About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
First EAI International Conference on Computer Science and Engineering

Research Article

Implementing the Honey Encryption for Securing Public Cloud Data Storage

Download3127 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.27-2-2017.152270,
        author={Edwin Mok and Azman Samsudin and Soo-Fun Tan},
        title={Implementing the Honey Encryption for Securing Public Cloud Data Storage},
        proceedings={First EAI International Conference on Computer Science and Engineering},
        publisher={EAI},
        proceedings_a={COMPSE},
        year={2017},
        month={2},
        keywords={Cloud Data Centric Approach Password-based Encryption Honey Encryption},
        doi={10.4108/eai.27-2-2017.152270}
    }
    
  • Edwin Mok
    Azman Samsudin
    Soo-Fun Tan
    Year: 2017
    Implementing the Honey Encryption for Securing Public Cloud Data Storage
    COMPSE
    EAI
    DOI: 10.4108/eai.27-2-2017.152270
Edwin Mok1,*, Azman Samsudin, Soo-Fun Tan
  • 1: School of Computer Sciences, Unversiti Sains Malaysia, Penang, 11800, Malaysia
*Contact email: edwinmyp@gmail.com

Abstract

Recent security incidents on public cloud data storage had risen concerns on cloud data security. Existing cloud data protection solutions that primarily relying on the conventional password-based encryption cannot efficiently resist password guessing and password cracking attacks. To address this problem, this paper proposed an eXtended Honey Encryption (XHE) scheme by adding an additional protection mechanism on the encrypted data. When the attacker attempts to access these encrypted data by entering the incorrect password, instead of rejecting the access, the HE algorithm generates an indistinguishable bogus data, in which the attack could not determine whether the guessed password is working correctly or not. Therefore, increasing the complexity of password guessing and cracking attacks.

Keywords
Cloud Data Centric Approach Password-based Encryption Honey Encryption
Published
2017-02-28
Publisher
EAI
http://dx.doi.org/10.4108/eai.27-2-2017.152270
Copyright © 2016–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL