Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Saurabh Sawant, Suraj Yadav, Anuj Kapileshwari, Sahana Godale, K. S. Charumathi
DOI Link: https://doi.org/10.22214/ijraset.2024.61304
Certificate: View Certificate
This project aims to develop a browser extension that automatically logs out users from their Gmail accounts upon browser closure, bolstering security, especially during power outages. It also alerts users before closing the browser if any webpage has a logged-in Google account to prevent unauthorized access. Given the risks associated with forgotten password emails and the broad access granted by Google accounts, such as to Drive and Photos, the extension plays a crucial role in mitigating potential data breaches. Additionally, it facilitates the management of Google account data, including location information and device identifiers, offering proactive protection against unauthorized access and security threats like phishing attacks and malware.
I. INTRODUCTION
This project aims to develop a security extension for Gmail users. The extension ensures automatic logout upon browser closure, reducing the risk of unauthorized access. In cases of power outages, it logs out accounts upon system reboot and internet reconnection. Additionally, it warns users before closing the browser and monitors Google account logins on websites. By addressing vulnerabilities associated with staying logged in, such as exposure to malicious attacks and data breaches, the extension enhances user security. It simplifies the login process for websites that support Single Sign-On (SSO) with Google, enhancing user convenience and security. Furthermore, it enables remote data wiping and location tracking for signed-in devices, providing added protection against threats like virus-infected emails and phishing attacks.
II. LITERATURE SURVEY
Concerns over internet security and privacy have grown in recent years, and a lot of people are looking for solutions to protect their personal data. The Google account auto-logout extension is one such tool that might assist users in safeguarding their online personas.
The research on Google account extensions that automatically log users out is examined in the literature review. The advantages of the extension and the different approaches taken to create auto-logout capability are discussed. Furthermore, these extensions' efficacy in safeguarding users' security and privacy is examined.
A. Zakariae and Ahmed [1]
It employs this method to create the Random Password Generator. It makes use of the Kerberos V5 protocol, which relies on a user's single sign authentication instead of password authentication. It requires the production of two keys: the basic key is the first, and the derived key is taken from the basic key.
B. Thomas Groß [2]
They created it after thoroughly analyzing the Security Assertion Markup Language (SAML)-based Single-Sign protocol at the protocol level. Simpson and Gross conducted a poll to classify intentional and unintentional security flaws in Federated Identity Management (FIM) frameworks. They also offered solutions for those security incidents that were suggested by other people.
C. Shi et al.'s [3]
Their analysis looked at the SSO implementation weaknesses in mobile apps. They created and executed MoSSOT (Mobile SSO Tester), an automated black box security testing tool for Android apps that makes use of the SSO services offered by Facebook R, WeChat R, and Sina, three well-known service providers.
D. L. Ramamoorthi and D. Sarkar [4]
For the purpose of efficiently and successfully maintaining active SP and IDP sessions, a browser plugin is recommended. Through the use of a Single Sign-on (SSO) environment, an Identity Provider (IDP) authenticates a user for the first Service Provider (SP). The data that the IDP generates and keeps in an active IDP session is saved by the user's web browser. Every SP additionally creates and maintains one active service session.
TABLE 1 Summary of literature survey
SN |
Paper |
Advantages and Disadvantages |
1. |
Zakariae and Ahmed (2021) [1] |
Benefits: One sign, cryptography, authentication each session of salt, Preventing dictionary, force, and brute-force assaults Its untrustworthy host and untrusted network are drawbacks, and the source has to be changed to call the proper Kerberos libraries. |
2. |
Thomas Groß (2020)[2] |
Benefits: Single-Sign on based on Security Assertion Markup Language (SAML) analysis. Negative aspects include HTTP Referer Attack and connection hijacking. offers only partial defense against man-in-the-middle attacks. |
3. |
Shietal. (2020)[3] |
Benefits: It examines the weaknesses in mobile apps that use SSO to access popular websites like Facebook, Google ID, and Google ID. Cons: App secrets leakage, shoddy authentication, and logical errors. |
4. |
L. Ramamoorthi and D. Sarkar (2020)[4] |
Benefit: Alerting the User When Signing Out. IDP session validation during SP SIGN-OUT is triggered. Cons: More chance of account compromise; intricate system; human input necessary. |
III. METHODOLOGY
The methodology for developing the browser extension entails initial requirement analysis to determine security needs, followed by research and design for architecture and functionality. Development involves coding features like automatic logout and alert mechanisms, with rigorous testing to ensure robustness and adherence to security standards. Deployment includes publishing on browser extension stores and providing user guidance. Continuous feedback-driven iteration, security monitoring, updates, and comprehensive documentation and support complete the process, ensuring a resilient and user-friendly solution.
A. System Architecture
B. Implementation Details
a. Describe the functionality:
The first stage is to describe the extension's functionality in accordance with the project specifications. In this instance, when the browser is closed, the extension ought to log the user out of Gmail automatically. This method detects when the user shuts the browser window by utilizing JavaScript's "unload" event. The extension will log the user out when the event is triggered. This is how it operates:
For instance, the extension will recognize the "unload" event and log the user out of their Google account if the user exits the browser window or tab.
b. Browser Storage:
The user's login credentials are kept in the browser's local or session storage by means of this technique. The extension has the ability to verify the storage after the user closes the browser and log them out if the data is lost. This is how it operates:
For instance, the extension will search the browser's storage for the user's login credentials if they log in to it and then dismiss it. The extension will log the user out of their Google account if the information is no longer available.
C. Hardware and Software Specifications
The experiment setup is carried out on a computer system which has the different hardware and software specifications as given in Table 3.1 and Table 3.2 respectively.
V. Acknowledgment
We would like to express our special thanks to our major project guide Prof. K.S Charumathi who guided us through the project and who helped us in applying the knowledge that we have acquired during the semester and learning new concepts.
We would like to express our special thanks to Dr. Satishkumar Varma, Head, Department of Information Technology, who gave us the opportunity to do this major project because of which we learned new concepts and their application.
We are also thankful to our major project coordinator Prof. Sheetal Gawande along with other faculties for their encouragement and support.
Finally we would like to express our special thanks to Principal Dr. Sandeep Joshi who gave us the opportunity and facilities to conduct this major project.
The goal of the project report is to create a Google account extension that automatically logs users out when they use shared or public computers, protecting their privacy and security. The extension will be made to automatically remove users from their Google accounts following a certain period of inactivity, lowering the possibility of data breaches and unwanted access. The first section of the paper highlights the issue of keeping Google accounts open on shared or public computers, which might expose private data. The paper then goes into the different ways that solutions are already accessible, like utilizing a password manager or manually logging out, before offering the auto-logout extension as a more secure and convenient choice. The study describes the technical specifics of the extension, such as its user interface, compatibility with various browsers, and interaction with Google security mechanisms. It also goes into the difficulties encountered and how they were resolved during the development process. In the report\'s conclusion, it is discussed how the auto-logout extension might help users feel more secure and at ease, as well as how it might influence the community at large by encouraging safe online behavior. The research concludes by outlining some potential directions for the extension\'s future development, such adding more security measures or enhancing its interoperability with other services.
[1] Zakariae TBATOU, Ahmed ASIMI, Younes ASIMI, Yassine SADQI “Kerberos V5 :Vulnerabilities and perspectives” 978-1-4673-9669-1/15/$31.00 ©2021 IEEE [2] T. Groß, ‘‘Security analysis of the SAML single sign-on browser/artifact profile,’’ in Proc. 19th Annu. Computer. Security. Appl. Conf., 2020, pp. 298–307. [3] Shietal., A. Madhu, and J. J. Kizhakkethottam, ‘‘Security issues of single sign on Web services,’’ in Proc. Int. Conf. Soft-Comput. Netw. Secur. (ICSNS), Feb. 2020, pp. 1–4 [4] L. Ramamoorthi and D. Sarkar, ‘‘Single sign-on implementation: Leveraging browser storage for handling tabbed browsing sign-outs,’’ in Developments and Advances in Defense and Security, Á. Rocha and R. P. Pereira, Eds. Singapore: Springer, 2020, pp. 15–28.
Copyright © 2024 Saurabh Sawant, Suraj Yadav, Anuj Kapileshwari, Sahana Godale, K. S. Charumathi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET61304
Publish Date : 2024-04-29
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here