Reference Hub15
Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology

Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology

Sekar S., Annamalai Solayappan, Srimathi J., S. Raja, Durga S., Poongodi Manoharan, Mounir Hamdi, Godwin Brown Tunze
Copyright: © 2022 |Volume: 17 |Issue: 1 |Pages: 14
ISSN: 1554-1045|EISSN: 1554-1053|EISBN13: 9781799894001|DOI: 10.4018/IJITWE.304047
Cite Article Cite Article

MLA

Sekar S., et al. "Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology." IJITWE vol.17, no.1 2022: pp.1-14. http://doi.org/10.4018/IJITWE.304047

APA

Sekar S., Solayappan, A., Srimathi J., Raja, S., Durga S., Manoharan, P., Hamdi, M., & Tunze, G. B. (2022). Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology. International Journal of Information Technology and Web Engineering (IJITWE), 17(1), 1-14. http://doi.org/10.4018/IJITWE.304047

Chicago

Sekar S., et al. "Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology," International Journal of Information Technology and Web Engineering (IJITWE) 17, no.1: 1-14. http://doi.org/10.4018/IJITWE.304047

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A blockchain is an advanced technology that can power over a decentralized network. The authors bring it up to design the autonomous transaction system for e-commerce applications; because of the dramatic increase in IoT devices, communication between physical things is enabled. This brings more efficiency and accuracy, which benefits the outsiders while human interaction reduces. There is a big challenge in data storage after payment in the e-commerce application. Blockchain presents an appropriate platform for the distributed data storage; it also protects the data from outsiders. The authors create blocks that check and record each transaction that took place in the e-commerce application. Blockchain is going to protect the user's privacy from outsiders/banks that are being violated. The authors deliver this research in this paper in terms of the method with detailed design and full implementation. The system captures the user data, processes it, and gives a visual representation of the processed data.