Loading

Reducing Cloud Data Breaches and Improving Data Security using Honey Encryption Algorithm
Latha.K1, Sheela.T2

1Latha. K,  Assistant Professor, Department of Computer Science and Engineering, Sri Sai Ram Engineering College, Chennai Tamil Nadu. India.

2Sheela.T, Professor & HOD, Department of ,IT, Sri Sai Ram Engineering College, Chennai 600 044,Tamil Nadu, India, 

Manuscript received on 15 September 2019 | Revised Manuscript received on 23 September 2019 | Manuscript Published on 11 October 2019 | PP: 1260-1264 | Volume-8 Issue-11S September 2019 | Retrieval Number: K125309811S19/2019©BEIESP | DOI: 10.35940/ijitee.K1253.09811S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data security is the most predominant measure that should be followed in any organization to prevent uncertified access to user’s data. A data breach is a security event in which sensitive data is viewed, transmitted, stolen or used by an unauthorized individual. A number of breaches include compromised password files which reveal the passwords of millions of users in an organization. The paper is intended to identify such password breaches through honey encryption technique. Using the concept of honey words, each user has a list of sweet words corresponding to their account, out of which only one is original password and remaining are fake passwords. During Honey Encryption, Distribution-transforming encoder (DTE) is applied on the password to acquire the seed space which is then encrypted by using secret key. The proposed model can be efficiently implemented in cloud applications to highly reduce cloud data breaches.

Keywords: Honey Encryption technique, Distribution Transforming Encoder, Password breach, Honey words.
Scope of the Article: Information and Data Security