Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History

Author:

Bucko Ahmet1ORCID,Vishi Kamer2ORCID,Krasniqi Bujar1ORCID,Rexha Blerim1ORCID

Affiliation:

1. Faculty of Electrical and Computer Engineering, University of Prishtina, 10000 Prishtina, Kosovo

2. Department of Informatics, University of Oslo, Gaustadalléen 23B, 0373 Oslo, Norway

Abstract

The rapid growth of the web has transformed our daily lives and the need for secure user authentication and authorization has become a crucial aspect of web-based services. JSON Web Tokens (JWT), based on RFC 7519, are widely used as a standard for user authentication and authorization. However, these tokens do not store information about the user’s behavior history. To address this issue, this paper presents a solution to enhance the trustworthiness of user authentication in web applications based on their behavior history. The solution considers factors such as the number of password attempts, IP address consistency, and user agent type and assigns a weight or percentage to each. These weights are summed up and stored in the user’s account, and updated after each transaction. The proposed approach was implemented using the .NET framework, C# programming language, and PostgreSQL database. The results show that the proposed solution effectively increases the level of trust in user authentication. The paper concludes by highlighting the strengths and limitations of the proposed solution.

Funder

Ministry of Education, Science, Technology and Innovation, Government of Kosovo

Publisher

MDPI AG

Subject

Computer Networks and Communications,Human-Computer Interaction

Reference35 articles.

1. An empirical study of authentication methods to secure e-learning system activities against impersonation fraud;Beaudin;Online J. Appl. Knowl. Manag.,2016

2. The Details of Conceptual Modelling Notations are Important—A Comparison of Relationship Normative Language;Hitchman;Commun. Assoc. Inf. Syst.,2002

3. Imageware (2023, January 16). Identification, Authentication, Authorization—What’s the Difference. Available online: https://imageware.io/identification-authentication-authorization-difference/.

4. Implementing data security in student lifecycle management system at the University of Prishtina;Rexha;Trans. Inf. Sci. Appl.,2010

5. Alangot, B., Szalachowski, P., Dinh, T.T.A., Meftah, S., Gana, J.I., Aung, K.M.M., and Li, Z. (2023). Decentralized Identity Authentication with Auditability and Privacy. Algorithms, 16.

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Securing Blockchain-Based Supply Chain Management: Textual Data Encryption and Access Control;Technologies;2024-07-09

2. Hybrid Architectures Used in the Protection of Large Healthcare Records Based on Cloud and Blockchain Integration: A Review;Computers;2024-06-12

3. Improving the Security and Reliability of SDN Controller REST APIs Using JSON Web Token (JWT) with OpenID and auth2.0;2024 IEEE 4th International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA);2024-05-19

4. DECODE: A New Cloud-Based Framework for Advanced Visualization, Simulation, and Optimization Treatment of Peripheral Artery Disease;2023 IEEE 23rd International Conference on Bioinformatics and Bioengineering (BIBE);2023-12-04

5. Cloud Computing-Based API Design and Implementation for Hening Mobile Application;2023 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT);2023-11-23

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3