2018
DOI: 10.1002/dac.3857
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient protection for HTTP cookies with self‐verification

Abstract: Hypertext transfer protocol (HTTP) cookies are used to store user-related information sent by a website, and they can be read again later to maintain a link between a user's computer and the website and to remember the user's previous state on the website. In cloud services, cookies are used by service providers to maintain smooth operation for users. As cookies are sent in a public networking environment and saved on users' browsers, two problems are encountered when using cookies: (a) how to protect sensitiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Moreover, the application of behavioral targeting (Beales, 2010) requires the need for cookies that are susceptible to cloning or misappropriation by a malicious party. A cookies-based approach and weblog records for tracking shoppers online activities might compromise consumers' privacy (Lee et al, 2019). The many security threats are now so prevalent that by 2021 the costs of cybercrimes are expected to reach $6 trillion annually (Empius marketing, 2019).…”
Section: Enhancing Privacy Protectionmentioning
confidence: 99%
“…Moreover, the application of behavioral targeting (Beales, 2010) requires the need for cookies that are susceptible to cloning or misappropriation by a malicious party. A cookies-based approach and weblog records for tracking shoppers online activities might compromise consumers' privacy (Lee et al, 2019). The many security threats are now so prevalent that by 2021 the costs of cybercrimes are expected to reach $6 trillion annually (Empius marketing, 2019).…”
Section: Enhancing Privacy Protectionmentioning
confidence: 99%
“…A wide array of techniques are available to the attacker for faking an application session that mainly include but not limited to session fixation [47], cookie theft [48] and token forgery [47]. A stolen cookie [49] can be used to set up a malicious session, although the attacker does not possess any information about the authentication information. The duration for which a session remains active needs to be optimized.…”
Section: B Cookies and Tokensmentioning
confidence: 99%
“…By using an encrypted key as proposed by the author, we can provide a scalable and efficient solution for the problem. Wei-Bin Lee et al [5] used a self-verification mechanism to propose an efficient, secure, and practical system of cookies. Cookie verification, simple key management, symmetric encryption and no sensitive verification table on the server are the features of the self-verification mechanism adopted by the author.…”
Section: Literature Reviewmentioning
confidence: 99%