Secure and efficient protection for HTTP cookies with self-verification

被引:4
|
作者
Lee, Wei-Bin [1 ]
Chen, Hsing-Bai [1 ]
Chang, Shun-Shyan [1 ]
Chen, Tzung-Her [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
[2] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
关键词
confidentiality; digital signature; integrity; secure cookie; self-verification; AUTHENTICATION; DESIGN;
D O I
10.1002/dac.3857
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hypertext transfer protocol (HTTP) cookies are used to store user-related information sent by a website, and they can be read again later to maintain a link between a user's computer and the website and to remember the user's previous state on the website. In cloud services, cookies are used by service providers to maintain smooth operation for users. As cookies are sent in a public networking environment and saved on users' browsers, two problems are encountered when using cookies: (a) how to protect sensitive information on a cookie from disclosure and (b) how to determine whether cookies have been modified maliciously. Several studies have been conducted on web security to assess problems that occur when cookies are injected and hijacked. In the present study, a secure and efficient cookie protection scheme is proposed. The scheme is designed with the following principles: (a) a key is hidden within a cookie, (b) the integrity of the cookie is verified by both the web server and the web browser, and (c) the key and sensitive information in the cookie can only be read by the website. The proposed method was analyzed for its security and efficiency. Moreover, the methods from related studies and the proposed method were compared. The results revealed that the proposed cookie scheme is effective at improving cookie security.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
    Akram, Waseem
    Mahmood, Khalid
    ul Haq, Hafiz Burhan
    Asif, Muhammad
    Chaudhry, Shehzad Ashraf
    Shon, Taeshik
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 263 - 280
  • [2] Secure cross-domain cookies for HTTP
    Rabinovich, Paul
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 12
  • [3] Self-verification and the content of thought
    Zimmerman, AZ
    [J]. SYNTHESE, 2006, 149 (01) : 59 - 75
  • [4] Towards a Methodology for Self-Verification
    Luth, Christoph
    Ring, Martin
    Drechsler, Rolf
    [J]. 2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 11 - 15
  • [5] Self-Verification and the Content of Thought
    Aaron Z. Zimmerman
    [J]. Synthese, 2006, 149 : 59 - 75
  • [6] PRAGMATIC SELF-VERIFICATION AND PERFORMATIVES
    SAMPSON, G
    [J]. FOUNDATIONS OF LANGUAGE, 1971, 7 (02): : 300 - &
  • [7] Self-verification and contextualized self-views
    Chen, S
    English, T
    Peng, KP
    [J]. PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN, 2006, 32 (07) : 930 - 942
  • [8] The trouble with change: Self-verification and allegiance to the self
    Swann, WB
    [J]. PSYCHOLOGICAL SCIENCE, 1997, 8 (03) : 177 - 180
  • [9] Towards self-verification of HOL Light
    Harrison, John
    [J]. AUTOMATED REASONING, PROCEEDINGS, 2006, 4130 : 177 - 191
  • [10] Trust and commitment through self-verification
    Burke, PJ
    Stets, JE
    [J]. SOCIAL PSYCHOLOGY QUARTERLY, 1999, 62 (04) : 347 - 366