All-in-One Identity Protection and Phishing Defence System


Authors : Aryan Khandelwal; Sarvesh M Rao; Kaavya B; Dr. U. Surendar

Volume/Issue : Volume 10 - 2025, Issue 4 - April


Google Scholar : https://tinyurl.com/4s8xrth9

Scribd : https://tinyurl.com/48shpc62

DOI : https://doi.org/10.38124/ijisrt/25apr671

Google Scholar

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 15 to 20 days to display the article.


Abstract : SecureBrowse is an extension of Google Chrome designed to address the growing threats of cybersecurity such as phishing, weak passwords and identity theft. Combine three key features: Phishing detection for real time alerts on malicious websites, password administrator for safe credential storage and identity protection to safeguard the confidential user data. With an emphasis on accessibility and ease of use, Securebrowse is perfectly integrated into daily navigation while guaranteeing robust security through advanced encryption and cybersecurity practices. This project empowers users to navigate the digital world safely and confidently.

Keywords : Secure Browse, Phishing Detection, Identity Protection.

References :

  1. Martin, L. (2007). Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management. Information Systems Security, 16(1).
  2. Mohammed, I. A. (2017). Systematic review of identity access management in information security. International Journal of Innovations in Engineering Research and Technology, 4(7), 1-7.
  3. Azhar, I. (2017). Identity and Access Management as Security as a Service from Clouds. International Journal of Creative Research Thoughts (IJCRT), ISSN 2320-2882.
  4. Abikoye, O. C., Haruna, A. D., Abubakar, A., Akande, N. O., & Asani, E. O. (2019). Modified advanced encryption standard algorithm for information security. Symmetry, 11(12), 1484.
  5. Khalaf, E. F., & Kadi, M. M. (2017). A survey of access control and data encryption for database security. Journal of King Abdulaziz University, 28(1), 19-30.
  6. Bhajantri, L. B., & Mujawar, T. N. (2019). A comprehensive review of access control mechanism based on attribute based encryption scheme for cloud computing. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(3), 33-52
  7. Kapil, G., Agrawal, A., Attaallah, A., Algarni, A., Kumar, R., & Khan, R. A. (2020). Attribute-based honey encryption algorithm for securing big data: A Hadoop distributed file system perspective. PeerJ Computer Science, 6, e259.
  8. Heiding, F., Katsikeas, S., & Lagerström, R. (2023). Research communities in cyber security vulnerability assessments: A comprehensive literature review. Computer Science Review, 48, 100551.
  9. Varsha, B. S., & Suryateja, P. S. (2014). Using attribute-based encryption with advanced encryption standard for secure and scalable sharing of personal health records in the cloud. *International Journal of Computer Science and Information Technologies*, 5(5), 6395-6399. Proceedings 7* (pp. 168-185). Springer Berlin Heidelberg
  10. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006, October). Attribute-based encryption for fine-grained access control of encrypted data. In *Proceedings of the 13th ACM Conference on Computer and Communications Security* (pp. 89-98).
  11. Bethencourt, J., Sahai, A., & Waters, B. (2007, May). Ciphertext-policy attribute-based encryption. In *2007 IEEE Symposium on Security and Privacy (SP'07)* (pp. 321-334). IEEE.
  12. Attrapadung, N., & Imai, H. (2009). Dual-policy attribute-based encryption. In *Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009.
  13. Bendoly, E. and Swink, M., 2007. Moderating effects of information access on project management behavior, performance and perceptions. Journal of Operations Management, 25(3), pp.604-622.
  14. Jarvenpaa, S.L. and Ives, B., 1994. The global network organization of the future: Information management opportunities and challenges. Journal of management information systems, 10(4), pp.25-57.
  15. Mohammed, K.H., Hassan, A. and Yusuf Mohammed, D., 2018. Identity and access management system: a web-based approach for an enterprise.

SecureBrowse is an extension of Google Chrome designed to address the growing threats of cybersecurity such as phishing, weak passwords and identity theft. Combine three key features: Phishing detection for real time alerts on malicious websites, password administrator for safe credential storage and identity protection to safeguard the confidential user data. With an emphasis on accessibility and ease of use, Securebrowse is perfectly integrated into daily navigation while guaranteeing robust security through advanced encryption and cybersecurity practices. This project empowers users to navigate the digital world safely and confidently.

Keywords : Secure Browse, Phishing Detection, Identity Protection.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe