Abstract

In recent years, the web browser has taken over many roles of the traditional operating system, such as acting as a host platform for web applications. Web browser storage, where the web applications can save data locally was one of the new functionalities added in HTML5. However, web functionality has increased significantly since HTML5 was introduced. As web functionality increased, so did the threats facing web users. One of the most prevalent threats was the user’s privacy violations. This study examines the existing security issues related to the usage of web browser storage and proposes a new model to secure the data saved in the browser’s storage. The model was designed and implemented as a web browser extension to secure the saved data. The model was experimentally demonstrated and the result was evaluated.

Highlights

  • The internet and its applications have critically influenced us and becoming the main part of daily life

  • The weaknesses of same-origin policy (SOP) led to many aggressions, such as “crosssite scripting (XSS), cross-site request forgeries (CSRF), cross-origin resource sharing (CORS) attacks, social engineering, and physical access” [17]

  • This study proposes a new security model to address issues caused by saving data in an unsafe manner

Read more

Summary

A New Security Model for Web Browser Local Storage

Abstract—In recent years, the web browser has taken over many roles of the traditional operating system, such as acting as a host platform for web applications. Web browser storage, where the web applications can save data locally was one of the new functionalities added in HTML5. Web functionality has increased significantly since HTML5 was introduced. One of the most prevalent threats was the user’s privacy violations. This study examines the existing security issues related to the usage of web browser storage and proposes a new model to secure the data saved in the browser’s storage. The model was designed and implemented as a web browser extension to secure the saved data. The model was experimentally demonstrated and the result was evaluated

INTRODUCTION
BACKGROUND
SECURITY ISSUES
SECURITY MODEL
RELATED WORK
EXPERIMENT
EVALUATION
VIII. CONCLUSION AND FUTURE WORK

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.