An In-Depth Approach to Strengthening Security in Open-Access Libraries Utilizing JSON Web Tokens (JWT)

Main Article Content

Ayodeji Ismail Moshood
Zoe Jeffrey

Abstract

In response to growing security concerns in software development, this study introduces an open-access library designed to enhance authentication systems using JSON Web Tokens (JWT). This research addresses critical challenges in integrating secure authentication mechanisms by developing a new, scalable, user-friendly library focused on security and ease of implementation. The library incorporates JWT rotation, Redis integration, and customizable validation to ensure robust, adaptable security for developers. Utilizing an agile, Extreme Programming (XP) methodology, the library was iteratively tested and optimized based on real-world developer feedback. The result of the new library shows improved usability, flexibility, and token management efficiency, demonstrating the effectiveness in supporting secure authentication practices compared to the state-of-the-art libraries. The new library is offering a practical, open-source solution to strengthen authentication systems in modern web applications, advancing the accessibility of secure, reliable software development tools.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Ayodeji Ismail Moshood and Zoe Jeffrey , Trans., “An In-Depth Approach to Strengthening Security in Open-Access Libraries Utilizing JSON Web Tokens (JWT)”, IJRTE, vol. 13, no. 5, pp. 14–19, Jan. 2025, doi: 10.35940/ijrte.E8181.13050125.
Section
Articles

How to Cite

[1]
Ayodeji Ismail Moshood and Zoe Jeffrey , Trans., “An In-Depth Approach to Strengthening Security in Open-Access Libraries Utilizing JSON Web Tokens (JWT)”, IJRTE, vol. 13, no. 5, pp. 14–19, Jan. 2025, doi: 10.35940/ijrte.E8181.13050125.
Share |

References

M. Jones, B. Campbell, C. Mortimore “JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants,” RFC 7523, May 2015. DOI: https://doi.org/10.17487/RFC7523

A. Bucko, K. Vishi, B. Krasniqi and B. Rexha “Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History” Computers, vol. 12, no. 4, pp. 1-15, 2023. DOI: https://doi.org/10.3390/computers12040078

P. Varalakshmi, G. Bhuvaneswari, V. S. Praveena, D. Thomas, and S. Kannan, “Improvising JSON Web Token Authentication in SDN,” 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), 2022, pp. 1-8. DOI: https://doi.org/10.1109/IC3IOT53935.2022.9767873.

S. Ahmed, and Q. Mahmood “An authentication-based scheme for application using JSON Web token”, 2019 22nd International Multitopic Conference (INMIC). pp. 11-15. DOI: https://doi.org/10.1109/INMIC48123.2019.9022766

M. Haekal, and Eliyani “Token-based authentication using JSON Web Token on SIKASIR RESTful Web Service,” 2016 International Conference on Informatics and Computing (ICIC), 2016, pp. 175-179, DOI: https://doi.org/10.1109/IAC.2016.7905711

D. Hardt, The OAuth 2.0 Authorization Framework, RFC 6749, Oct. 2012. DOI: https://doi.org/10.17487/RFC6749

M. Karlsson, “Analysis of the use of the Redis in the distributed order processing system in the restaurant network,” Redis Labs, 2022. DOI: https://doi.org/10.15587/2706-5448.2021.238460

C. J. Stettina, J. Garbajosa, and P. Kruchten, “Agile Processes in Software Engineering and Extreme Programming: Proceedings of the 24th International Conference, XP 2023, Amsterdam, The Netherlands,” Springer, 2023. DOI: https://doi.org/10.1007/978-3-031-33976-9.

S. Dalimunthe, E. H. Putra, M. A. F. Ridha “Restful API Security Using JSON Web Token (JWT) With HMAC-Sha512 Algorithm in Session Management” 2023. DOI: https://dx.doi.org/10.25299/itjrd.2023.12029

Reddy, P. A., & Reddy, P. H. chandan. (2020). User Authentication and Password Protection using an Algorithm ACR. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 4, pp. 3212–3215). Doi: https://doi.org/10.35940/ijitee.c8869.029420

Mahindrakar, P., & Pujeri, Dr. U. (2020). Insights of JSON Web Token. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 6, pp. 1707–1710). Doi: https://doi.org/10.35940/ijrte.f7689.038620

Mahindrakar, P., & Pujeri, U. (2020). Security Implications for Json web Token Used in MERN Stack for Developing E Commerce Web Application. In International Journal of Engineering and Advanced Technology (Vol. 10, Issue 1, pp. 39–45). Doi: https://doi.org/10.35940/ijeat.a1663.1010120

Kumar, Dr. A., Bhatia, Dr. A., Mishra, Dr. A., & Gupta, T. (2024). A Model Apporach for Identity and Access Management (IAM) System in the Cloud. In International Journal of Soft Computing and Engineering (Vol. 13, Issue 6, pp. 28–36). Doi: https://doi.org/10.35940/ijsce.d3645.13060124

Dungarani, R., & Gujjar, Dr. S. N. (2024). Intrusion Detection System

to Secure a Network using ACNN Model and Machine Learning. In International Journal of Innovative Science and Modern Engineering (Vol. 12, Issue 6, pp. 1–5). Doi: https://doi.org/10.35940/ijisme.g1319.12060624