Professional Documents
Culture Documents
Abstract
Contract is text formatted legal information which is
used in the business interaction. Business interaction or
activity is like bill payment, delivery, purchase order etc
this thinks are include in the contract. We use two
different approaches for securing contract in the business
using first offensive bogus information technology.
When unauthorized access is suspected and then verified
by asking two more time to enter correct OTP (i.e. One
time password),OTP will generated after the company
user login into the system by entering their own login id
password. We use a disinformation attack by returning
large amounts of bogus information to the attacker. This
protects against the misuse of the real contract data and
second dividing contract, saving it on different servers
using encryption and retrieving it by using decryption
methods.
2. Securing contract
1. Introduction
In the modern business world, the interaction
between two or more business parties regulated through
the contract .The contract is text format information
which is used to interact with the business parties.
Business interaction or activity is like bill payment,
delivery, purchase order etc these things are include in
the contract. The contract can help to formalize business
process through which business relationship are realized.
Modern company manages a number of active
contracts for business actions contract are nothing but
text, but include rich knowledge about business
relationship, customer relationship. Securing the contract
in business process is more important and more
complex. In this paper we are trying to secure contract in
the business interaction. The contract can be hacked by
the other parties or outsider. Existing data protection
mechanisms such as encryption have been unsuccessful
in securing data theft attacks.
190
www.ijete.org
Login
OTP Generation
Correct OTP
Incorrect OTP
Login success
Login fail
Contract
Fake contract
5. Acknowledgment
We thank to Salvatore J. Stolfo, Malek Ben Salem, and
Angelos D. Keromytis for their support in Fog
Computing. We also thank to X. GAO, M. P. Singh, and
P. Mehra and All the authors of the papers whose
description is provided below and authors who are
working towards the same concept.
Clean contract
Clustering
Encryption
Saved on servers
References
Decryption
[1]
[2]
[3]
[4]
191
www.ijete.org
[5]
[6]
[7]
[8]
192
www.ijete.org