Abstract
This research paper is intended to study and implement the development of a PHP-based system of an online collectable items marketplace which can onboard multiple users and sellers while keeping a singular admin account. The research intensely focuses on adapting modern techniques of the software development lifecycle (SDLC), Pattern matching algorithms to optimize search times, secure multilayer encryption techniques for login and purchase modules, overall security from XSS attacks in the input fields while documenting the work and meanwhile proposing a system with a rich feature set to satisfy user requirements. The development cycle one has been intensely studied with usability testing and a tabular representation of the results. Furthermore, the analysis of these results has been captured graphically and conclusively a complete Web application is developed compliant to the essential benchmarks of today’s time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Waykar, Y (2013) A study of importance of UML diagrams: with special reference to very large-sized projects
Balaji S, Sundararajan Murugaiyan M (2012) Wateerfallvss V-model vs agile: a comparative study on SDLC
Eessaar E (2016) The database normalization theory and the theory of normalized systems: finding a common ground. Baltic J Mod Comput 4:5–33
Bansal, H, Khan R (2018) A review paper on human computer interaction. Int J Adv Res Computer Sci Software Eng 8(53). https://doi.org/10.23956/ijarcsse.v8i4.630
Maurel H, Vidal S, Rezk T (2021) Statically Identifying XSS using deep learning. In: SECRYPT 2021—18th International conference on security and cryptography, Virtual, France, July 2021
Khazal IF, Hussain MA (2021) Server side method to detect and prevent stored XSS attack
Li C, Wang Y, Miao C, Huang C (2020) Cross-site scripting guardian: a static XSS detector based on data stream input-output association mining
Ankush SD (2014) XSS attack prevention using DOM based filtering API
Gupta S, Gupta BB (2016) Automated discovery of JavaScript code injection attacks in PHP web applications
Malviya VK, Saurav S, Gupta A (2013) On Security Issues in Web Applications through cross site scripting (XSS). In: 2013 20th Asia-Pacific software engineering conference (APSEC), pp 583–588. https://doi.org/10.1109/APSEC.2013.85
Diwate R (2013) Study of different algorithms for pattern matching
Janani R, Vijayarani S (2019) Information retrieval from web documents using pattern matching algorithms
Aldaej R, Alfowzan L, Alhashem R, Alsmadi MK, Al-Marashdeh I, Badawi UA, Alshabanah M, Alrajhi D, Tayfour M (2018) Analyzing, designing and implementing a web-based auction online system
Erna P, Herdi A, Enjun J, Venkata Harsha N (2020) An architecture of E-marketplace platform for agribusiness in Indonesia. MSCEIS, EAI. https://doi.org/10.4108/eai.12-10-2019.2296542
Kuhmonen S (2017) One-time password implementation for two-factor authentication
School of Mathematics and Information Technology, Nanjing Xiaozhuang College, Nanjing, China
Sinha S (2020) Secure login system for online transaction using two layer authentication protocol
Kumar B, Yadav S (2016) Storageless credentials and secure login. In: ACM International conference proceeding series, 04–05-Mar 2016. https://doi.org/10.1145/2905055.2905113
Guljari E, Lokhande S, Mande S, Reddy L, Uma Maheswari K (2016) Authentication of users by typing pattern: a review
Devi R, Venkatesan R, Koteeswaran R (2016) A study on SQL injection techniques. Int J Pharm Technol 8:22405–22415
Singh JP (2016) Analysis of SQL injection detection techniques
Som S, Sinha S, Kataria R (2016) Study on SQL injection attacks: mode, detection and prevention
Alwan Z, Younis M (2017) Detection and prevention of SQL injection attack: a survey. Int J Comput Sci Mob Comput 68:5–17
Oluwakemi A, Abdullahi A, Haruna D, Oluwatobi A, Kayode A (2020) A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm. EURASIP J Inform Securi. https://doi.org/10.1186/s13635-020-00113-y
Rawat R, Shrivastav S (2012) SQL injection attack detection using SVM. Int J Comput Appl 42:1–4. https://doi.org/10.5120/5749-7043
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khulbe, S., Gumber, D., Pratap Singh, S. (2024). Development of an Online Collectable Items Marketplace Using Modern Practices of SDLC and Web Technologies. In: Tiwari, S., Trivedi, M.C., Kolhe, M.L., Singh, B.K. (eds) Advances in Data and Information Sciences. ICDIS 2023. Lecture Notes in Networks and Systems, vol 796. Springer, Singapore. https://doi.org/10.1007/978-981-99-6906-7_6
Download citation
DOI: https://doi.org/10.1007/978-981-99-6906-7_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-6905-0
Online ISBN: 978-981-99-6906-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)