Pass Man: A Modern Cloud Password Management System with Robust Encryption and User-Centric Security

Authors

  • R. Sivakani Dhaanish Ahmed College of Engineering, Chennai, Tamil Nadu, India
  • R. Regin SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India
  • S. Suman Rajest Dhaanish Ahmed College of Engineering, Chennai, Tamil Nadu, India
  • J. Mohamed Zakkariya Maricar Department of Computer Science and Business Systems, Dhaanish Ahmed College of Engineering, Padappai, Chennai, Tamil Nadu, India

Keywords:

Saas-Based Password Management, Increasing Reliance, Multiple Platforms, Secure Environment, Security Layer, Comprehensive Digital Security

Abstract

Pass Man is a modern password management solution that runs in the cloud and is designed to address the growing challenges of storing and managing secure credentials. As people use more digital services, it might be hard for them to keep strong, unique passwords across all of their devices. Pass Man protects user data by using end-to-end encryption and a zero-knowledge architecture. This means that even system administrators can't see or access user data. Each stored password is protected by a different key, which users can download as a key image. This adds an extra layer of security. The system lets you add, view, and edit passwords only after the keys have been successfully verified, ensuring that everything is real at every step. Pass Man was made with Flask, HTML, CSS, JavaScript, and Lottie animations. It has a user-friendly, responsive UI and solid security features. In the future, Pass Man will add browser extensions and a subscription-based model to reach more people and organisations, making it a complete digital security solution.

References

J. Doe, S. Williams, and L. Brown, “Zero-knowledge protocols in password managers: An overview,” International Journal of Cryptography, vol. 18, no. 1, pp. 56–67, 2019.

R. Boina, “Assessing the Increasing Rate of Parkinson’s Disease in the US and its Prevention Techniques”,” International Journal of Biotechnology Research and Development, vol. 3, no. 1, pp. 1–18, 2022.

I. Khalifa, H. Abd Al-glil, and M. M. Abbassy, “Mobile hospitalization,” International Journal of Computer Applications, vol. 80, no. 13, pp. 18–23, 2013.

I. Khalifa, H. Abd Al-glil, and M. M. Abbassy, “Mobile hospitalization for Kidney Transplantation,” International Journal of Computer Applications, vol. 92, no. 6, pp. 25–29, 2014.

M. M. Abbassy and A. Abo-Alnadr, “Rule-based emotion AI in Arabic Customer Review,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 9, p.12, 2019.

M. M. Abbassy and W. M. Ead, “Intelligent Greenhouse Management System,” 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020.

M. M. Abbassy, “Opinion mining for Arabic customer feedback using machine learning,” Journal of Advanced Research in Dynamical and Control Systems, vol. 12, no. SP3, pp. 209–217, 2020.

M. M. Abbassy, “The human brain signal detection of Health Information System IN EDSAC: A novel cipher text attribute based encryption with EDSAC distributed storage access control,” Journal of Advanced Research in Dynamical and Control Systems, vol. 12, no. SP7, pp. 858–868, 2020.

H. AbdulKader, E. ElAbd, and W. Ead, "Protecting online social networks profiles by hiding sensitive data attributes," Procedia Computer Science, vol. 82, pp. 20–27, 2016.

I. E. Fattoh, F. Kamal Alsheref, W. M. Ead, and A. M. Youssef, "Semantic sentiment classification for COVID-19 tweets using universal sentence encoder," Computational Intelligence and Neuroscience, vol. 2022, pp. 1–8, 2022.

W. M. Ead, W. F. Abdel-Wahed, and H. Abdul-Kader, "Adaptive fuzzy classification-rule algorithm in detection malicious web sites from suspicious URLs," International Arab Journal of e-Technology, vol. 3, pp. 1–9, 2013.

M. A. Abdelazim, M. M. Nasr, and W. M. Ead, "A survey on classification analysis for cancer genomics: Limitations and novel opportunity in the era of cancer classification and target therapies," Annals of Tropical Medicine and Public Health, vol. 23, no. 24, 2020.

F. K. Alsheref, I. E. Fattoh, and W. M. Ead, "Automated prediction of employee attrition using ensemble model based on machine learning algorithms," Computational Intelligence and Neuroscience, vol. 2022, pp. 1–9, 2022.

M. M. and S. Mesbah, “Effective e-government and citizens adoption in Egypt,” International Journal of Computer Applications, vol. 133, no. 7, pp. 7–13, 2016.

M.M.Abbassy, A.A. Mohamed “Mobile Expert System to Detect Liver Disease Kind”, International Journal of Computer Applications, vol. 14, no. 5, pp. 320–324, 2016.

R. A. Sadek, D. M. Abd-alazeem, and M. M. Abbassy, “A new energy-efficient multi-hop routing protocol for heterogeneous wireless sensor networks,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 11, 2021.

S. Derindere Köseoğlu, W. M. Ead, and M. M. Abbassy, “Basics of Financial Data Analytics,” Financial Data Analytics, pp. 23–57, 2022.

W. Ead and M. Abbassy, “Intelligent Systems of Machine Learning Approaches for developing E-services portals,” EAI Endorsed Transactions on Energy Web, p. 167292, 2018.

W. M. Ead and M. M. Abbassy, “A general cyber hygiene approach for financial analytical environment,” Financial Data Analytics, pp. 369–384, 2022.

D. K. Sharma and R. Tripathi, “4 Intuitionistic fuzzy trigonometric distance and similarity measure and their properties,” in Soft Computing, De Gruyter, Berlin, Germany, pp. 53–66, 2020.

D. K. Sharma, B. Singh, M. Anam, R. Regin, D. Athikesavan, and M. Kalyan Chakravarthi, “Applications of two separate methods to deal with a small dataset and a high risk of generalization,” in 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 2021.

D. K. Sharma, B. Singh, M. Anam, K. O. Villalba-Condori, A. K. Gupta, and G. K. Ali, “Slotting learning rate in deep neural networks to build stronger models,” in 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 2021.

K. Kaliyaperumal, A. Rahim, D. K. Sharma, R. Regin, S. Vashisht, and K. Phasinam, “Rainfall prediction using deep mining strategy for detection,” in 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 2021.

I. Nallathambi, R. Ramar, D. A. Pustokhin, I. V. Pustokhina, D. K. Sharma, and S. Sengan, “Prediction of influencing atmospheric conditions for explosion Avoidance in fireworks manufacturing Industry-A network approach,” Environ. Pollut., vol. 304, no. 7, p. 119182, 2022.

H. Sharma and D. K. Sharma, “A Study of Trend Growth Rate of Confirmed Cases, Death Cases and Recovery Cases of Covid-19 in Union Territories of India,” Turkish Journal of Computer and Mathematics Education, vol. 13, no. 2, pp. 569–582, 2022.

A. L. Karn et al., “Designing a Deep Learning-based financial decision support system for fintech to support corporate customer’s credit extension,” Malays. J. Comput. Sci., vol.36, no.s1, pp. 116–131, 2022.

A. L. Karn et al., “B-lstm-Nb based composite sequence Learning model for detecting fraudulent financial activities,” Malays. J. Comput. Sci., vol.32, no.s1, pp. 30–49, 2022.

P. P. Dwivedi and D. K. Sharma, “Application of Shannon entropy and CoCoSo methods in selection of the most appropriate engineering sustainability components,” Cleaner Materials, vol. 5, no. 9, p. 100118, 2022.

A. Kumar, S. Singh, K. Srivastava, A. Sharma, and D. K. Sharma, “Performance and stability enhancement of mixed dimensional bilayer inverted perovskite (BA2PbI4/MAPbI3) solar cell using drift-diffusion model,” Sustain. Chem. Pharm., vol. 29, no. 10, p. 100807, 2022.

A. Kumar, S. Singh, M. K. A. Mohammed, and D. K. Sharma, “Accelerated innovation in developing high-performance metal halide perovskite solar cell using machine learning,” Int. J. Mod. Phys. B, vol. 37, no. 07, p.12, 2023.

Downloads

Published

2025-12-22

How to Cite

Sivakani, R. ., Regin, R. ., Rajest, S. S. ., & Maricar, J. M. Z. . (2025). Pass Man: A Modern Cloud Password Management System with Robust Encryption and User-Centric Security. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(1), 157–172. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/851

Issue

Section

Articles

Most read articles by the same author(s)

1 2 > >>