SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Nitish Kumar Singh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.481-484
RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Kerberos Based Electronic Tender system
NITISH KUMAR SINGH*, SUBNUM BEGUM*, SIBANI PATRA*,
PRIYADARSHINI ADYASHA PATTANAIK*
*SCHOOL OF COMPUTER ENGINEERING KIIT UNIVERSITY ODISHA, INDIA

ABSTRACT
An electronic tender (e-tender) system is a system in which selling, buying and providing contract by the
government with the help of online software. In this system the tender data is recorded, stored and processed
primarily as digital information. In the modern world e-tender system is increasing speedily and the popularity
of e-tender system need quality and security. In this paper a ‘KBETS’ is proposed which provides user to
participating in tender nevertheless of the geographic locations and without worrying about security.
Keywords: KBETS, TGS, AS,Kerberos

I.

INTRODUCTION

Current tender systems which were based on
some rules for exchange and these rules were used
for providing contract for goods or several other
types of services and then selling the item up to the
highest price. But this tendering system has several
types of issues like large number of resources, higher
cost, and different locations for different type of
tender. To overcome these issues, in recent years etender system has widely used in many different
formats. There are some popular tender algorithms
such as English, Dutch, Vickery auctions and Sealedbid used over the internet[1].
The popularity of e-tender system is increasing day
by day ,due to this popularity the fraud related
activities are also increasing[2].
In this paper, a model KBETS is proposed which
uses concept of Kerberos. Users who are interested
for e-tendering have to download an application on
their mobile, now they are able to participate in etender and they will also be unaware from
background processes. The basic purpose of this
model of e-tender is to increase security and quality
of an e-tender system.
II.
RELATED WORK:
The first Web browser for the Windows and
Macintosh platforms was released at the end of year
1993. The auctions were already in use even before
the release of this browser with the help of email
discussion lists and text-based newsgroups of
Internet[3].
According to government records, a total of 52,33
tenders, worth Rs 19,131 crore, have been awarded
through this system since it was instituted for the first
time in 2008. At present, the PWD, with 1,154
tenders worth Rs 7,243 crore, is the top grosser in the
list of departments that have gone the e-tendering
www.ijera.com

way. The decision to implement the e-tendering
system follows an order by the Allahabad high court
many years ago. In addition, the World Bank had also
said it would not grant a development policy loan to
UP unless a transparent e-procurement process was
put in place. Following these orders, former chief
minister Mayawati had introduced the e-procurement
system in January 2008, but the practice was quietly
dropped in 2010 without citing any reason. In 2008,
as a pilot project, e-procurement was introduced in
seven departments, including PWD and family
welfare, which was plagued by the National Rural
Health Mission scam. Later, it was also extended to
four more departments in 2009 but dropped hurriedly
in January 2010 because it was "too transparent" for
comfort. This happened even though the same
ministers had earlier approved the system after
hearing of the project's successful implementation in
Maharashtra and Karnataka. In May 2012, the SP
government allowed e-tendering in the mining
department, believed to be one department that is
worst affected by rigging[7].
At present, 14 government agencies - PWD,
industries, IT and Electronics, irrigation, mining,
KGMU,cooperative federation, women's welfare, Jal
Nigam, new and renewable energy development
agency, health and family welfare, UPPCL,
mandiparishad and the centrally-funded Pradhan
MantriGrameenSadak Y ojana (PMGSY ) - have
adopted the e-tendering and e-procurement
model[1].link
10 December 2013
Thiruvananthapuram corporation has invited e-tender
for roadworks for the first time since electronic
tendering has been introduced in the state. According
to a report in the New Indian Express, all tenders
under the public works section will now follow the etendering process[8]. e-Tendering will not only
reduce corruption but will also make the task of the
administration and contractors easier as they could
481 | P a g e
Nitish Kumar Singh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.481-484
process the tenders from the comfort of their homes
and would not have to deal with bulky physical
documents.
CHANDIGARH: The Haryana Government has, for
the first time, decided to introduce the concept of etendering to ensure more transparent and competitive
bidding, Chief Minister Bhupinder Singh Hooda said
here on Wednesday. He said the Haryana Public
Works (Building and Roads) Department would
procure all contracts through e-tenders for the
recently
sanctioned
Pradhan
MantriGraminSadakYojana Phase VII projects[9].
Recently it has seen that some websites are also used
by thieves for the purpose of issuing false tender or
selling stolen things to unsuspecting buyers[5]. paper
According to the record of police there were above
8000 crimes which involves fraud or deception,
stolen goods on e-Bay in the year of 2009[6].paper
III.

THE PROPOSED ELECTRONIC
TENDER SYSTEM

In this section an E-tender system called
KBETS is proposed. This system covers three stages:
Pre-registration, Post-registration & Retrieving eTender services. These three stages are labelled in
later section. These three stages are described one by
one.
3.1 Pre-registration stage
The customer, who wants to use electronic tender
system, sends message to authentication server. The
message contains VID card number and Credit card
number. The authentication server will receive three
things, VID card number, Credit card number &
corresponding mobile number, which this message
has contained. Authentication server will send user's
mobile number to SIM card issuing company. The
SIM card issuing company will send user's detail
such as user's name, date of birth, address, father's
name, e-mail id etc. Now authentication server will
also send VID card number to VID card issuing
authority. VID card issuing authority will send user's
details such as user's name, date of birth, address,
father's name, e-mail id etc, corresponding to that
mobile number which are common to that send by
VID card issuing company. Authentication server
will also ask to Credit card issuing authority for
credit information by sending the user's credit card
number. The credit card issuing authority will send
user's credit details such as user's previous profile,
available credit corresponding to that credit card
number. The authentication server will verify user's
details provided by VID and SIM card issuing
authority and also verify user's credit card
information and will check that user is eligible to
participate in e-tender or not. After successful
verification, the authentication server will send one
session key which is a randomly generated key and
www.ijera.com

www.ijera.com

one TGS key (which is generated with the help of
VID and Credit card number) for Ticket granting
server (TGS) to users which are encrypted with
symmetric key by the authentication server and this
symmetric key is already known to TGS. Now user
will request for using services of e-auction system
with TGS key. TGS will decrypt the TGS key with its
own symmetric key and verify that user is
authenticated or not. If user is verified then TGS will
send one user-id and password with the address of
application server to the corresponding user in ACK.
There may be a scenario where user can change
his/her mobile number in that case user has to send a
message to authentication server. This message
contains VID card number, Credit card number & old
number which user has already registered for eauction. After performing the above procedure, If
successful registration is done, then authentication
server will send a acknowledgement to user. This will
confirm the user about successful updation in his/her
mobile number[10].
3.2 Post-registration stage
In this phase user will request for e-tender application
from the given application server address by TGS
then application server will send an application on
his/her mobile phone. After installing successfully,
an icon will be displayed. Whenever user wants to
use the e-tender services, he/she simply double click
on that icon, after clicking on icon an interface will
appear. User has to enter his/her user id and password
and click on login button. After clicking on login
button, an encrypted message will be formed and
send to Application server this message contains
user's login details, Application server will decrypt
the received message and verified it. If it is
successfully verified then application server will send
an acknowledgement of validation, if it is failed then
it will send an acknowledgement according to kind of
failure that is occurred in the process of verification.

IV.

THE PROPOSED E-TENDER
ALGORITHM

The steps of KBETS model are given below:
A. Pre-registration Stage
1) User 𝑈𝑖 sends his/her VID number V𝑖𝑑 and
Credit card number in message.
2) AS receives message along with mobile
number.
3) AS sends message to SIM card issuing
company.
4) AS also sends message to VID card issuing
authority.
5) AS also sends message to Credit card issuing
authority.
6) AS verifies user validity and has not applied
for registration before this.

482 | P a g e
Nitish Kumar Singh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.481-484
7) AS will update its database and send ACK
which contains session key and TGS key to
user 𝑈𝑖.
8) Now user 𝑈𝑖 will send the request 𝑅𝑖 for etender system along with TGS key to TGS.
9) TGS will send the ACK which contains userid and password to the corresponding user.
B. Post-registration stage

www.ijera.com

1) User 𝑈𝑖 will fill the user-id and password and
then click on login button.
2) After pressing on the login button it will generate
an encrypted message.
3) Application server will receive and send
acknowledgement of confirmation to the
corresponding user 𝑈𝑖.

Fig 1: Pre-Registration stage

V.

CONCLUSION

Kerberos based e-tender system assures a
vision for providing security in the future, this system
provides a secure channel which is used for providing
communication between different entities. Apart
from Kerberos's many strengths, it has some
weaknesses and some limitations[11].
In this paper a KBETS model is proposed, which can
handle all earlier issues occurred in a traditional
tender system, KBETS model provides security from
unauthorized happenings like selling of stolen things,
occurrences of frauds during buying and selling,
security threats by attackers and intruders. Purpose of
this model is to enhance the level of security during

www.ijera.com

an e-tender process so that user can trust the system
and user can easily use the e-tender system without
any hesitation. This model is secure, easyto
understand and transparent and it can also be used
with some other technologies.

VI.

ACKNOWLEDGMENTS

This work was supported by KIIT
University, Bhubaneswar, Odisha. Our thanks to the
experts Prof. G.B Mund, Prof. Manoj Kumar
Mishra,Prof. BSP Mishra,Prof. M.N. Das and Our
senior Virendra Kumar Yadav, Saumyabhatam for
their valuable suggestions during various discussion
sessions they had made.

483 | P a g e
Nitish Kumar Singh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.481-484

www.ijera.com

Fig 2: Post-Registration stage

REFERENCES
[1]

P. Hemantha Kumar, GautamBarua (2001), "Design of a Real-Time Auction System" 4th International
Conference on Electronic Commerce Research, Dallas, Texas, USA, November 8-11, 2001.
[2] Miriam R. Albert (2008), "E-buyer beware: Why online auction fraud should be regulated", Article first
published online: 28 Jun 2008 , American Business Law Journal, Volume 39,Issue 4, June 2002, pp 575644.
[3] David Lucking-Reiley (2003) ,"Auctions on the Internet: What’s Being Auctioned, and How?",Article
first published online: 27 Mar 2003, The Journal of Industrial Economics, Volume 48, Issue 3,
September 2000, pp 227-252.
[4] Vakrat, Y., Seidmann, A. (2000), "Implications of the bidders' arrival process on the design of online
auctions", Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,2000.
[5] San Jose Mercury News (2002-06-11) "Stolen-Property Purchases Leave Ebay Buyers Burned"
(http://www.highbeam.com/doc/1G1- 120375160.html).
[6] The Sunday Times (2009-04-11) "Ebay: Brisk Bidding in stolen goods".
[7] http://articles.timesofindia.indiatimes.com/2013-06-07/lucknow/39813800_1_e-tendering-eprocurement-family-welfare
[8] http://egovreach.in/social/content/e-tenders-invited-road-works?whois=&serarr=
[9] http://www.thehindu.com/todays-paper/tp-national/tp-otherstates/govt-to-introduceetendering/article1905916.ece
[10] Virendra Kumar Yadav, SaumyaBatham, Amit Kumar Mallik,(2012) "Kerberos based Electronic Voting
System", ICNICT - Number 2 , IJCA Special Issue on Issues and Challenges in Networking,
Intelligence and Computing Technologies, 2012 by IJCA Journal.
[11] Steven M. Bellovin, Michael Merritt – AT&T Bell Laboratories, (1991) ,"Limitations of the Kerberos
Authentication System".

www.ijera.com

484 | P a g e

Weitere Àhnliche Inhalte

Was ist angesagt?

Aadhar card
Aadhar cardAadhar card
Aadhar cardMegha Gaur
 
Paper id 71201959
Paper id 71201959Paper id 71201959
Paper id 71201959IJRAT
 
Aadhar card
Aadhar cardAadhar card
Aadhar cardaadhar_card
 
Aadhar card number
Aadhar card numberAadhar card number
Aadhar card numberaadhar_card
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsTELKOMNIKA JOURNAL
 
IRJET - Service Base Application
IRJET - Service Base ApplicationIRJET - Service Base Application
IRJET - Service Base ApplicationIRJET Journal
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law casesSnavi
 
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Abhishek Ranjan
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment9945446746
 
Indian Banking Moving towards a new landscape - Impact of UIDAI (Aadhaar) in...
Indian Banking  Moving towards a new landscape - Impact of UIDAI (Aadhaar) in...Indian Banking  Moving towards a new landscape - Impact of UIDAI (Aadhaar) in...
Indian Banking Moving towards a new landscape - Impact of UIDAI (Aadhaar) in...Resurgent India
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommercesonali talkar
 
Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uidAjit Dadresa
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSJournal For Research
 

Was ist angesagt? (20)

G45023236
G45023236G45023236
G45023236
 
Aadhar card
Aadhar cardAadhar card
Aadhar card
 
Paper id 71201959
Paper id 71201959Paper id 71201959
Paper id 71201959
 
Aadhar card
Aadhar cardAadhar card
Aadhar card
 
F1802024245
F1802024245F1802024245
F1802024245
 
Aadhar card number
Aadhar card numberAadhar card number
Aadhar card number
 
article
articlearticle
article
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
 
IRJET - Service Base Application
IRJET - Service Base ApplicationIRJET - Service Base Application
IRJET - Service Base Application
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber law
Cyber lawCyber law
Cyber law
 
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019
 
Gresham Publication
Gresham PublicationGresham Publication
Gresham Publication
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Indian Banking Moving towards a new landscape - Impact of UIDAI (Aadhaar) in...
Indian Banking  Moving towards a new landscape - Impact of UIDAI (Aadhaar) in...Indian Banking  Moving towards a new landscape - Impact of UIDAI (Aadhaar) in...
Indian Banking Moving towards a new landscape - Impact of UIDAI (Aadhaar) in...
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 
Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uid
 
It act,2000
It act,2000It act,2000
It act,2000
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
 

Andere mochten auch

Bw4201485492
Bw4201485492Bw4201485492
Bw4201485492IJERA Editor
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498IJERA Editor
 
Be4201384387
Be4201384387Be4201384387
Be4201384387IJERA Editor
 
Bh4201396402
Bh4201396402Bh4201396402
Bh4201396402IJERA Editor
 
Lq3620002008
Lq3620002008Lq3620002008
Lq3620002008IJERA Editor
 
Lu3620212028
Lu3620212028Lu3620212028
Lu3620212028IJERA Editor
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041IJERA Editor
 
Lj3619451955
Lj3619451955Lj3619451955
Lj3619451955IJERA Editor
 
Mu3621742180
Mu3621742180Mu3621742180
Mu3621742180IJERA Editor
 
Mg3620962101
Mg3620962101Mg3620962101
Mg3620962101IJERA Editor
 
Hy3613901394
Hy3613901394Hy3613901394
Hy3613901394IJERA Editor
 
Gq3611971205
Gq3611971205Gq3611971205
Gq3611971205IJERA Editor
 
Gv3612301235
Gv3612301235Gv3612301235
Gv3612301235IJERA Editor
 
Gn3611721176
Gn3611721176Gn3611721176
Gn3611721176IJERA Editor
 
Gi3611461154
Gi3611461154Gi3611461154
Gi3611461154IJERA Editor
 
Hb3612621270
Hb3612621270Hb3612621270
Hb3612621270IJERA Editor
 
Gd3611171122
Gd3611171122Gd3611171122
Gd3611171122IJERA Editor
 
Gh3611391145
Gh3611391145Gh3611391145
Gh3611391145IJERA Editor
 
Gc3611111116
Gc3611111116Gc3611111116
Gc3611111116IJERA Editor
 
Cyberbullying o ciberacoso
Cyberbullying o ciberacosoCyberbullying o ciberacoso
Cyberbullying o ciberacosoAzahara Muñoz
 

Andere mochten auch (20)

Bw4201485492
Bw4201485492Bw4201485492
Bw4201485492
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
Be4201384387
Be4201384387Be4201384387
Be4201384387
 
Bh4201396402
Bh4201396402Bh4201396402
Bh4201396402
 
Lq3620002008
Lq3620002008Lq3620002008
Lq3620002008
 
Lu3620212028
Lu3620212028Lu3620212028
Lu3620212028
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041
 
Lj3619451955
Lj3619451955Lj3619451955
Lj3619451955
 
Mu3621742180
Mu3621742180Mu3621742180
Mu3621742180
 
Mg3620962101
Mg3620962101Mg3620962101
Mg3620962101
 
Hy3613901394
Hy3613901394Hy3613901394
Hy3613901394
 
Gq3611971205
Gq3611971205Gq3611971205
Gq3611971205
 
Gv3612301235
Gv3612301235Gv3612301235
Gv3612301235
 
Gn3611721176
Gn3611721176Gn3611721176
Gn3611721176
 
Gi3611461154
Gi3611461154Gi3611461154
Gi3611461154
 
Hb3612621270
Hb3612621270Hb3612621270
Hb3612621270
 
Gd3611171122
Gd3611171122Gd3611171122
Gd3611171122
 
Gh3611391145
Gh3611391145Gh3611391145
Gh3611391145
 
Gc3611111116
Gc3611111116Gc3611111116
Gc3611111116
 
Cyberbullying o ciberacoso
Cyberbullying o ciberacosoCyberbullying o ciberacoso
Cyberbullying o ciberacoso
 

Ähnlich wie Bv4201481484

Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting SystemIRJET Journal
 
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR CodeIRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR CodeIRJET Journal
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146IJRAT
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
 
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCE
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCEMOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCE
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCEIJCSEA Journal
 
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENTENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENTijcsit
 
Enforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-PaymentEnforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-PaymentAIRCC Publishing Corporation
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
E-Payment System on E-Commerce in India
E-Payment System on E-Commerce in IndiaE-Payment System on E-Commerce in India
E-Payment System on E-Commerce in IndiaIJERA Editor
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
Mb2420032007
Mb2420032007Mb2420032007
Mb2420032007IJERA Editor
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of ThingsEswar Publications
 
IRJET- RTO Automation using QR Code
IRJET-  	  RTO Automation using QR CodeIRJET-  	  RTO Automation using QR Code
IRJET- RTO Automation using QR CodeIRJET Journal
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
An Indepth Understanding of e-Procurement: A Case Study Approach
An Indepth Understanding of e-Procurement: A Case Study Approach An Indepth Understanding of e-Procurement: A Case Study Approach
An Indepth Understanding of e-Procurement: A Case Study Approach iosrjce
 

Ähnlich wie Bv4201481484 (20)

Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting System
 
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR CodeIRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
 
E auction php
E auction phpE auction php
E auction php
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...
 
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCE
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCEMOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCE
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCE
 
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENTENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
 
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENTENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
 
Enforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-PaymentEnforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-Payment
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
E-Payment System on E-Commerce in India
E-Payment System on E-Commerce in IndiaE-Payment System on E-Commerce in India
E-Payment System on E-Commerce in India
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
Mb2420032007
Mb2420032007Mb2420032007
Mb2420032007
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of Things
 
IRJET- RTO Automation using QR Code
IRJET-  	  RTO Automation using QR CodeIRJET-  	  RTO Automation using QR Code
IRJET- RTO Automation using QR Code
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
An Indepth Understanding of e-Procurement: A Case Study Approach
An Indepth Understanding of e-Procurement: A Case Study Approach An Indepth Understanding of e-Procurement: A Case Study Approach
An Indepth Understanding of e-Procurement: A Case Study Approach
 
E017652024
E017652024E017652024
E017652024
 

KĂŒrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

KĂŒrzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Bv4201481484

  • 1. Nitish Kumar Singh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.481-484 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Kerberos Based Electronic Tender system NITISH KUMAR SINGH*, SUBNUM BEGUM*, SIBANI PATRA*, PRIYADARSHINI ADYASHA PATTANAIK* *SCHOOL OF COMPUTER ENGINEERING KIIT UNIVERSITY ODISHA, INDIA ABSTRACT An electronic tender (e-tender) system is a system in which selling, buying and providing contract by the government with the help of online software. In this system the tender data is recorded, stored and processed primarily as digital information. In the modern world e-tender system is increasing speedily and the popularity of e-tender system need quality and security. In this paper a ‘KBETS’ is proposed which provides user to participating in tender nevertheless of the geographic locations and without worrying about security. Keywords: KBETS, TGS, AS,Kerberos I. INTRODUCTION Current tender systems which were based on some rules for exchange and these rules were used for providing contract for goods or several other types of services and then selling the item up to the highest price. But this tendering system has several types of issues like large number of resources, higher cost, and different locations for different type of tender. To overcome these issues, in recent years etender system has widely used in many different formats. There are some popular tender algorithms such as English, Dutch, Vickery auctions and Sealedbid used over the internet[1]. The popularity of e-tender system is increasing day by day ,due to this popularity the fraud related activities are also increasing[2]. In this paper, a model KBETS is proposed which uses concept of Kerberos. Users who are interested for e-tendering have to download an application on their mobile, now they are able to participate in etender and they will also be unaware from background processes. The basic purpose of this model of e-tender is to increase security and quality of an e-tender system. II. RELATED WORK: The first Web browser for the Windows and Macintosh platforms was released at the end of year 1993. The auctions were already in use even before the release of this browser with the help of email discussion lists and text-based newsgroups of Internet[3]. According to government records, a total of 52,33 tenders, worth Rs 19,131 crore, have been awarded through this system since it was instituted for the first time in 2008. At present, the PWD, with 1,154 tenders worth Rs 7,243 crore, is the top grosser in the list of departments that have gone the e-tendering www.ijera.com way. The decision to implement the e-tendering system follows an order by the Allahabad high court many years ago. In addition, the World Bank had also said it would not grant a development policy loan to UP unless a transparent e-procurement process was put in place. Following these orders, former chief minister Mayawati had introduced the e-procurement system in January 2008, but the practice was quietly dropped in 2010 without citing any reason. In 2008, as a pilot project, e-procurement was introduced in seven departments, including PWD and family welfare, which was plagued by the National Rural Health Mission scam. Later, it was also extended to four more departments in 2009 but dropped hurriedly in January 2010 because it was "too transparent" for comfort. This happened even though the same ministers had earlier approved the system after hearing of the project's successful implementation in Maharashtra and Karnataka. In May 2012, the SP government allowed e-tendering in the mining department, believed to be one department that is worst affected by rigging[7]. At present, 14 government agencies - PWD, industries, IT and Electronics, irrigation, mining, KGMU,cooperative federation, women's welfare, Jal Nigam, new and renewable energy development agency, health and family welfare, UPPCL, mandiparishad and the centrally-funded Pradhan MantriGrameenSadak Y ojana (PMGSY ) - have adopted the e-tendering and e-procurement model[1].link 10 December 2013 Thiruvananthapuram corporation has invited e-tender for roadworks for the first time since electronic tendering has been introduced in the state. According to a report in the New Indian Express, all tenders under the public works section will now follow the etendering process[8]. e-Tendering will not only reduce corruption but will also make the task of the administration and contractors easier as they could 481 | P a g e
  • 2. Nitish Kumar Singh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.481-484 process the tenders from the comfort of their homes and would not have to deal with bulky physical documents. CHANDIGARH: The Haryana Government has, for the first time, decided to introduce the concept of etendering to ensure more transparent and competitive bidding, Chief Minister Bhupinder Singh Hooda said here on Wednesday. He said the Haryana Public Works (Building and Roads) Department would procure all contracts through e-tenders for the recently sanctioned Pradhan MantriGraminSadakYojana Phase VII projects[9]. Recently it has seen that some websites are also used by thieves for the purpose of issuing false tender or selling stolen things to unsuspecting buyers[5]. paper According to the record of police there were above 8000 crimes which involves fraud or deception, stolen goods on e-Bay in the year of 2009[6].paper III. THE PROPOSED ELECTRONIC TENDER SYSTEM In this section an E-tender system called KBETS is proposed. This system covers three stages: Pre-registration, Post-registration & Retrieving eTender services. These three stages are labelled in later section. These three stages are described one by one. 3.1 Pre-registration stage The customer, who wants to use electronic tender system, sends message to authentication server. The message contains VID card number and Credit card number. The authentication server will receive three things, VID card number, Credit card number & corresponding mobile number, which this message has contained. Authentication server will send user's mobile number to SIM card issuing company. The SIM card issuing company will send user's detail such as user's name, date of birth, address, father's name, e-mail id etc. Now authentication server will also send VID card number to VID card issuing authority. VID card issuing authority will send user's details such as user's name, date of birth, address, father's name, e-mail id etc, corresponding to that mobile number which are common to that send by VID card issuing company. Authentication server will also ask to Credit card issuing authority for credit information by sending the user's credit card number. The credit card issuing authority will send user's credit details such as user's previous profile, available credit corresponding to that credit card number. The authentication server will verify user's details provided by VID and SIM card issuing authority and also verify user's credit card information and will check that user is eligible to participate in e-tender or not. After successful verification, the authentication server will send one session key which is a randomly generated key and www.ijera.com www.ijera.com one TGS key (which is generated with the help of VID and Credit card number) for Ticket granting server (TGS) to users which are encrypted with symmetric key by the authentication server and this symmetric key is already known to TGS. Now user will request for using services of e-auction system with TGS key. TGS will decrypt the TGS key with its own symmetric key and verify that user is authenticated or not. If user is verified then TGS will send one user-id and password with the address of application server to the corresponding user in ACK. There may be a scenario where user can change his/her mobile number in that case user has to send a message to authentication server. This message contains VID card number, Credit card number & old number which user has already registered for eauction. After performing the above procedure, If successful registration is done, then authentication server will send a acknowledgement to user. This will confirm the user about successful updation in his/her mobile number[10]. 3.2 Post-registration stage In this phase user will request for e-tender application from the given application server address by TGS then application server will send an application on his/her mobile phone. After installing successfully, an icon will be displayed. Whenever user wants to use the e-tender services, he/she simply double click on that icon, after clicking on icon an interface will appear. User has to enter his/her user id and password and click on login button. After clicking on login button, an encrypted message will be formed and send to Application server this message contains user's login details, Application server will decrypt the received message and verified it. If it is successfully verified then application server will send an acknowledgement of validation, if it is failed then it will send an acknowledgement according to kind of failure that is occurred in the process of verification. IV. THE PROPOSED E-TENDER ALGORITHM The steps of KBETS model are given below: A. Pre-registration Stage 1) User 𝑈𝑖 sends his/her VID number V𝑖𝑑 and Credit card number in message. 2) AS receives message along with mobile number. 3) AS sends message to SIM card issuing company. 4) AS also sends message to VID card issuing authority. 5) AS also sends message to Credit card issuing authority. 6) AS verifies user validity and has not applied for registration before this. 482 | P a g e
  • 3. Nitish Kumar Singh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.481-484 7) AS will update its database and send ACK which contains session key and TGS key to user 𝑈𝑖. 8) Now user 𝑈𝑖 will send the request 𝑅𝑖 for etender system along with TGS key to TGS. 9) TGS will send the ACK which contains userid and password to the corresponding user. B. Post-registration stage www.ijera.com 1) User 𝑈𝑖 will fill the user-id and password and then click on login button. 2) After pressing on the login button it will generate an encrypted message. 3) Application server will receive and send acknowledgement of confirmation to the corresponding user 𝑈𝑖. Fig 1: Pre-Registration stage V. CONCLUSION Kerberos based e-tender system assures a vision for providing security in the future, this system provides a secure channel which is used for providing communication between different entities. Apart from Kerberos's many strengths, it has some weaknesses and some limitations[11]. In this paper a KBETS model is proposed, which can handle all earlier issues occurred in a traditional tender system, KBETS model provides security from unauthorized happenings like selling of stolen things, occurrences of frauds during buying and selling, security threats by attackers and intruders. Purpose of this model is to enhance the level of security during www.ijera.com an e-tender process so that user can trust the system and user can easily use the e-tender system without any hesitation. This model is secure, easyto understand and transparent and it can also be used with some other technologies. VI. ACKNOWLEDGMENTS This work was supported by KIIT University, Bhubaneswar, Odisha. Our thanks to the experts Prof. G.B Mund, Prof. Manoj Kumar Mishra,Prof. BSP Mishra,Prof. M.N. Das and Our senior Virendra Kumar Yadav, Saumyabhatam for their valuable suggestions during various discussion sessions they had made. 483 | P a g e
  • 4. Nitish Kumar Singh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.481-484 www.ijera.com Fig 2: Post-Registration stage REFERENCES [1] P. Hemantha Kumar, GautamBarua (2001), "Design of a Real-Time Auction System" 4th International Conference on Electronic Commerce Research, Dallas, Texas, USA, November 8-11, 2001. [2] Miriam R. Albert (2008), "E-buyer beware: Why online auction fraud should be regulated", Article first published online: 28 Jun 2008 , American Business Law Journal, Volume 39,Issue 4, June 2002, pp 575644. [3] David Lucking-Reiley (2003) ,"Auctions on the Internet: What’s Being Auctioned, and How?",Article first published online: 27 Mar 2003, The Journal of Industrial Economics, Volume 48, Issue 3, September 2000, pp 227-252. [4] Vakrat, Y., Seidmann, A. (2000), "Implications of the bidders' arrival process on the design of online auctions", Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,2000. [5] San Jose Mercury News (2002-06-11) "Stolen-Property Purchases Leave Ebay Buyers Burned" (http://www.highbeam.com/doc/1G1- 120375160.html). [6] The Sunday Times (2009-04-11) "Ebay: Brisk Bidding in stolen goods". [7] http://articles.timesofindia.indiatimes.com/2013-06-07/lucknow/39813800_1_e-tendering-eprocurement-family-welfare [8] http://egovreach.in/social/content/e-tenders-invited-road-works?whois=&serarr= [9] http://www.thehindu.com/todays-paper/tp-national/tp-otherstates/govt-to-introduceetendering/article1905916.ece [10] Virendra Kumar Yadav, SaumyaBatham, Amit Kumar Mallik,(2012) "Kerberos based Electronic Voting System", ICNICT - Number 2 , IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies, 2012 by IJCA Journal. [11] Steven M. Bellovin, Michael Merritt – AT&T Bell Laboratories, (1991) ,"Limitations of the Kerberos Authentication System". www.ijera.com 484 | P a g e