NEXT-GEN E-COMMERCE WEBSITE WITH ENCRYPTED PAYMENT GATEWAY USING GENETIC ALGORITHMS
DOI:
https://doi.org/10.29121/ijetmr.v10.i5.2023.1599Keywords:
E-Commerce, Encrypted Payment, Gateway, Genetic Algorithms, Information TechnologyAbstract
The rapid advancement of Information Technology (IT) has transformed traditional commerce, especially in the realm of digital payments. The Indian government's push during the demonetization period accelerated the shift from conventional payment systems to secure, convenient digital transactions. The growing penetration of smartphones and internet connectivity has further fueled the adoption of digital payments across urban and rural regions. However, with the increasing reliance on API-driven systems for online transactions, ensuring data security has become paramount. Many platforms still operate on outdated APIs, while newer ones continue to emerge, posing both opportunities and security risks. To address these concerns, this project proposes an E-commerce platform integrated with a secure payment gateway utilizing genetic encryption techniques. Genetic encryption, inspired by the principles of genetic algorithms, introduces an adaptive and robust approach to securing sensitive transactional data and API communications. This system not only enhances payment security but also ensures safe and efficient data exchanges between third-party services, paving the way for a more resilient and trustworthy digital commerce ecosystem.
Downloads
References
Global Payments Inc. (2020). Developer's Guide To Payment APIs.
Goldberg, D. E. (1989). Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley.
Holland, J. H. (1975). Adaptation in Natural and Artificial Systems: An Introductory Analysis With Applications To Biology, Control, and Artificial Intelligence. University of Michigan Press.
Kaufman, C., Perlman, R., & Speciner, M. (2016). Network Security: Private Communication in A Public World (2nd ed.). Prentice Hall.
Liu, J., Zeng, W. (2021). A Survey on Secure APIs in E-Commerce Payment Systems. IEEE Transactions on Services Computing, 14(3), 810-823.
OWASP Foundation. (2021). API Security Top 10. Retrieved from https://owasp.org/www-project-api-security/
Rob, M., Opara, E. (2003). Electronic Commerce. International Thomson Publishing.
Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Luxmi, Manik Jain, Meenakshi, Jagriti Malviya

This work is licensed under a Creative Commons Attribution 4.0 International License.
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section