⚠ Official Notice: www.ijisrt.com is the official website of the International Journal of Innovative Science and Research Technology (IJISRT) Journal for research paper submission and publication. Please beware of fake or duplicate websites using the IJISRT name.



AI-Based Cross-Platform System for Password Safety Assessment and Advice


Authors : Hemavathi G.; Prakash; Dr. Girish Kumar D.

Volume/Issue : Volume 11 - 2026, Issue 4 - April


Google Scholar : https://tinyurl.com/4xt33u6k

Scribd : https://tinyurl.com/5h859dp8

DOI : https://doi.org/10.38124/ijisrt/26apr726

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Ensuring safe password storage and access control has become crucial due to the growing reliance on web applications for managing sensitive user credentials. This project offers a safe web-based password management system that uses a structured client-server architecture to safeguard user authentication information. Modern web technologies are used for the frontend interface, Node.js is used for backend services, and an integrated database is used for persistent storage. It puts in placecontrolled access workflows, safe authentication procedures, and organized API communication between the client and server layers. To stop illegal access and data leakage, password-related operations are managed using secure handling procedures and validation logic. While the centralized backend guarantees consistent security enforcement, the application's modular design facilitates scalability, maintainability, and future enhancement. The suggested solution is appropriate for real-world web application security requirements because experimental testing with simulated user data shows dependable authentication, efficient password handling, and stable system performance.

Keywords : Web Application Security, Password Management System, Secure Authentication, Client–Server Architecture, Credential Protection, Access Control Mechanisms, Encrypted Data Storage, Backend API Security, Database Security, RealTime User Validation.

References :

  1. Gaw, S., &Felten, E. W. (2006). Password management strategies for online accounts. Proceedings of the 2nd Symposium on Usable Privacy and Security (SOUPS), pp. 44–55.
  2. Florencio, D., &Herley, C. (2007). A large-scale study of web password habits. Proceedings of the 16th International World Wide Web Conference (WWW), pp. 657–666.
  3. Bonneau, J., Herley, C., van Oorschot, P. C., &Stajano, F. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. IEEE Symposium on Security and Privacy, pp. 553–567.
  4. Samarati, P., & de Vimercati, S. C. (2001). Access control: Policies, models, and mechanisms. Foundations of Security Analysis and Design, Springer, pp. 137–196.
  5. Gollmann, D. (2011). Computer Security. 3rd ed., Wiley Publishing, pp. 255–310.
  6. OWASP Foundation. (2023). OWASP top ten web application security risks. Open Web Application Security Project.
  7. Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines: Authentication and lifecycle management. NIST Special Publication 800-63B.
  8. Behl, A., &Behl, K. (2017). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
  9. Stallings, W. (2018). Network Security Essentials: Applications and Standards. 6th ed., Pearson Education.
  10. Pressman, R. S., & Maxim, B. R. (2020). Software Engineering: A Practitioner’s Approach. 9th ed., McGraw-Hill Education.

Ensuring safe password storage and access control has become crucial due to the growing reliance on web applications for managing sensitive user credentials. This project offers a safe web-based password management system that uses a structured client-server architecture to safeguard user authentication information. Modern web technologies are used for the frontend interface, Node.js is used for backend services, and an integrated database is used for persistent storage. It puts in placecontrolled access workflows, safe authentication procedures, and organized API communication between the client and server layers. To stop illegal access and data leakage, password-related operations are managed using secure handling procedures and validation logic. While the centralized backend guarantees consistent security enforcement, the application's modular design facilitates scalability, maintainability, and future enhancement. The suggested solution is appropriate for real-world web application security requirements because experimental testing with simulated user data shows dependable authentication, efficient password handling, and stable system performance.

Keywords : Web Application Security, Password Management System, Secure Authentication, Client–Server Architecture, Credential Protection, Access Control Mechanisms, Encrypted Data Storage, Backend API Security, Database Security, RealTime User Validation.

Paper Submission Last Date
31 - May - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe