Experimental Analysis with different approaches for creating and managing a Cloud Based Secured and Encrypted Password Manager

Main Article Content

Dr. P Naga Jyothi
Vachavaya Asish Raj
Pentela Vinay Mohan
S Sanyasi Raju
D G Venkatakrishnasrinidh

Abstract

Information security is the one of the leading domain for different types of networks, where confidentiality is essential. IS serve as the first line of defense for almost all of our electronic data, networks, servers, devices, accounts, websites, files, and other assets. As now a day’s scenario has a plethora of passwords to remember and follow in some way. Because of the rapid and continuous increase in the number of online accounts that the average user must manage, memory has become a significant weakness of vanilla passwords, reducing their power and diversity by end-users. Password managers are introduced as a partial solution to help alleviate the problem. These software programs hope to use functional password features while reducing their memory load. However, password managers are not without flaws. This article provides an overview of how password management software applications work, with enhanced AES, MD5 with multithreaded PBKBF2 algorithms as well comparison of five password management programs  are LastPass, Dashlane, Keeper, 1Password, and Keepass, discusses about  the most recent recommendations for secure password management practice in terms of  providing security. This article proposes better methods for storing passwords in the cloud and sees an advantage over traditional password manager implementation

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Jyothi, D. P. N., V. A. Raj, P. V. Mohan, S. S. Raju, and D G Venkatakrishnasrinidh. “Experimental Analysis With Different Approaches for Creating and Managing a Cloud Based Secured and Encrypted Password Manager”. Technix International Journal for Engineering Research, vol. 9, no. 8, Aug. 2022, pp. 10-19, https://tijer.org/index.php/tijer/article/view/266.
Dimension
Section
Research Articles

References

Sumagita, Meiliana, et al. "Analysis of secure hash algorithm (SHA) 512 for encryption process on web-based application." International Journal of Cyber- Security and Digital Forensics (IJCSDF) 7.4 (2018): 373-381.

De Guzman, Froilan E., Bobby D. Gerardo, and Ruji P. Medina. "Implementation of enhanced secure hash algorithm towards a secured web portal." 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019.

Yang, Bian, et al. "Cloud password manager using privacy-preserved biometrics." 2014 IEEE International Conference on Cloud Engineering. IEEE, 2014.

Chu, Huiguang. Cloud Password Manager Using Privacy-preserved Biometrics. MS thesis. 2014.

Yang, Yanjiang, Robert H. Deng, and Feng Bao. "A practical password-based two- server authentication and key exchange system." IEEE Transactions on Dependable and Secure Computing 3.2 (2006): 105-114.

Lopriore, Lanfranco. "Password management: distribution, review and revocation." The Computer Journal 58.10 (2015): 2557-2566.

Luo, Wenjian, et al. "Authentication by encrypted negative password." IEEE Transactions on Information Forensics and Security 14.1 (2018): 114-128.

Burr, William E. "Selecting the advanced encryption standard." IEEE Security & Privacy 1.2 (2003): 43-52.).

Park, Jin Hyung, et al. "Security architecture for a secure database on android." IEEE Access 6 (2018):11482-11501.

Shanta, Jyoti Vashishtha. "Evaluating the performance of symmetric key algorithms: AES (advanced encryption standard) and DES (data encryption standard)." IJCEM International Journal of Computational Engineering & Management 15.4 (2012): 4349.

Kurniawan, Endang, and Imam Riadi. "Security level analysis of academic information systems based on standard ISO 27002: 2003 using SSE-CMM." arXiv preprint arXiv:1802.03613 (2018).

Riadi, Imam, and Eddy Irawan Aristianto. "An analysis of vulnerability web against attack unrestricted image file upload." Computer Engineering and Applications Journal 5.1 (2016): 19-28.