Authentication and Authorization in Modern Web Apps For Data
Authentication and Authorization in Modern Web Apps For Data
Available online
online at
at www.sciencedirect.com
www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
ScienceDirect
ScienceDirect
ScienceDirect
Available
Availableonline
Available onlineat
online at www.sciencedirect.com
www.sciencedirect.com
ScienceDirect
at www.sciencedirect.com
Procedia Computer Science 00 (2022) 000–000
Procedia Computer Science 00 (2022) 000–000
Procedia Computer Science 00 (2022) 000–000
www.elsevier.com/locate/procedia
ScienceDirect
ScienceDirect
Procedia Computer Science 00 (2022) 000–000 www.elsevier.com/locate/procedia
www.elsevier.com/locate/procedia
Procedia www.elsevier.com/locate/procedia
Procedia Computer ScienceComputer
Procedia Computer Science
Science
215 (2022) 00
00 (2022)
781–790 (2022) 000–000
000–000
www.elsevier.com/locate/procedia
4th
4th International
International Conference
Innovative
Innovative Data
Data Communication on
Communication Technology
Conference Technology and
www.elsevier.com/locate/procedia
on and
4th International Conference
Innovative Data
Application Communication on
Technology and
4th International Application
Conference
Innovative on
Data Communication Technology and
Application
Application
4th
4th International
International Conference on
on Innovative Data Communication Technology and
Authentication
Authentication and
and Authorization
Conference Innovativein
Authorization in Modern
Data Web Apps
Communication
Modern Web Technology
Apps for
for Data
and
Data
Authentication and Authorization in Modern Web Apps for Data
Application
Application
Authentication andUsing
Security
Security Authorization
Nodejs and in Modern
Role of Web Web
Dark Apps for Data
Security Using
Using Nodejs
Nodejs and and Role
Role of
of Dark
Dark WebWeb
Authentication andUsing
Security Authorization
Nodejs inc Modern
and Web Web
Role of Dark Apps for Data
Piyush
Piyush Pant aa
, Anand Singh Rajawat bb
, S.B.Goyal c, Pradeep Bedidd, Chaman Vermaee, Maria
Piyush Pant
Panta,, Anand
Anand Singh
Security
Singh Rajawat
Using
Rajawat
Simona Raboaca
b, S.B.Goyalc, Pradeep Bedid, Chaman Vermae, Maria
Nodejs andc, Pradeep
, S.B.Goyal Role ofBedi
Dark g WebVerma , Maria
, Chaman
b f,, Florentina Magda Enescu
f
a Simona
Piyush Pant , Anand Singh Raboaca
Rajawat f Florentina
, S.B.Goyal Magda Bedi
, Pradeep
Simona Raboaca , Florentina Magda Enescu Enescu
d g
, Chaman
g Vermae, Maria
Piyush Simona Raboaca
b f, Florentina Magda Enescu
d g
Piyush Pant , Anand
Pantaa,
Anand Singh
Singh Rajawat
Rajawatb,, S.B.Goyal
S.B.Goyalc,, Pradeep
Pradeep Bedi
Bedid,, Chaman
Chaman Verma
Vermae,, Maria
c e
aSchool of Computer Sciences and Engineering, Nashik, Sandip University, India; [email protected]
a
School
ba
ComputerSciences
Sciencesand
andEngineering,
Engineering,Nashik, Maria
School of Computer Sciences and Engineering, Nashik, Sandip University, India; [email protected]
b SchoolofofComputer Nashik,Sandip
SandipUniversity,
University,India;
India;[email protected]
[email protected]
School of Computer Sciences and Engineering, Nashik, Sandip University, India; [email protected]
Simona Raboaca
of
cFaculty
b ac
School of
of ff, Florentina Magda Enescugg
Simona Raboaca , Florentina Magda Enescu
School Computer
Computer Sciences
Information
Sciencesand
andEngineering,
Technology, City Nashik,
university,
Engineering, Sandip
Petaling
Nashik, Sandip University,
Jaya, 46100,
University,India; [email protected]
Malaysia;
India;
Faculty of Information Technology, City university, Petaling Jaya, 46100, Malaysia; [email protected]
[email protected]
[email protected]
dDepartment of
of Computer Science &
& Engg,
and Galgotias University, Greater Noida, India; [email protected]
d
Department
bcFaculty
School of of
ComputerInformation
ComputerScience Technology,
Sciences
Engg, City university,
Engineering,
Galgotias Nashik,Petaling
University, Sandip
GreaterJaya, 46100,
University,
Noida, Malaysia;
India;
India; [email protected]
[email protected]
[email protected]
d
Departmentca ofeFaculty
e Computer
aFaculty
School ofof
Faculty of Science
Information
Computer & Engg,
Informatics, Galgotias
University
Technology,
Sciences
of Informatics, and of
City University,
Eötvös
university,
Engineering,
University Greater
Loránd, 1053
Petaling
Nashik,
of EötvösNashik, Sandip
Loránd,Sandip Noida,
Budapest,
Jaya, India;
46100,
University,
1053 Budapest, [email protected]
Hungary;
Malaysia;
India; [email protected]
[email protected]
[email protected]
School of Computer Sciences and Engineering, University,Hungary; [email protected]
India; [email protected]
fICSI of Faculty
Energy of Informatics, University of Eötvös Loránd, 1053 Budapest, Hungary; [email protected]
e
d f b
Department
bSchool
ICSI Energy Department,
Computer
of Computer
ComputerScience
Department, National
Sciences andResearch
& Engg,
National Galgotias and
Engineering,
Research and Development
University,
Nashik, Sandip
Development Institute
Greater Noida,for
University,
Institute for Cryogenics
India;
India; and Isotopic
Isotopic Technologies,
[email protected]
[email protected]
Cryogenics and Technologies,
School of Sciences and Engineering, Nashik, Sandip University, India; [email protected]
f
ICSI
c Energy
e
cFaculty Department,
Faculty
of of
Information National
240050
Informatics, Research
Ramnicu
University
Technology,
240050 of
City
Ramnicu and Development
Valcea,
Eötvös Romania;
Loránd,
university,
Valcea, Institute
1053
Petaling
Romania; for
Budapest,
Jaya, 46100, Cryogenics
[email protected]
Hungary;
Malaysia;
[email protected] and Isotopic Technologies,
[email protected]
[email protected]
d Department
Faculty of Information Technology, City university, Petaling Jaya, 46100, Malaysia; [email protected]
g
of
ICSI EnergyElectronics,
Department,Communications
240050
National and Valcea,
Ramnicu Computers, University
Romania; of Pitesti,
Pitesti, Pitesti,
[email protected] Romania; [email protected]
Engg,Research and Development Institute forIndia;
Cryogenics and Isotopic Technologies,
f
dDepartment of Computer Science &
g
Department
Department ofof Electronics,
Computer Science & Engg, Galgotias
Communications and
Galgotias University,
Computers,
University, Greater
University
Greater Noida,
of
Noida, [email protected]
Pitesti,
India; Romania; [email protected]
[email protected]
g
Department eeof Electronics,
Faculty of Communications
240050
Informatics, and
Ramnicu
University of Computers,
Valcea,
Eötvös University
Romania;
Loránd, of Pitesti,Hungary;
Pitesti, Romania;
[email protected]
1053 Budapest, [email protected]
[email protected]
Faculty of Informatics, University of Eötvös Loránd, 1053 Budapest, Hungary; [email protected]
Abstract
g
Department
f
of Electronics,
fICSI Energy Department,Communications and Computers,
National Research University
and Development of Pitesti,
Institute Pitesti, Romania;
for Cryogenics [email protected]
and Isotopic Technologies,
ICSI Energy Department, National Research and Development Institute for Cryogenics and Isotopic Technologies,
Abstract 240050
Abstract 240050 Ramnicu
Ramnicu Valcea,
Valcea, Romania;
Romania; [email protected]
[email protected]
Authentication
Abstract
Authentication
g
and
and Authorization
g Department
Department of
of Electronics,
Authorization are
are the
the base
base of
Electronics, Communications
Communications security
of and for
for all
Computers,
security
and Computers, the
the Technologies
allUniversity of Pitesti, present
of Pitesti,
Technologies
University Pitesti, in
in this
this world
Pitesti, Romania;
present Romania; today.
today. Starting
Starting from
[email protected]
world
[email protected] from your
your
Authentication
smartphone andaAuthorization are the base of security for allaccess
the Technologies present in this world today. Starting from must
your
smartphone where a user authenticates himself before he could access the data inside to Entering into the White House, you
where user authenticates himself before he could the data inside to Entering into the White House, you must
Authentication
smartphone
authenticate
Abstract andaAuthorization
where
yourself, user
and based onare
authenticates the
that base
himself
you of
are security
before
authorized. forInall
he could thedigital
access
this Technologies
the world
data inside present
where toevery in this
Entering world
into the
Business, today.
White
MNC, Starting
House,from
Government your
youBody,
must
authenticate
Abstract yourself, and based on that you are authorized. In this digital world where every Business, MNC, Government Body,
smartphone
authenticate
Companies, where
yourself,
Users, a user
and
etc. authenticates
based on thathimself
you arebefore he
authorized. could
In access
this the
digital data
world inside
where to Entering
every into
Business, the White
MNC, House,
Government you must
Body,
Companies,
Authentication Users,
and etc. needs
needs aa website
website to
to inform
inform the
the world
world about
about their
their presence
presencepresent on
on the
theininternet,
internet, provide
provide services
services online
online and
and
authenticate
Companies,
Authentication
become
become aa “Brand”,and Authorization
yourself,
Users,
“Brand”, the
the
and
etc. risk
risk
based
needs
Authorization of
of
onare
aleaking
are
leaking
the
that
website base
you
to are
theuser’s
base
user’s
of
inform
of security
authorized.
security
sensitive
sensitive
for
forInall
the world all
information
information
the
this Technologies
thedigital
about theirworld
presence
Technologies
increases.
increases. It
It
whereon every
present
could
could
the
be
be
this world
Business,
internet,
indangerous
this world
dangerous to
to
today.
MNC,
provide
today.
the
the
Starting
Government
services
Starting
users
users of
of
from
online
from
the
the
your
Body,
and
your
hacked
hacked
smartphone
Companies,
become
smartphone
website because where
Users,
a “Brand”,
where aaetc.
their user
the
user authenticates
needs
risk
authenticates
sensitive himself
of ainformation
website
leaking to like
user’s
himself before
inform
before
a thehe
sensitive he
credit could
world
could
card, access
about
information
access
bank the
their
the
account data
presence
increases.
data inside
It could
inside
details, to
on
to
etc. Entering
the
be
could into
internet,
dangerous
Entering be into
sold the
to
the
in White
provide
the
White
the House,
services
users of
House,
black the
market you
online must
and
hacked
you must
of
website
authenticate because their and
yourself, sensitivebased information
on that you like
are a credit card,
authorized. In bank
this account
digital worlddetails, etc.every
couldBusiness,
be sold in the black of the
market Body, the
become
website
authenticate
“dark a “Brand”,
because
web”. The their
yourself,
roletheand
of risk
sensitive
the of information
based
darkleaking
onwebthat
isuser’s
you like
are
describedsensitive
a credit
authorized.
in the information
card,
In
paper bank
this
and increases.
account
digital
how world
the data Itwhere
details,could
where
is sold be
etc.every
could
theredangerous
be sold
Business,
and what MNC,
to
in the
MNC,
becomesGovernment
the users
black of
Government
of it. the
marketThehacked
of the
Body,
paper
“dark
Companies, web”. The
Users, role of
etc. the
needs dark
a web
websiteis described
to inform in the
the paper
world and
about how
their the data
presence is sold
on there
the and
internet,what becomes
provide of
services it. The
onlinepaper
and
website
“dark
Companies,
helps to because
web”. The
Users,
to understand their
understand howrole sensitive
of
etc. the
needs
how aa secure dark
ainformation
web
website
secure website is
website isto like
described a
inform
is developed credit
in the
the
developed that card,
paper
world bank
and
about
that promises account
how
promises the their the
the user details,
data
presence
user to is
to keep etc.
sold
on
keep the could
there
the be
and sold
internet,
the sensitive what in the black
becomes
provide
sensitive information of
services
information safe, market
increases the
it. The
online
safe, increases of
paper
and
helps
become aa “Brand”, the risk of leaking the
“dark
helps
become
bond web”.
to
of trust The
understand
“Brand”, rolehow
between theofa the
risk
clientdark
a secure
ofand web
leaking isuser’s
website
server described
user’s
which sensitive
is developed in the
sensitive
results information
that
in paper
a and how
promises
information
long-term increases.
the the
userdata
increases. toIt
relationship. could
is
Itkeep
couldthebe
sold
The there
be dangerous
and what
sensitive
aim dangerous
behind to the
the users
tobecomes
information
developing safe,
users
an of the
Thehacked
ofauthentication
ofit.
increases
the paper
hackedthe
bond
website of because
trust betweentheir a client and
sensitive server which
information like aresults
credit incard,
a long-term
bank relationship.
account details, The
etc. aim
could behind
be developing
sold in the an authentication
black market of the
helps
bond
website
systemtoisbecause
of understand
trust
to between
keep theirhow
users’ asensitive
a client
sensitivesecure
and website
information is like
server which
information developed
aresults
safe credit
so that
that promises
incard,
ahackers
long-term the
bank cannot
account user to keep
relationship.
details,
steal and theaim
The
etc.
sell sensitive
could
the behind information
be solddeveloping
information in on
thethesafe,
an
black
dark increases
authentication
market
web’s ofback
the
system
“dark is to The
web”. keeproleusers’of sensitive
the dark information
web is safeinsothethatpaper
hackers cannot steal and sell there
the information on the dark web’s back
bond
system
“dark of
market. istrust
web”. between
Toto perform
keep
The
perform users’
role a client
of
this, the and
sensitive
dark
the web
developer is described
server whichsafe
information
described
needs results
to insotheinpaper
that
understand and
ahackers
long-term how
and cannot
how how the data
torelationship.
thesteal
dataand
implement is sold
The
sell aim
sold and
and what
behind
the information
is authentication.
there what
NodeJS,becomes
developing the an
on with
becomes of
dark
of
theit. The
it.web’s paper
authentication
The of
help back
paperits
market.
helps To
toisunderstand
understand this,
how the developer
asensitive
secure website needs to
is developed
developed understand
that how
promises to implement
theauthentication
user to keep
keepauthentication.
the sensitive NodeJS,
information with the
safe, help
increases of its
the
system
market.
helps to
framework TotoexpressJS
keep users’
perform this,
howand a the
secure
some information
developer
website
other needs
is
packages, safe
to
is so that
understand
used that
to hackers
promises
develop cannot
howthe to
the steal
implement
user to andauthentication.
sell
the
and the information
sensitive NodeJS, on with
information
authorization thesafe,
system dark
of the web’s
help
increases
the websiteback
of its
the
by
framework
bond of expressJS and someandother packages, is used in to adevelop the relationship.
authentication andaim authorization system of the website by
market.
framework
bond
the of trust
trust
the research.
research. between
To expressJS
perform
betweenthis,
Previous
Previous
aapapers
and client
the on
some
client
papers and
on
server
developer
other
server
this
this field
field
which
needs
packages,
which
covered
covered
results
to understand
is used
results
the
the in long-term
howthe
to adevelop
long-term
authentication
authentication
totopic
implement
authentication
relationship.
topic in general.
in general.The
The aim
This
This
behind
authentication.
and behind
paper
paper
developing
NodeJS,
authorizationdeveloping
overcame
overcame
with
system
that
that
an
of
an
by
by
authentication
the
the help of by
website
authentication
going
going deeper
deeper
its
system
framework
the
system
into theis
research.
is to
to
fieldkeep
expressJS
keep
and users’
Previous
users’
being and sensitive
paperssome
sensitive
server-side information
onother
this packages,
field
information
language safe
covered
safe
specific.so
is used
the
so that
that
The hackers
to develop
authentication
hackers
common cannot
the topic
cannot
types steal
authentication and
inofgeneral.
steal and sell
and
This
sell
authentication the
the information
authorization
paper overcame
information
methods on
on
used the
system
that
the
in dark
ofbythe
dark web’s
going
different website
web’s back
deeper
back
types by
of
into
market. the To fieldperform
and being this, server-side
the language
developer needs specific.
to The common
understand how totypes of authentication
implement authentication.methods used in
NodeJS, withdifferent
the helptypes
of of
its
the
into
market. research.
the To
websites field
are Previous
and being
perform
discussed papers
this,
in the
detailon
server-sidethisthe
developer
and field
languagecovered
needs
best to
methods the
specific. authentication
The
understand
are common
purposed howfor totopic
types
the inofgeneral.
implement
developer This
authentication paper
authentication.
to be implementedovercame
methodsNodeJS,
for that
useda more
in
with by
thegoing
different
secure help deeper
types
of
website.of
its
websites
framework areexpressJS
discussedand in detail
some and
otherthepackages,
best methods is are topurposed for the developer to and be implemented for a more secure website.
into This the
websites
framework
This
field
research
research
andlight
areexpressJS
put
put
being
discussed
light andin server-side
on
on
detail
someandother
Artificial
Artificial
language
the best methods
packages,
Intelligence
Intelligence is used
specific.
and
and
areThe
used to
blockchain
blockchain
develop
common
purposed
develop the
for theauthentication
types
thefuture
as the
as the of security
developerauthentication
authentication
future of
to and
security
be
of
authorization
methods for
of implemented
authorization
big
big data.
data.
system
used a more
system of the
the website
in different
of secure types
website.
website by
of
by
the research.
websites
This
.the research.
research Previous
are discussed papers
in detail
put light papers
Previous on onand
thisIntelligence
Artificial
on this field
the
field covered
bestcovered
methods
andthethe authentication
areauthentication
purposed
blockchain topic
for future
as the inofgeneral.
the developer
topic in general. This
to be
security paper
of implemented
This big overcame
data.overcame
paper that by
for a more
that by goingwebsite.
secure
going deeper
deeper
©.into 2023
the ThefieldAuthors.
and beingPublished by Elsevier B.V.
This
.into
Keywords:
Keywords:
research
the field put
andlight
Artificial
Artificial being onserver-side
Artificial
server-side
Intelligence,
Intelligence,
language
Intelligence
language
Authentication:
Authentication:
specific.
specific.
Authorization:
Authorization:
The
and blockchain
The common
common
Blockchain,
Blockchain,
types
types of
as theNodeJS,
future
NodeJS, of authentication
security
authentication
Hashing
Hashing
methods
of big data.
Algorithm,methods
Algorithm, Dark used
Web,used
Dark Web,
in
in different
MongoDB
MongoDB different types
types ofof
This
Keywords: is
websites an open access
Artificial article
Intelligence, under CC
Authentication: BY-NC-ND
Authorization: license
purposed (https://creativecommons.org/licenses/by-nc-nd/4.0)
.websites are discussed in detail and the best methods are purposed for the developer to be implemented for a more secure website.
are discussed in detail and the best methods are Blockchain,for the
NodeJS, developer
Hashing to be implemented
Algorithm, Dark Web, for a more
MongoDB secure website.
Peer-review
This under responsibility of the scientific committeeBlockchain,
of the 4th International Conference on Innovative Data Communication
This research
Keywords: research
Technologies
put
Artificiallight on
on Artificial
Intelligence,
put Application
and light Intelligence
Authentication:
Artificial Intelligence and
and blockchain
blockchain as
Authorization: as the future
future of
theNodeJS, security
Hashing
of security of
of big
big data.
Algorithm, Dark Web, MongoDB
data.
.. * Corresponding author. Tel.:+60-164967715
* Corresponding
Artificialauthor. Tel.:+60-164967715
Intelligence, Authentication:
Keywords:
Keywords: Artificial Intelligence, Authentication: Authorization:
Authorization: Blockchain,
Blockchain, NodeJS,
NodeJS, Hashing
Hashing Algorithm,
Algorithm, Dark
Dark Web,
Web, MongoDB
MongoDB
*E-mail
E-mail address: [email protected]
address:
Corresponding author. Tel.:+60-164967715
[email protected]
E-mail address: [email protected]
* Corresponding author. Tel.:+60-164967715
E-mail address:
1877-0509 [email protected]
1877-0509 © © 2023
2023 TheThe Authors.
Authors. Published
Published by
by Elsevier
Elsevier B.V.
B.V.
** Corresponding
1877-0509 © 2023 author.
The Tel.:+60-164967715
Corresponding author. Tel.:+60-164967715 Elsevier B.V.
Authors. Published by
E-mail
1877-0509 © [email protected]
E-mail address:
address: The Authors. Published by Elsevier B.V.
[email protected]
1877-0509 ©
1877-0509 © 2023 The
© 2023
2023 TheAuthors.
The Authors.Published
Authors. Published by
byby
Published Elsevier
Elsevier B.V.
B.V.
Elsevier B.V.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0)
Peer-review under responsibility of the scientific committee of the 4th International Conference on Innovative Data Communication
Technologies and Application
10.1016/j.procs.2022.12.080
2 Author name / Procedia Computer Science 00 (2019) 000–000
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0)
Peer-review under responsibility of the scientific committee of the 4th International Conference on Innovative Data Communication
782 Piyush Pant et al. / Procedia Computer Science 215 (2022) 781–790
Technologies and Application
1. Introduction
There are different types of authentication methods that could be used for Web Apps so that the security could be
provided to the website and to its users. Authentication is used not only on websites but everywhere. It is an “Idea”
to keep the hackers away so that if they are not authorized to access, how would they hack the platform? Just like in a
Military base, no civilian or minister is allowed to enter the base, even Not all the army personnel can enter some
parts of the base. They follow this strict rule to make sure that the information is not leaked like base design, how
many personnel, types of weapons and how many, routes, etc. As soon as someone wants to enter the base they
authenticate them using an “ID” or by a “Letter of Permission”, such methods are usable for some time, and later
they expire, kind of like a “Session-ID”. If they are not authenticated, they are denied to enter the base and are asked
to return, but if they are authenticated, they are allowed to enter the base keeping in mind that they are not authorized
to go to some zones. This is also like even if a user is authenticated, he/she is not authorized to enter some routes or
do tasks like accessing the admin panel, deleting a post by others, deleting users, etc. [8]. Both authentication and
authorization work together to ensure the website’s security to the core, if one of them is removed, the app’s security
is sacrificed. There is no point in authenticating the user if we are not authorizing them the task and routes, and the
same way if the authorization is implemented without authentication, the user simply cannot identify themselves to
the website to access. Some advanced systems are close to impossible to being hacked because they have multiple
servers spread across the globe, so no one can be present at all locations and hack at the same time. Unfortunately,
not all of us can afford such a deal so we have to rely on some methods, packages, dependencies, etc. There are many
ways developers can implement authentication and authorization, it depends on 2 major things – the first is the
server-side language being used to develop the backend and the second is the choice, knowledge, and expertise of the
developer. Both should be the best for the system to be the best. A group of hackers can access the unsecure routes
and retrieved the user’s information like what the user bought, what they ordered, their wish list, their credentials,
and so on. The hacker can sell the information on the black market or plan strategies of robberies of thousands of
dollars with gangs of thugs. The development of such application could be done with the help of top notch backend
languages like NodeJS, Python, Java, Ruby, etc. but the research proposes and uses the NodeJS as it is an extension
of JavaScript and JavaScript is built solely for one purpose which is to build website. As the industry grows, the data
increases at tremendous rate and it is a ‘must’ to keep the big data secure which could be done using the NodeJS.
Authentication is knowing the identity of the user and authorization is whether that identified user is allowed to do a
particular task or not. To understand the concept better, refer the Figure 1.
Unauthorized users are prevented from accessing sensitive information via user authentication. User A can only see
relevant information and cannot see User B's sensitive information [5]. Such measures helps to maintain the security
of the user’s information and promote anti-hacking. When dealing with security of Big Data, one of the major reason
to ensure the security of big data is that the same data would be used for data mining and various purposes to derive
meaningful insights from the data. The big data would be stored in a ‘Data Warehouse’ where the data mining will
Piyush Pant et al. / Procedia Computer Science 215 (2022) 781–790 783
2. Literature Review
The reference research work of this field covered the different types of authentication methods but the paper did not
clarify how such authentication methods are implemented. The dark web field research work described the
environment in dark web and what it is but the papers did not research on how dark web plays role in the world of
websites. This Research fills the research gap by providing how the authentication methods are implemented in
industry based website and how the data stolen from websites plays important role in the dark web.
Gordin, A. et al. [4] Research work is focused on two factor authentication .In this research, the multifactor is
covered which enhance the security of website. T. Saito, et al. [8], Research provides great work about authorization
as it describes schemes to implement authorization. The research needs some future work like covering why such
concepts needs to be implemented. C. Bansal, et al [9] research discuss the concrete attacks on websites but does not
cover the basics attacks on low or no security website made by beginner developers, which is covered in this research
work. R. Reeder and S. Schechter [12], Their research work talks about the recovery using multifactor but such can
be misused to get access of someone else’s account. Its solution is discussed in this research which is to use
biometric authentication. P. Gauravaram’s [19] research describes how salts are used to secure the hashed password
but sometimes adding salt is not enough so the research have a huge space for future work. In this paper, the
“peppers” are discussed which are added with salt to enhance the security. H. Zhang and F. Zou [21], their research
discuss about the dark market of the dark. The research does not cover how dark web’s dark market plays its role in
the field of Websites. In this research, role of dark web in the field of Website is researched and discussed .The
research gap is shown in the below table 1.
Table 1: Research gap
Author Algorithm/Method Advantages Research Gap
ology
I. Gordin OpenStack cloud Enhanced security by providing In this digital world, 2 layer security is not enough
et al. [4] (2019) 2 layers especially with using QR code as it could be used by
other. The gap is fulfilled in this paper by discussing
Multifactor authentication.
Takamichi Saito OAuth 2.0 and Allows client to conceal access Concealing client access is not enough to provide
et al. OpenID when requesting to authentication to users. In this study, the various
[8] (2016) authentication server strategies for authorization are discussed
Chetan Bansal Social sign-on, Discovers concrete attacks on Beginner developer’s website are easiest to attack on
et al. WebSpi, OAuth 2.0 website authorization since they are not much secure. In this study we fill the
[9] (2012) authorization research gap by providing authentication for the beginner
protocol developers
P. Gauravaram Davies-Meyer hash Adds salts to password and hash Salts are great way to increase the password’s security
et al. functions it to increase server’s security but in this study, peppers are added to password along
[19] (2012) with salts which takes security to another level
Hengrui Zhang Analyzes the Discuss and research on the In this study, the role of dark web in the field of Website
et al. current status of contents of dark web and its is discussed. The reasons and needs to implement
[21] (2020) Dark Web research status authentication is discussed.
methods
3.1 Password-Based Authentication - Such Authentication methods require the user to create a password for their
account and then the password is hashed using hashing algorithms like SHA-1, Bcrypt, etc. Then the hashed
password is stored in the database in case the database is compromised, the hacker cannot make out the correct
784 Piyush Pant et al. / Procedia Computer Science 215 (2022) 781–790
4. Proposed Methodology
To implement Authentication and authorization, a programming language for the backend should be learned and
mastered. NodeJS – (NodeJS is a JavaScript runtime built on Chrome’s V8 JavaScript engine) would be used in this
research. NodeJS provides us with many packages just like python programming language provide libraries like
Tensorflow, Keras for tasks like machine learning, image recognition, etc. There is one more phenomenon to be
discussed which is ‘Framework’. A framework is an abstraction that allows generic software to be selectively
modified by extra user-written code, resulting in application-specific software. When developing apps, using a
framework allows you to concentrate on the application's high-level functionality. This is because the framework
handles all of the low-level functionality. This research includes one of the most trending frameworks for nodeJS
that is used for web-app development, known as ExpressJS. Express is a Node.js web application framework that
offers a comprehensive range of functionality for both web and mobile apps. As we know that JavaScript is solely
made for web development just like HTML and CSS. NodeJS is an extension of JavaScript. When developing
complex website for big data industry, it is recommended to use a ‘Framework’. For the same purpose, to build a
complex application that can handle big data and provide best authentication, a framework called as ExpressJS of
NodeJS is used in the research. The Framework ‘ExpressJS’ is used to provide the developer with a basic frame of
the application where large packages could be installed and used without any harm to the application. The
framework not just makes the work of the developer easy but also enables the application to handle complex
environment and deal with big data. A Database must be strong, secure, and compatible with the application since
we want to store the data entered by various users. This step must never be taken lightly as concepts like Data
Warehousing, Data Mining [23], Analysing the data are based and dependent on the basic concept of storing the data
in a database. MongoDB is used in this project for research as the Database to store the user’s information for
authentication. MongoDB is a document database with the scalability and flexibility that you want with the querying
and indexing that you need. Let us first understand the core basics of how the authentication and authorization works
and how it is implemented. There are traditional ways of everything and so it has as well. The following are the step
to implement authentication from scratch -
Piyush Pant et al. / Procedia Computer Science 215 (2022) 781–790 785
4.7 If a user wants to log in, user would enter the credentials and send a POST request to the login route. There, the
entered credentials will be compared with the information in the database and the user with the provided email or
username would be searched in the database, if the user does not exist, User not found would appear otherwise the
786 Piyush Pant et al. / Procedia Computer Science 215 (2022) 781–790
Despite being one of the best method and technology for authentication and authorization, it does have some
limitations. As the current industry advances to the next level, more powerful technologies are introduced like
Blockchain and Artificial Intelligence. The efficiency of security of a NodeJS is quite less than a system that
operates on Blockchain and Artificial Intelligence. However, this issue can be resolved by one simple solution that is
to merge all of these domains into one. The Blockchain technology is the future of the security as it is a
decentralized system which is anti-corruption, whereas Artificial Intelligence is known for its ability to develop
intelligent machines which can be capable to detect threat on its own and make a decision [24][25]. Even now with
the help of Machine Learning (A subset of Artificial Intelligence), Data Scientist are able to deal with ‘Big data’ and
Piyush Pant et al. / Procedia Computer Science 215 (2022) 781–790 787
The surface web is the web where the indexed websites exist, they consist of world-wide-web and we access them on
Google chrome, Firefox, safari and so on. The deep web is where government resources, academic information,
personal content of social media, chat, emails, etc. are present. The dark web is the home to illegal trades like
password selling, social media account selling, bank account numbers, details of millions of users and social security
numbers. The websites are not indexed in the deep and dark web [21]. To access the dark web, ‘TOR’ is used which
is short for ‘The Onion Router’. TOR is a project that was developed only to access the dark web. Its browser is used
to communicate with the dark web anonymously. The user’s identity is anonymous and privacy is protected, making
it a brilliant tool for hackers to use and hide their identity. One of the reasons to hack a website and get the sensitive
information of the user is to sell it on the Dark web. The Data is sold for thousands or millions of dollars and used by
the ‘Cybercriminals’ to do cyber-attacks [22]. Sometimes “fake websites are created for phishing to get user data”
[10] .The stolen information is traded in the black markets that operate on the dark web. Research says that over 22
million records were sold and traded on the dark web in 2020 [1]. A cryptocurrency like ‘Bitcoin’ is used to make
payments on the dark web making it secure for cybercriminals. Another important role played by the dark web is to
provide rainbow tables, common passwords, and, hashing information to the hacker which helps them to decrypt
passwords to gain access to users’ accounts at multiple platforms. The dark web is home to many of the rainbow
tables of different algorithms which provide the hackers with passwords and their hashes. That’s why we need strong
authentication and authorization so that our user’s information cannot be accessed by hackers to steal and sell on the
dark web. To make a secure site, Multi-factor authentication and biometrics authentication is advised since it is not
easy to copy the biometrics or get the OTP.
7. Conclusion
No website is complete if it is not secure. Security brings trust factor between client and the server and is
beneficial for long term relationship. A ‘secure website’ is achieved by implementing methods and using tools, one
of the most important method to implement, in order to make a secure website that keeps the user’s data safe is to
implement ‘Authentication and Authorization’. There are many server side languages that can be used to develop the
backend of a website but for this research, NodeJS is used as it have a strong community of developers, it is faster,
can take heavy load and it is one of the most compatible language for full stack development. In the research we
learnt that, Authentication can be built either by developing the model from scratch or using package to implement
authentication. It is concluded that using a Package is better as they provide better security and are mostly bug-free.
Hashing algorithms are used to hash the password and store the hashed password in the database. Aware about the
rainbow tables, to increase the security of password, ‘salt’ and ‘pepper’ are added to password before hashing. To
implement authorization, cookies and session plays a vital role to store user’s login information. Middleware use the
existence of session ID to authenticate and authorize the user. All the users are divided in categories like admin,
general users, can create post and perform CRUD (Create, Read, Update and Delete), users who can only read but
cannot perform any other operation. If a user wants to take some action, user’s rights are verified for that action to
take place through a process called as authorization. The need for authentication and authorization was researched
which concluded that, to keep the user’s sensitive data safe from hackers (to steal and sell in the black market of
Piyush Pant et al. / Procedia Computer Science 215 (2022) 781–790 789
Acknowledgements:
This paper was also supported by Subprogram 1.1. Institutional performance-Projects to finance excellence in RDI,
Contract No. 19PFE/30.12.2021 and a grant of the National Centre for Hydrogen and Fuel Cells (CNHPC)—
Installations and Special Objectives of National Interest (IOSIN). This paper was partially supported by UEFISCDI
Romania and MCI through BEIA projects FinSESCo, CREATE, AISTOR, I-DELTA, SMARDY, STACK, ENTA,
UPSIM, SmartDelta, BENTRADE, SPICECO, OMD, V-SPACE and by European Union's Horizon 2020 research
and innovation program under grant agreements No. 872172 (TESTBED2) and No. 883522 (S4ALLCITIES).
References
[1] Paro, A., 17, M. A. | F., 03, B. S. | F., 28, J. S. | J., Richi Jennings | 4, M. V. | M., & 11, R. J. | M. (2021). Hackers leaked 22 million records
on the dark web in 2020.| https://securityboulevard.com/2021/01/hackers-leaked-22-million-records-on-the-dark-web-in-2020/
[2] Bernard Meyer | 2022 | Most common passwords 2022 | https://cybernews.com/best-password-managers/most-common-passwords/
[3] A. Demidov, D. Polovinkin, T. Potlova, R. Shateev and E. Sopina, "Algorithms of Authentication and Authorization by Proxy in Distributed
Information-Computing Environment," 2017 IEEE 11th International Conference on Application of Information and Communication
Technologies (AICT), 2017, pp. 1-5, doi: 10.1109/ICAICT.2017.8687048.
[4] I. Gordin, A. Graur and A. Potorac, "Two-factor authentication framework for private cloud," 2019 23rd International Conference on
System Theory, Control and Computing (ICSTCC), 2019, pp. 255-259, doi: 10.1109/ICSTCC.2019.8885460.
[5] W. Wang, S. Yuan and H. He, "Design of Portal-Based Uniform Identity Authentication System in Campus Network," 2010 International
Conference on Multimedia Communications, 2010, pp. 112-115, doi: 10.1109/MEDIACOM.2010.32.
[6] H. Seta, T. Wati and I. C. Kusuma, "Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website
Login Authentication," 2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2019, pp.
115-120, doi: 10.1109/ICIMCIS48181.2019.8985196.
[7] W. Kennedy and A. Olmsted, "Three factor authentication," 2017 12th International Conference for Internet Technology and Secured
Transactions (ICITST), 2017, pp. 212-213, doi: 10.23919/ICITST.2017.8356384.
[8] T. Saito, Y. Tsunoda, D. Miyata, R. Watanabe and Y. Chen, "An Authorization Scheme Concealing Client's Access from Authentication
Server," 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2016, pp. 593-
598, doi: 10.1109/IMIS.2016.110.
[9] C. Bansal, K. Bhargavan and S. Maffeis, "Discovering Concrete Attacks on Website Authorization by Formal Analysis," 2012 IEEE 25th
Computer Security Foundations Symposium, 2012, pp. 247-262, doi: 10.1109/CSF.2012.27.
[10] C. Pascariu and I. C. Bacivarov, "Detecting Phishing Websites through Domain and Content Analysis," 2021 13th International Conference
on Electronics, Computers and Artificial Intelligence (ECAI), 2021, pp. 1-4, doi: 10.1109/ECAI52376.2021.9515165.
[11] S. Subrayan, S. Mugilan, B. Sivanesan and S. Kalaivani, "Multi-factor Authentication Scheme for Shadow Attacks in Social Network," 2017
International Conference on Technical Advancements in Computers and Communications (ICTACC), 2017, pp. 36-40, doi:
10.1109/ICTACC.2017.19.
[12] R. Reeder and S. Schechter, "When the Password Doesn't Work: Secondary Authentication for Websites," in IEEE Security & Privacy, vol.
9, no. 2, pp. 43-49, March-April 2011, doi: 10.1109/MSP.2011.1.
[13] B. O. ALSaleem and A. I. Alshoshan, "Multi-Factor Authentication to Systems Login," 2021 National Computing Colleges Conference
(NCCC), 2021, pp. 1-4, doi: 10.1109/NCCC49330.2021.9428806.
[14] E. İ. Tatlı, "Cracking More Password Hashes With Patterns," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp.
1656-1665, Aug. 2015, doi: 10.1109/TIFS.2015.2422259.
[15] S. Ahmed and Q. Mahmood, "An authentication based scheme for applications using JSON web token," 2019 22nd International Multitopic
Conference (INMIC), 2019, pp. 1-6, doi: 10.1109/INMIC48123.2019.9022766.
[16] Laatansa, R. Saputra and B. Noranita, "Analysis of GPGPU-Based Brute-Force and Dictionary Attack on SHA-1 Password Hash," 2019 3rd
International Conference on Informatics and Computational Sciences (ICICoS), 2019, pp. 1-4, doi: 10.1109/ICICoS48119.2019.8982390.
[17] F. E. De Guzman, B. D. Gerardo and R. P. Medina, "Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal,"
2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019, pp. 189-192, doi:
10.1109/CCOMS.2019.8821763.
790 Piyush Pant et al. / Procedia Computer Science 215 (2022) 781–790