Loading

Prevention of Session Hijacking and Authentication Providing to the Session Cookie
Prasuna Kotturu1, Syam Prajwal Kammula2, Sai Surya Bunga3, Praneeth Sai Atluri4
1PrasunaKotturu, Assistant Professor, Department ofComputer Science and Engineering, Koneru Lakshmaiah Educational Foundation, Guntur, A.P, India.
2Syam Prajwal Kammula, Student, Department of Computer Science and Engineering, Koneru Lakshmaiah Educational Foundation, Guntur, A.P, India.
3Sai Surya Bunga, Student, Department of Computer Science and Engineering, Koneru Lakshmaiah Educational Foundation, Guntur, A.P, India.
4Praneeth Sai Atluri, Student, Department of Computer Science and Engineering, Koneru Lakshmaiah Educational Foundation, Guntur, A.P, India.

Manuscript received on November 19, 2019. | Revised Manuscript received on November 29 2019. | Manuscript published on 30 November, 2019. | PP: 9685-9690 | Volume-8 Issue-4, November 2019. | Retrieval Number: D9979118419/2019©BEIESP | DOI: 10.35940/ijrte.D9979.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The current world is running around the word “Privacy”. Every individual’s aim is to secure their data and transactions so that no one can access them without proper authentication. In this digital era, all the data stored in the internet protected by a password. The general opinion is that a password can protect the data from being acquired by an unauthorized user. The issue is about what happens subsequently with an authorized login. Once we login into our account, all our actions, state of browser and timestamps are recorded in a simple text file known as “Cookie”. In this paper, we proposed a mechanism which is easy to implement and robust in providing authentication to the session cookie. This obstructs an unauthorized user from getting access to our private data. Our mechanism provides authentication by using the concept of hashing combined with a unique identifier.
Keywords: Privacy, Authentication, Authorization, Hijacking, Hashing, Salt, Cookies.
Scope of the Article: Authentication, Authorization, Accounting.