must be used along with the web server of the
provider and the Web browser of the consumer, and
is been developed as a Web Plug-in.
This paper is divided into five sections. Section 2
highlights the security issues on the web. Section 3
summarizes the e-contracts since its definition and
the relevant aspects for the protocol of authenticity,
which provides legal security in e-contracts. The
proposed protocol is presented in Section 4. Some
final considerations are given in Section 5.
2 SECURITY ISSUES ON THE
WEB
There are different aspects of security issues on the
web, such as physical security, personal security,
operations security, communications security, and
network security. Normally, the systems are
concerned about the application of the protection in
e-anything or e-initiative, or specifically e-business,
taking into account the state of the art technological
infrastructure. The main goal of security for e-
business applications is to protect networks and their
applications against attacks, ensuring information
availability, confidentiality, integrity, auditing,
authorization, and authentication (Huang et al.,
2008) (Meier, 2003). This paper goes beyond to
provide a secure environment. We are here
considering legal security of e-contracts.
A secure environment is ensured by combination
of different factors, such as data security,
networking security, policy, and management of
information system security (ISS) (Akhter & Kaya,
2008). Therefore, we need discuss the basis of the
information transferred during transactions over the
Internet.
The starting point of the information transferred
on Internet is the TCP/IP (Transmission Control
Protocol/Internet Protocol) protocol. This protocol,
in its version 4, has been consolidated for using in
Internet (Comer, 1991). This protocol does not
include security mechanisms for information
transfer, leaving this for the applications which are
developed for the end users, which is the reason for
the concern about the related criteria to the
protection of the content in transit. This means that
the transferred information between two different
places on Internet, regardless of its physical location,
can be captured by a protocol analyser (WireShark,
CommView, Ghost). So the desired information can
be visualised.
The TCP/IP protocol specification has a
conceptual segmentation into five layers, as shown
in Table 1 (Comer, 1991). Each layer solves a set of
problems involving the transmission of data, and
provides a well-defined service to the upper layer
protocols based on using services from some lower
layers. Upper layers are logically closer to the user
and deal with more abstract data, relying on lower
layer protocols to translate data into forms that can
be physically transmitted. Layer 5, nominated as
application layer, specifies and implements the
software which interact with the end users. It is at
this level that all concerns related to the information
security should be implemented, in other words, the
applications at the user level must include treatment
mechanisms that are considered secure enough to,
on one hand, give the end user the assurance that his
network transaction is secure, free of risks of content
modifications, and on the other hand, provide
verified technical conditions of mechanisms
considered secure, such as the use of cryptography
algorithms at the applications level (Schneier, 1996).
Table 1: The 5-Layer TCP/IP Model.
La
er Protocol
5
Application HTTP, DNS, SMTP,...
4
Transpor
TCP, UDP, DCCP...
3
etwor
IP, IGMP, ICMP...
2
Data Ethernet, Wi-Fi,
802.11(WLAN)...
1
Physical Modem, PLC, optical fiber...
Traffic on the Internet is a client-server software
application, which is executed through a direct user
interface, known as the web browser. In this
environment, several applications are written in the
application layer protocol of the TCP/IP known as
http (hypertext transfer protocol) (Garfinkel, 1997).
Since there are no mechanisms defined in the
TCP/IP protocol itself, the application is responsible
to define and implement additional security
algorithms; minimizing the impact of the
vulnerabilities that exist on the internet protocol.
Thus, the security issues on the Web are divided into
three categories (Garfinkel, 1997):
• Security of the Web server, the server's
activities, and stored data: guarantee that
the information was not modified or
distributed without user authorization;
• Data security in the computers network:
guarantee that the transmission of
information between the server and the
Web browser has a security level based
on well-known standards, such as
cryptography or digital signature (Meier,
2003). Cryptography refers to how your
application enforces confidentiality and
integrity. Digital signature corresponds a
PROTOCOL OF AUTHENTICITY TO PROVIDE LEGAL SECURITY IN E-CONTRACTS - A Prototype
379