Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{188641,
author = {Mr. Mohammed Abdul Raqeeb Sher and Mr. Kaleem Salman and Mr. Mohammed Nizam Uddin and Mr. Mirza Younus Ali Baig and Mr. Md Anjar Ahsan and Mr. Syed Altaf},
title = {IMPROVING SECURITY IN CLOUD STORAGE: AUDITING BY IDENTITY, HIDDEN DATA AND SECURE SHARING},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {12},
number = {7},
pages = {2619-2624},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=188641},
abstract = {In the world of web security testing, a crucial task is to identify weaknesses in websites that could allow unauthorised access. This abstract focuses on a specific aspect called "Username Enumeration via Subtly Different Responses." It's a method used by hackers and security experts to figure out valid usernames for a website. Before hackers try to guess passwords or break into a website, they often want to know if a username exists. This technique helps them find out. It works by carefully examining how a website responds when you try different usernames. The key to this technique is spotting small differences in how the website responds. These differences can be things like error messages that look a bit different, how long it takes for the website to respond, or the codes the website sends back. This abstract goes into more detail about how hackers and security experts use these differences to find usernames. It talks about methods like looking at error messages, timing how long it takes for the website to respond, and using computer programs to spot these differences automatically. Understanding this technique is essential for making websites more secure. When we know how hackers find usernames, we can better protect websites from unauthorised access. This abstract is a basic introduction for security experts and testers, helping them learn how to defend websites against this kind of reconnaissance. In summary, "Username Enumeration via Subtly Different Responses" is a way hackers and security experts discover usernames on websites. This abstract explains how it works, stressing the importance of finding and fixing these issues to prevent unauthorised access and data breaches.},
keywords = {},
month = {December},
}
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry