The role of HTML5 IndexedDB, the past, present and future

Over the past 20 years Web browsers have changed considerably from being a simple text display to now supporting complex multimedia applications. The client can now enjoy chatting, playing games and Internet banking. All these applications have something in common, they can be run on multiple platforms and in some cases they will run offline. With the introduction of HTML5 this evolution will continue, with browsers offering greater levels of functionality. This paper outlines the background study and the importance of new technologies, such as HTML5's new browser based storage called IndexedDB. We will show how the technology of storing data on the client side has changed over the time and how the technologies for storing data on the client will be used in future when considering known security issues. Further, we propose a solution to IndexedDB's known security issues in form of a security model, which will extend the current model.

[1]  Amy B. Woszczynski,et al.  Proceedings of the 1st annual conference on Information security curriculum development , 2004 .

[2]  Tommi Mikkonen,et al.  Transforming the web into a real application platform: new technologies, emerging trends and missing pieces , 2011, SAC.

[3]  John E. Spillan,et al.  Are SMEs meeting the challenge of integrating e-commerce into their businesses? A review of the development, challenges and opportunities , 2006, Int. J. Inf. Technol. Manag..

[4]  Jeremy Ellman,et al.  Some Potential Issues with the Security of HTML5 IndexedDB , 2014 .

[5]  Terry L. Esper,et al.  Business‐to‐Consumer (B2C) Collaboration: Rethinking the Role of Consumers in Supply Chain Management , 2015 .

[6]  Teh Faradilla Abdul Rahman,et al.  Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack , 2014, 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE).

[7]  Ta-Tao Chuang,et al.  Examining the impact of organisational and owner's characteristics on the extent of e-commerce adoption in SMEs , 2007 .

[8]  Lionel C. Briand,et al.  Automated testing for SQL injection vulnerabilities: an input mutation approach , 2014, ISSTA 2014.

[9]  Frank Piessens,et al.  A security analysis of next generation web standards , 2011 .

[10]  Chris Jay Hoofnagle,et al.  Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning , 2011 .

[11]  Marco Casario,et al.  HTML5 Solutions: Essential Techniques for HTML5 Developers , 2010 .

[12]  Fiaz Majeed,et al.  Extending HTML5 local storage to save more data; efficiently and in more structured way , 2013, Eighth International Conference on Digital Information Management (ICDIM 2013).

[13]  Christian Schwarzenegger,et al.  The emergence of EU criminal law : cybercrime and the regulation of the information society , 2014 .

[14]  Bob Gehling,et al.  eCommerce security , 2005, InfoSecCD '05.

[15]  R. P. Sundarraj,et al.  Internet Privacy in E-Commerce: Framework, Review, and Opportunities for Future Research , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[16]  Zhang Liwei,et al.  The mechanism analysis of the impact of ecommerce to the changing of economic growth mode , 2012, 2012 IEEE Symposium on Robotics and Applications (ISRA).

[17]  Dilip R. Patlolla,et al.  Building a secure and feature-rich mobile mapping service app using HTML5: challenges and best practices , 2014, MobiWac '14.

[18]  Jens Lichtenberg,et al.  Intrusion Detection Management System for eCommerce Security , 2005, PRIS.

[19]  Marat Zhanikeev A Practical Software Model for Content Aggregation in Browsers Using Recent Advances in HTML5 , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.