Web-Based E-Business Application with Customer Data Encryption Feature to Protect Privacy at CV Jasa Karya Rizki

Authors

  • Lola Kamal Siregar State Islamic University of North Sumatra
  • Ali Ikhwan State Islamic University of North Sumatra

DOI:

https://doi.org/10.30865/ijics.v9i2.8999

Keywords:

E-Business, Data Encryption, Des Algorithm

Abstract

This research presents the development of a web-based e-business application integrated with a data encryption feature using the Data Encryption Standard (DES) algorithm to protect customer privacy. The system is designed for CV Jasa Karya Rizki to manage customer and transaction data securely. DES encryption is implemented manually using PHP without relying on external libraries. The encryption process is applied during data input to ensure that only ciphertext is stored in the database. When data needs to be accessed, decryption is performed on-the-fly, allowing authorized users to view the original information securely. The application consists of core modules for managing customer data, transactions, products, and reports. Encryption and decryption functions are encapsulated within the system's main classes, enhancing maintainability and modularity. Testing results show that the DES implementation functions correctly, providing a secure data management workflow without negatively impacting system performance. This research demonstrates that classic encryption algorithms like DES can still be effectively applied in small-scale business environments to enhance data security and customer trust.

References

E. Lulaj, “a Sustainable Business Profit Through Customers and Its Impacts on Three Key Business Domains: Technology, Innovation, and Service (Tis),” Business, Manag. Econ. Eng., vol. 21, no. 1, pp. 19–47, 2023.

W. Setyowati, R. Widayanti, and D. Supriyanti, “Implementation of E-Business Information System in Indonesia?: Prospects and Challenges,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2, pp. 180–188, 2021.

S. K. Krishnakumar, R. Kishore, and N. C. Suresh, “Expansive or focused attention? An exploration–exploitation perspective on e-Business systems and firm performance,” Prod. Oper. Manag., vol. 31, no. 5, pp. 2038–2066, 2022.

M. Krasnyuk, Y. Kulynych, V. Tuhaienko, and S. Krasniuk, “E-Business and E-Commerce Technologies As an Important Factor for Economic Efficiency and Stability in the Modern Conditions of the Digital Economy (on the Example of Oil and Gas Company),” in Grail of Science, 2022, no. 17, pp. 69–81.

C. Liao, “Do E-Business Services Enhance Bank Efficiency in Taiwan?,” Int. J. Inf. Syst. Serv. Sect., vol. 14, no. 1, pp. 1–17, 2022.

M. R. S. Mohan Reddy Sareddy, “Cloud-Based Customer Relationship Management: Driving Business Success in the E-Business Environment,” Int. J. HRM Organ. Behav., vol. 15, no. 2, pp. 1–16, 2023.

Nduji Romanus, Marcus Garvey Orji, Oyenuga Michael Oyedele, and Oriaku Chris, “Assessing E-business and Organizational Performance in Nigeria Today: Evidence from Jumia Ltd, Lagos,” Britain Int. Humanit. Soc. Sci. J., vol. 5, no. 2, pp. 81–92, 2023.

A. S. Edu, D. Agozie, and M. Agoyi, “Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis,” PeerJ Comput. Sci., vol. 7, pp. 1–26, 2021.

P. Sharma and H. Gupta, “Emerging Cyber Security Threats and Security Applications in Digital Era,” in 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2024, 2024, pp. 1–6.

C. Asba? and ?. Tuzlukaya, “Cyberattack and cyberwarfare strategies for businesses,” in Conflict Management in Digital Business: New Strategy and Approach, Emerald Publishing Limited, 2022, pp. 303–328.

K. Bhakhri, M. Sethi, I. Sharma, and K. Kaushik, “Examining the Consequences of Cyberattacks on Businesses and Organizations,” in Lecture Notes in Networks and Systems, 2024, vol. 972, pp. 227–239.

H. Taherdoost, “E-Business Security and Control,” in EAI/Springer Innovations in Communication and Computing, vol. Part F1354, Springer, 2023, pp. 105–135.

P. Matta, M. Arora, and D. Sharma, “A comparative survey on data encryption Techniques: Big data perspective,” Mater. Today Proc., vol. 46, pp. 11035–11039, 2021.

Omolara Patricia Olaiya, Temitayo Oluwadamilola Adesoga, Azeez Adekunle Adebayo, Fehintola Moyosore Sotomi, Oluwaseun Aaron Adigun, and Paschal M Ezeliora, “Encryption techniques for financial data security in fintech applications,” Int. J. Sci. Res. Arch., vol. 12, no. 1, pp. 2942–2949, 2024.

T. S. Alasi and M. Halim, “Pengujian Algoritma Kriptografi Rijndael Untuk Keamanan Audio Menggunakan Visual Basic .Net,” J. Informatics Log., vol. 1, no. 1, pp. 8–17, 2024.

N. P. Hemanth Kumar and S. Prabhudeva, “Layers Based Optimal Privacy Preservation of the On-premise Data Supported by the Dual Authentication and Lightweight on Fly Encryption in Cloud Ecosystem,” Wirel. Pers. Commun., vol. 121, no. 3, pp. 1489–1508, 2021.

H. Dubey, S. Kumar, and A. Chhabra, “Cyber security model to secure data transmission using cloud cryptography,” Cyber Secur. Insights Mag., vol. 2, pp. 9–12, 2022.

A. Georgiadou, S. Mouzakitis, K. Bounas, and D. Askounis, “A Cyber-Security Culture Framework for Assessing Organization Readiness,” J. Comput. Inf. Syst., vol. 62, no. 3, pp. 452–462, 2022.

T. S. Alasi, “Algoritma Hill Cipher Untuk Kebenaran Informasi pada Gambar dalam Media Sosial,” J. Inf. Komput. Log., vol. 2, no. 2, 2021.

T. S. Alasi, Ilmu Komputer, 1st ed. Deli Serdang, 2024.

Z. Yuan and C. Lin, “Research on Strong Constraint Self-training Algorithm and Applied to Remote Sensing Image Classification,” in Proceedings of 2021 IEEE International Conference on Power Electronics, Computer Applications, ICPECA 2021, 2021, pp. 981–985.

Downloads

Published

2025-07-31

How to Cite

Siregar, L. K., & Ikhwan, A. (2025). Web-Based E-Business Application with Customer Data Encryption Feature to Protect Privacy at CV Jasa Karya Rizki . The IJICS (International Journal of Informatics and Computer Science), 9(2), 121–127. https://doi.org/10.30865/ijics.v9i2.8999

Issue

Section

Articles