its effectiveness in preventing card not present fraud. University of London, Londra, eri?im: http://www. 58bits. com/thesis/3-D_Secure. pdf, eri?im tarihi, 8, 2014.

Cremonini, M., Omicini, A., & Zambonelli, F. (1999). Multi-agent systems on the Internet: Extending the scope of coordina-tion towards security and topology. InMulti-Agent System Engineering (pp. 77-88). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-48437-X_7

Jung, Y., Kim, M., Masoumzadeh, A., & Joshi, J. B. (2012). A survey of security issue in multi-agent systems. Artificial Intelli-gence Review, 37(3), 239-260. https://doi.org/10.1007/s10462-011-9228-8

Lokhande, P. S. (2013). E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures.

Mouratidis, H., Giorgini, P., & Manson, G. (2003, July). Modelling secure multiagent systems. In Proceedings of the second in-ternational joint conference on Autonomous agents and multiagent systems (pp. 859-866). ACM. https://doi.org/10.1145/860575.860713

Niranjanamurthy, M., & Chahar, D. D. (2013). The study of e-commerce security issues and solutions. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2885-2895.

Stallings, W., & Brown, L. (2008). Computer security. Principles and Practice.

Viega, J., Bloch, J. T., & Chandra, P. (2001). Applying aspect-oriented programming to security. Cutter IT Journal, 14(2), 31-39.

Wong, H. C., & Sycara, K. (2000). Adding security and trust to multiagent systems. Applied Artificial Intelligence, 14(9), 927-941. https://doi.org/10.1080/08839510050144886