透過您的圖書館登入
IP:18.221.53.5
  • 期刊

Online Shopping Information Encryption based on Hierarchical Encryption Model

摘要


With the continuous development of information technology, online shopping has become a preferred way of shopping by its convenience and rapidity. However, online shopping also brings some hidden dangers to consumers while serving them. The personal information provided by consumers in shopping becomes a commodity and is used by businesses, which seriously threatens the balance of consumers' rights and interests and the market. At present, for many large enterprises, most online shopping data are processed in batches in a unified encryption mode, which leads to an imbalance between efficiency and security. Therefore, this paper proposes a layered encryption model. By adopting different encryption algorithms for various types of data generated in the online shopping process, it can not only improve the efficiency and security of encryption on the premise of ensuring security, but also can guarantee the interests of enterprises and protect the personal information of consumers to the greatest extent. The experiment shows that the simulation results of the model achieve high accuracy under the premise of ensuring data encryption.

參考文獻


Zhao, J. (2011). The e-business development trends in china online shopping industry. In: 2011 International Conference on Computer Science and Education. Qingdao. 537-547.
Chen, J., Xie, X., & Jing, F. (2011). The security of shopping online. In: 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. Harbin. 9: 4693-4696.
Guo, G., Qian, Q., & Zhang, R. (2015). Different implementations of AES cryptographic algorithm. In: 12th IEEE International Conference on Embedded Software and Systems. New York. 1848-1853.
Li, W. (2022). Data encryption technology in computer network information security. Network Security Technology and Application, 11:23-24.
Yu, X., & Yu L. (2013). Research on a data cryptography algorithm based on Caesar ciphering. Computer Security, 04: 57-60.

延伸閱讀