Affiliation:
1. Faculty of Electrical and Computer Engineering, University of Prishtina, 10000 Prishtina, Kosovo
2. Department of Informatics, University of Oslo, Gaustadalléen 23B, 0373 Oslo, Norway
Abstract
The rapid growth of the web has transformed our daily lives and the need for secure user authentication and authorization has become a crucial aspect of web-based services. JSON Web Tokens (JWT), based on RFC 7519, are widely used as a standard for user authentication and authorization. However, these tokens do not store information about the user’s behavior history. To address this issue, this paper presents a solution to enhance the trustworthiness of user authentication in web applications based on their behavior history. The solution considers factors such as the number of password attempts, IP address consistency, and user agent type and assigns a weight or percentage to each. These weights are summed up and stored in the user’s account, and updated after each transaction. The proposed approach was implemented using the .NET framework, C# programming language, and PostgreSQL database. The results show that the proposed solution effectively increases the level of trust in user authentication. The paper concludes by highlighting the strengths and limitations of the proposed solution.
Funder
Ministry of Education, Science, Technology and Innovation, Government of Kosovo
Subject
Computer Networks and Communications,Human-Computer Interaction
Reference35 articles.
1. An empirical study of authentication methods to secure e-learning system activities against impersonation fraud;Beaudin;Online J. Appl. Knowl. Manag.,2016
2. The Details of Conceptual Modelling Notations are Important—A Comparison of Relationship Normative Language;Hitchman;Commun. Assoc. Inf. Syst.,2002
3. Imageware (2023, January 16). Identification, Authentication, Authorization—What’s the Difference. Available online: https://imageware.io/identification-authentication-authorization-difference/.
4. Implementing data security in student lifecycle management system at the University of Prishtina;Rexha;Trans. Inf. Sci. Appl.,2010
5. Alangot, B., Szalachowski, P., Dinh, T.T.A., Meftah, S., Gana, J.I., Aung, K.M.M., and Li, Z. (2023). Decentralized Identity Authentication with Auditability and Privacy. Algorithms, 16.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献