Secure Deep Learning Architecture Model for Data Management and Scheduling of E-Commerce Data

Authors

  • Hemalatha P Assistant Professor, TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, 641112, India. Author

DOI:

https://doi.org/10.69996/jsihs.2024007

Keywords:

E-Healthcare, Data Security, Intrusion Detection System (IDS), Deep Learning, Scheduling, E-commerce

Abstract

E-commerce refers to the buying and selling of goods and services online, including everything from clothes and electronics to food and household items. It typically involves online transactions, such as payments and delivery. E-healthcare, on the other hand, refers to the delivery of healthcare services and information through electronic means, such as the Internet, mobile devices, and telemedicine. Conventionally, healthcare systems using E-commerce are subjected to challenges associated with security, Regulatory Compliance, Quality, Payment, limited accessibility and adoption. Security in the Ecommerce platform is achieved with the Intrusion Detection System (IDS) which requires appropriate data management and scheduling process. This paper proposed a Secure Scheduling Key Management Deep Learning (SSKMDL) for the e-commerce in healthcare application. The SSKMDL model uses the key authority quantum channel for the key generation to minimize the eavesdropping, transmission error and data leakage to increase the security. The E-commerce user and content server communicate key server with the quantum channel for the encryption key and key server for the public channel in the groups. The SSKMDL model evaluate the different generated secret key for the user quantum distribution key to increase security with appropriate data management. Additionally, the SSKMDL model uses the nature-inspired algorithm for the accurate scheduling and detection of attacks in the data. The deep learning E-commerce application increases the detection rate of intrusion with the hybrid effectively and efficiently for the classification of anomalies network traffic and hybrid regression and Decision Tree model. The performance of proposed SSKMDL model is evaluated for the Network Security Laboratory Knowledge Discovery in Data Bases (NSL KDD) dataset and real-time E-healthcare dataset. The analysis stated that SSKMDL E-commerce model exhibits the optimal group key for the training and testing to achieve efficient data management with scheduling to increase security. The experimental results expressed that proposed SSKMDL model utilizes deep learning model for the generation of key, optimization, healthcare encryption and decryption to increase the security with deep learning model. With constructed SSKMDL model eavesdropping rate is reduced by 80% with the increases attack detection rate of 99%.

References

[1] S. Vinoth, H. L.Vemula, B.Haralayya, P.Mamgain, M. F. Hasan et al., “Application of cloud computing in banking and e-commerce and related security threats,” Materials Today: Proceedings, vol. 51, pp.2172-2175, 2022.

[2] S. Badotra and A. Sundas, “A systematic review on security of E-commerce systems,” International Journal of Applied Science and Engineering, vol.18, no.2, pp.1-19, 2021.

[3] M.Zhang, L.Lin and Z. Chen, “Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model,” Cluster Computing, pp.1-15, 2021.

[4] S. Luo and T. M.Choi, “E‐commerce supply chains with considerations of cyber‐security: Should governments play a role?,” Production and Operations Management, vol.31, no.5, pp.2107-2126, 2022.

[5] R.Yu, C.Wu, B.Yan, B.Yu, X.Zhou et al., “Analysis of the impact of big data on e-commerce in cloud computing environment,” Complexity, vol.2021, pp.1-12, 2021.

[6] Y. C. L. Tan, “Recent Technological Trends and Security Challenges in Trust-Building in ECommerce,” International Journal of Business and Management, vol.14, no.12, pp.226, 2021.

[7] Z.Dai and X. Guo, “Investigation of E-Commerce Security and Data Platform Based on the Era of Big Data of the Internet of Things,” Mobile Information Systems, vol.2022, 2022.

[8] F. T.Abdul Hussien, A. M. S.Rahma and H. B. Abdul Wahab, “A secure environment using a new lightweight AES encryption algorithm for E-commerce websites,” Security and Communication Networks, vol.2021, pp.1-15, 2021.

[9] F. T. A.Hussien, A. M. S.Rahma and H. B. A. Wahab, “Design and implement a new secure prototype structure of e-commerce system,” International Journal of Electrical and Computer Engineering, vol.12, no.1, pp.560, 2022.

[10] Y.Yalan and T. Wei, “Deep logistic learning framework for E-commerce and supply chain management platform,” Arabian Journal for Science and Engineering, pp.1-15, 2021.

[11] L.Li and J. Zhang, “Research and analysis of an enterprise E-commerce marketing system under the big data environment,” Journal of Organizational and End User Computing (JOEUC), vol.33, no.6, pp.1-19, 2021.

[12] A.Toqeer, T.Alghamdi, A.Nadeem, Y.Perwej and M. Thabet, “Cyber security intelligence and ethereum blockchain technology for e-commerce,” International Journal, vol.9, no.7, 2021.

[13] S.Vyas, S.Gupta, D.Bhargava and R. Boddu, “Fuzzy Logic System Implementation on the Performance Parameters of Health Data Management Frameworks,” Journal of Healthcare Engineering, vol.2022, 2022.

[14] S. S.Kute, A. K.Tyagi and S. U. Aswathy, “Security, privacy and trust issues in internet of things and machine learning based e-healthcare,” Intelligent Interactive Multimedia Systems for e-Healthcare Applications, pp.291-317, 2022.

[15] A.Kumar, A. K.Singh, I.Ahmad, P.Kumar Singh, P.K. Verma et al., “A novel decentralized blockchain architecture for the preservation of privacy and data security against cyberattacks in healthcare,” Sensors, vol.22, no.15, pp.5921, 2022.

[16] M. A. Kumaar, D. Samiayya, P.D. Vincent, K. Srinivasan, C.Y. Chang et al., “A hybrid framework for intrusion detection in healthcare systems using deep learning,” Frontiers in Public Health, vol.9, 2021.

[17] M.Shamila, K.Vinuthna and A.K. Tyagi, “A review on several critical issues and challenges in IoT based e-healthcare system,” 2019 International Conference on Intelligent Computing and Control Systems (ICCS), pp. 1036-1043, 2019.

[18] A.Kishor, C.Chakraborty and W.Jeberson, “A novel fog computing approach for minimization of latency in healthcare using machine learning,” 2021.

[19] J.Lansky, S.Ali, M. Mohammadi, M.K. Majeed, S.H.T. Karim et al., “Deep learning-based intrusion detection systems: a systematic review,” IEEE Access, vol.9, pp.101574-101599, 2021.

[20] J. P.Li, A.U.Haq, S. U.Din, J.Khan, A.Khan et al., “Heart disease identification method using machine learning classification in e-healthcare,” IEEE Access, vol.8, pp.107562-107582, 2020.

[21] S. S.Kute, A. K.Tyagi and S. U. Aswathy, “Security, privacy and trust issues in internet of things and machine learning based e-healthcare,” Intelligent Interactive Multimedia Systems for e-Healthcare Applications, pp.291-317, 2022.

[22] F.Akram, D.Liu, P.Zhao, N.Kryvinska, S. Abbas et al., “Trustworthy intrusion detection in e-healthcare systems,” Frontiers in public health, vol.1800, 2021.

Downloads

Published

2024-06-30

Issue

Section

Research Article

How to Cite

Hemalatha P. (2024). Secure Deep Learning Architecture Model for Data Management and Scheduling of E-Commerce Data. Journal of Sensors, IoT & Health Sciences (JSIHS,ISSN: 2584-2560), 2(2), 16-29. https://doi.org/10.69996/jsihs.2024007