Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Thejasree R, Thyagaraja Murthy A
DOI Link: https://doi.org/10.22214/ijraset.2022.46557
Certificate: View Certificate
Global container shipping is the phenomenon of packing goods into containers and transporting them across country borders. A global container shipping trip often involves multiple carriers, third party logistics firms, and fourth party logistics firms. Based on previously agreed-upon contract pricing with the shippers, these businesses bill base service costs, unexpected service fees, and value-added service fees through freight invoices. This study introduces an AWS-based system for creating electronic invoices for carriers of goods when one or more carriers are involved in the shipment of products from a shipper\'s origin location to a destination location outside of the country of origin. Real-time shipment tracking data and previously agreed-upon service contract pricing between the shipper and the carrier are largely used in the preparation of an invoice for a carrier. Our solution improves the effectiveness of the e-invoicing process and reduces expenses for the shippers and carriers involved in international trade. The\' main reasons for adopting AWS-based e-invoicing solutions are to decrease the frequency of invoice disputes, speed up dispute settlement, and offer real-time audits.
I. INTRODUCTION
Import and export of goods and services between the countries is known as Global trade. This trade includes three mode of transportation i.e land, air and sea. About 50 percent of the annual capital is contributed by shipping goods through sea. But the complexity increases when there is multiple enroute between various parties involved in movement of these goods. Overall maintaining complete transparency in shipping service becomes increasingly difficult. For this reason, carriers and shipper will attempt to gather as many details as they can for the purpose of generating invoices, settling payments and handling disputes. Eventually, as each party accumulates data according to their priorities, the invoice settlement and multi-party planning will be undermined by mistrust of information. In an effort to solve the trust and transparency issues among parties, we are is implementing innovative solutions based on Amazon Web Services. This paper proposes an AWS-based e-invoicing solution that allows participants in the supply chain network to manage contracts, generate invoices, and handle disputes. A major benefit of e-invoicing is that it helps balance data and ensures precision during manual data entry. E-invoicing provides real-time tracking of invoices, and all details of transactions between companies will be accessible online. This would eliminate the need for frequent audits and surveys. And also these invoice are encrypted using AES rijndael and and the key used for AES encryption is secured using Shamir’s secret sharing algorithm and is stored in AWS S3 services. AWS Simple Storage Service (Amazon S3) provides scalability, data availability, security, and performance that are unmatched in the industry. Data can be stored and retrieved from anywhere, anytime, with Amazon S3 service.
II. LITERATURE SURVEY
D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud in their paper [1] presents a performance evaluation of symmetric encryption techniques that have been chosen. The chosen algorithms were Blowfish, RC2, DES, RC6, AES, and 3DES. They came to the conclusion that Blowfish performed better than the others when the packet size was changed. Further, it was found that moving from text to another type of data, like an image, took longer with RC2, RC6, and Blowfish than with other methods. Moreover, it was discovered that 3DES still performs poorly when compared to algorithm DES.
Srinivasarao D, Sushma Rani N, Ch.Panchamukesh and S.Neelima in their paper [2] have analysed the superlative symmetric cryptographic encryption algorithm. DES, 3DES, Rinjdal, Blowfish, RC2, and RC6 are the chosen algorithms. Following Blowfish as the best practise to prevent data misuse, followed by AES and RC6. Blowfish has the best application where the code is unbreakable. The Blowfish performs best when encryption and decryption times are changed repeatedly. And finally, when it comes to data files, we discovered that Blowfish once more performs well when compared to other algorithms, with 3DES and Rinjdal coming in second and third.
\item Akhil K.M, Praveen Kumar M and Pushpa B.R in their paper [3] has proposed AES based secure model for cloud data security. As AES encryption is employed for data transfer, it eliminates the potential that the system will occasionally become unavailable due to the arrival of large amounts of data. Since denial of access to the third party is done, possibility of intruders to mask as the third party and intrude into the network is avoided. Thus, the suggested solution offers cloud user data an effective AES-based encryption technique.
\item M. A. Al-Shabi in his paper [4] comparison between Symmetric and Asymmetric algorithms shows that Symmetric algorithms are faster than their Asymmetric counterparts.
The most dependable algorithm in terms of speed encryption, decoding, the length of the key, structure, and usability is AES, according to past studies and comparison results.
\item Yoshita Sharma, Himanshu Gupta and Sunil Kumar Khatri in their paper [5] analysed the popular secret key algorithms including DES, 3DES, AES (Rijndael), Blowfish, were implemented, and by encrypting input files with different contents and sizes, their performance was compared.
The results, which showed that the Blowfish method is the fastest, were finally presented.
\item Karthik .S and Muruganandam .A in their paper [6] presented simulation results showed that 3DES has a better performance result with ECB and CBC than other common encryption algorithms used. They have also included a performance assessment of some symmetric encryption methods in this work. The chosen algorithms are RC2, RC4, Blowfish, DES, DES3, and AES. When the key size is changed, it is evident that the battery and time consumption alter significantly.
\item Shanta and Jyoti Vashishtha in their paper [7] presents a performance evaluation of AES and DES symmetric encryption algorithms. speed, duration, and cost performance characteristics. Better results are produced by using the AES encryption/decryption algorithm in C# in Microsoft Visual Studio. The performance of the chosen AES/DES algorithms in C++ when running in VC++ does not deliver the best results in terms of the necessary keys, such as speed, time, and cost. It was discovered that the AES/DES algorithms in C++ were slower than other algorithms. Finally, the AES/DES algorithms written in C# and executed through Microsoft Visual Studio produce the best results in terms of performance, time, and cost.
\item Abha Sachdev and Mohit Bhansali in their paper [8] presented that each of the cloud providers has their own set of rules, pricing, flexibility, support and other important parameters. The encryption strategy used to secure data by rendering it unreadable to everyone is the main issue covered in this proposal. When compared to alternative algorithms, using AES for data security offers advantages of lower memory usage and faster calculation.
\item Vishal R. Pancholi and Dr. Bhadresh P. Patel in their paper [9] concluded AES encryption is the fastest method that has the flexibility and scalability and it is easily implemented.
The AES algorithm, on the other hand, uses less memory than the Blowfish algorithm. Because it uses a 128, 192, or 256-bit key, the AES algorithm has a very high security level. It demonstrates how to increase cloud computing security with secure data storage by applying defences against multiple types of attacks, including differential, square, and key assaults as well as key recovery and square attacks. As a result, the AES algorithm is a very secure encryption technique. While other symmetric algorithms have certain flaws and variances in performance and storage space, AES encryption algorithm offers minimal storage space requirements, great performance, and no vulnerabilities or restrictions.
\item Prof. S. Delfin, Rachana Sai. B, Meghana J.V, Kundana Lakshmi. Y and Sushmita Sharma in their paper [10] revealed how For the next generation of IT applications, cloud computing is a promising and developing technology, and cryptography is one of the most significant and critical skills to protect data from hackers by applying the crucial procedures of encryption and decryption. The swift solution that is adaptable and simple to use is AES encryption. While other symmetric methods have various constraints and differ in terms of storage space and performance, the AES encryption algorithm offers good performance and requires very little storage space. In comparison to alternative methods, the use of the Advanced Encryption Standard for data security offers advantages of faster calculation and less memory usage.
\item Krishnasuri Narayanam, Seep Goel, Abhishek Singh, Yedendra Shrinivasan, Shreya Chakraborty, Parameswaran Selvam, Vishnu Choudhary and Mudit Verma in their paper [11] have spoken about the necessity for blockchain-based invoicing that speeds up the resolution of disputes between shippers and carriers in international trade and enables effective invoice settlement. Additionally, they gave information about a blockchain-based system providing trusted invoice generation and open dispute resolution, as well as a description of the blockchain invoicing strategy. The system suggested in this study uses a cloud microservices architecture and Hyperledger Fabric as the underlying blockchain platform. The findings demonstrate that it is feasible to implement invoicing systems in settings with actual clients.
III. PROPOSED SYSTEM
The Proposed System is an AWS based E-invoice application, where the invoice generated is encrypted using AES rijndeal algorithm and the key used for AES encryption are secured using Shamir’s secret key sharing algorithm. The main objective of this thesis is to design a web application solution for invoice and operation and also in shipment operations which can be accessible anytime, with high handling capacity, easy to use, better time saving capability, reduce operational and service expense, providing tamper proof data.. System uses tools such as “Visual Studio” and “SQL Server” to develop application.
A. Block diagram
In proposed system shown in Figure 1, first the Manufacturer will register with their details such as company name, mail ID, phone number and address, Once registration is done the Manufacturer will login with their credentials and will add the raw materials and the Supplier(s) of their choice and will send the login credentials from the registered E-mail address. The Supplier will login with the credentials and will map the raw materials and later can edit if required. The supplier has to add the service provider once the the raw materials are mapped. The Service provider should login with the credentials sent from the registered email of the Supplier. Once the order has been confirmed by the Manufacturer, the supplier has to approve the order and map the Service provider to whom he wished to give the delivery. When the order has been approved the Invoice generated are stored in AWS S3 service which are encrypted using AES and the key used for encryption are secured using Shamir’s algorithm. The Service provider will update the delivery status that can be viewed by the Manufacturer. Once all the service is done the Manufacturer will be able to download the e-invoice and rate the overall experience that can be viewed by the Service provider.
B. Module Designs
2. Supplier Module Design: In this module the supplier will login based on the credentials sent by the manufacturer. Supplier can map the price of the ordered raw materials and later can view and also update the mapped raw materials. ID and password is sent from the registered email of the supplier to the service provider. And when the raw materials are added by the Manufacturer, the Supplier will add the Service provider of their choice. And finally when the order is placed and then approved by the Supplier, the Supplier will map the Service provider to whom he wish to give the service. And then the e-invoice is generated. And the e-invoice generated is encrypted using AES rijndael and the key used for encryption are secured using Shamir’s algorithm and stored in AWS S3 service. The module diagram is depicted in figure 3. And all these information will stored in Sql server.
3. Service Provider Module Design: In this module the Service provider will login using the ID and password sent by the Supplier from their registered email address. And Service provider can view the service allocation and the delivery feedback posted by the company. All the information will be stored in the database. The service provider can also view the ratings given by the Company and the supplier. The module diagram is depicted in figure 4. All the information will be stored in Sql server.
C. Algorithm Implementation
a. AES Encryption: The symmetric encryption technique that is most likely to be used nowadays is the Advanced Encryption Standard (AES). The AES encryption is depicted in figure 5
We discussed the need for an AWS-based electronic invoicing system in this article. This system would speed up invoice settlement and shorten the time it takes to settle disputes between shippers and carriers in international trade. We offered information on an AWS-based system that supports trusted invoice generation and open dispute resolution as well as our AES encrypted invoicing strategy. This article explains a series of models that serve as representations of the overall shipping processes, including Manufacturer, Supplier, and Service Provider. Contrary to traditional or self-billing invoicing processes, where invoices are often reconciled after payment settlement, the reconciliation process is carried out on the invoices before settlement of the payment. We implemented the system suggested in this work utilising the AES Rijndael algorithm, with Shamir\'s secure key sharing technique serving as the foundational AWS platform and S3 service. We have demonstrated that the programme offers security since the generated electronic invoices are encrypted with the AES and Shamir algorithms and because it eliminates the need for human invoice entry. Future enhancement may include implementing the intent level authorization and intent level privacy and also improving the conversational data encryption, also provide multi-factor authentication.
[1] D. S. Abdul. Elminaam, H. M. Abdul Kader, and M. M. Hadhoud. “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA Volume 8, 2009 ISSN: 1943-7765 [2] Srinivasarao D,Sushma Rani N, Ch.Panchamukesh and S.Neelima, “ Analyzing The Superlative Symmetric Cryptographic Encryption Algorithm ( ASCEA)”, Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science [3] Akhil K.M, Praveen Kumar M and Pushpa B.R , “Enhanced Cloud Data Security Using AES Algorithm”, 2017 International Conference on Intelligent Computing and Control (I2C2) [4] M. A. Al-Shabi, “ A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security”, International Journal of Scientific and Research Publications, Volume 9, Issue 3, March 2019,ISSN 2250-3153 [5] Yoshita Sharma, Himanshu Gupta and Sunil Kumar Khatri3, ”A Security Model for the Enhancement of Data Privacy in Cloud Computing ”, ISSN 978-1-5386-9346 September 2019 IEEE [6] Karthik .S and Muruganandam .A, ”Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System” ,International Journal of Scientific Engineering and Research (IJSER),ISSN (Online): 2347-3878, Volume 2 Issue 11, November 2014 [7] Shanta and Jyoti Vashishtha, ”Evaluating the performance of Symmetric Key Algorithms: AES (Advanced Encryption Standard) and DES (Data Encryption Standard)”, IJCEM International Journal of Computational Engineering Management, Vol. 15 Issue 4, July 2012 ISSN (Online): 2230-7893 [8] Abha Sachdev and Mohit Bhansali, ”Enhancing Cloud Computing Security using AES Algorithm”, International Journal of Computer Applications (0975 – 8887), Volume 67– No.9, April 2013 [9] Vishal R. Pancholi and Dr. Bhadresh P. Patel, ”Enhancement of Cloud Computing Security with Secure Data Storage using AES”, IJIRST–International Journal for Innovative Research in Science Technology, Volume 2, Issue 09, February 2016, ISSN (online): 2349-6010 [10] Prof. S. Delfin, Rachana Sai. B, Meghana J.V, Kundana Lakshmi. Y and Sushmita Sharma, ”Cloud Data Security Using AES Algorithm”, International Research Journal of Engineering and Technology (IRJET), e-ISSN: 2395-0056, Volume: 05, Issue: 10, Oct 2018 [11] Krishnasuri Narayanam, Seep Goel, Abhishek Singh, Yedendra Shrinivasan, Shreya Chakraborty, Parameswaran Selvam, Vishnu Choudhary and Mudit Verma, ”Blockchain Based e-Invoicing Platform for Global Trade”, 2020 IEEE International Conference on Blockchain (Blockchain).
Copyright © 2022 Thejasree R, Thyagaraja Murthy A. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET46557
Publish Date : 2022-08-31
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here