Security enhanced using honey encryption for private data sharing in cloud

  • Authors

    • N Srinivasu
    • Masood Sahil
    • Jeevan Francis
    • Sure Pravallika
    2017-12-21
    https://doi.org/10.14419/ijet.v7i1.1.10826
  • Cloud Security, DTE (Distributed Transforming Encoder), Fully Homomorphic Encryption, Homomorphic Encryption, Honey Encryption.
  • In today’s modern age technology as there is a production of vast amount of data, it is getting very difficult to store such a vast amount of information. The best way to store this huge data is on cloud. As nowadays business organisations are moving towards cloud to store their data, security remains the primary concern. Is the data securing enough on the cloud or not? One of the ways to secure data on cloud is by providing security on cloud through Honey Encryption. Juels&Ristenrpart introduced honey encryption and showed how to achieve message recovery security even in the face of attacks that can exhaustively try all likely keys. Honey Encryption is a new encryption scheme that ensures the messages decrypted with invalid keys yield a valid looking message. In this paper, we present our implementation of Honey Encryption and apply it to useful real-world scenarios such as providing security to files which are been saved in cloud. The files contain variety of information in it. We also provide assurance against brute force attacks.

     

     

  • References

    1. [1] P. Mell and T. Grance, "The NIST Definition of Cloud," September 2011. [Online]. Available: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspec ialpublication800-145.pdf.

      [2] A. Mohamed, "A history of cloud computing," March 2009. [Online]. Available: http://www.computerweekly.com/feature/Ahistory-of-cloud-computing.

      [3] K. Hashizume, D. G. Rosado, E. FernándezMedina and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, 2013.

      [4] B. Prince, "IBM Discovers Encryption Scheme That Could Improve Cloud Security, Spam Filtering," 25 June 2009. [Online]. Available: http://www.eweek.com/security/ibm-discoversencryption-scheme-that-could-improve-cloudsecurity-spam-filtering.

      [5] M. TEBAA, S. E. HAJJI and A. E. GHAZI, "Homomorphic Encryption Applied to the Cloud," Proceedings of the World Congress on Engineering, vol. 1, 2012.

      [6] T. Ristenpart and A. Juels, "Honey Encryption: Security Beyond the Brute-Force Bound," in Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2014.

      [7] A. Juels, "The Password That Never Was," in Center for Research on Computation and Society, 2014.

      [8] J. Jaeger, T. Ristenpart and Q. Tang, "Honey Encryption Beyond Message Recovery Security," Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2016.

  • Downloads

  • How to Cite

    Srinivasu, N., Sahil, M., Francis, J., & Pravallika, S. (2017). Security enhanced using honey encryption for private data sharing in cloud. International Journal of Engineering & Technology, 7(1.1), 675-678. https://doi.org/10.14419/ijet.v7i1.1.10826