Implementation of Round Key AES with Honey Technique for Securing the Public Cloud Data Storage

  • Authors

    • Selvam L
    • Arokia Renjit J
    2018-08-04
    https://doi.org/10.14419/ijet.v7i3.1.16815
  • Honey Encryption, AES, Dictionary Attack, Distribution Transforming Encoder, Distribution Transforming Decoder and Brute Force Attack.
  • Recent security incidents on public cloud data storage had raised concerns on cloud data security. Development in the hacking area has risen in the past few years. Due to this, Cyber Security is needed which plays an important role to cover the secret information. Currently, the attack of challenging channel is both the symmetric as well as the asymmetric encryption algorithm. Since, in both criteria the secret key has to be transmitting through a security challenging channel. For this many techniques have been put forward. The Main focus is on the vulnerabilities of the private keys while hoarded in different places for the fast utilization of the round key of the AES algorithm. In the view of the hackers, extracting the private key is nearly as same as obtaining the plain text itself. So, the honey encryption technique is used to futile the attacker by producing the fake key for each and every try of the Key puncher. An indication will be generated automatically to the storage manager when an attempt is made by the attacker. The Honey encryption is the best algorithm to overcome the drawbacks of the AES algorithm but it has some time constraints which are also eliminated here. Thus, eliminating the Brute Force Attack and providing a secure system for storing the secret key.

     

     

  • References

    1. [1] Air Juels. “A bodyguard of lies: the use of honey objects in information securityâ€. http://dl.acm.org/citation.cfm?id=2613088.

      [2] AirJuels, Ronald L. Rivest. “Honeywords: Making Password-Cracking Detectableâ€. https://people.csail.mit.edu/rivest/pubs/JR13.pdf.

      [3] Aris Juels, A.; Ristenpart, T. “Honey Encryption: Encryption beyond the Brute-Force Barrierâ€. Security & Privacy, IEEE Year: 2014, Volume: 12, Issue: 4.

      [4] Asif, M.K. Al-Harthi, Y.S. â€Intrusion detection system using Honey Token based Encrypted Pointers to mitigate cyber threats for critical infrastructure networksâ€. Systems, Man and Cybernetics (SMC), 2014 IEEE International Conference.

      [5] Chatterjee, R.; Bonneau, J.; Juels, A.; Ristenpart, T. “Cracking-Resistant Password Vaults Using Natural Language Encodersâ€. Security and Privacy (SP), 2015 IEEE Symposium on 2015.

      [6] Chih-Hsu Yen Bing-Fei Wu. â€Simple error detection methods for hardware implementation of Advanced Encryption Standardâ€. Computers, IEEE Transactions on (Volume:55 , Issue: 6 ).

      [7] AnkangZhang ,Deguang Le ,Jinyi Chang ,Xingdou Gou ,.â€Parallel AES algorithm for fast Data Encryption on GPUâ€. Computer Engineering and Technology (ICCET), 2010 2nd International Conference on(Volume:6 ).

      [8] Elkilani, W.S.; Abdul-Kader, H.M.“Performance of encryption techniques for real time video streamingâ€. Networking and Media Convergence, 2009. ICNM 2009. International Conference .

      [9] Hamalainen P. Alho T. Hannikainen M. Hamalainen T.D. “Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Coreâ€. Digital System Design: Architectures, Methods and Tools, 2006. DSD 2006. 9th EUROMICRO Conference.

      [10] Ji Won Yoon, Seoul. “Visual Honey Encryption: Application to Steganographyâ€. http://dl.acm.org/citation.cfm?id=2756606.

      [11] Khose, P.N,Raut, V.G.â€Implementation of AES algorithm on FPGA for low area consumptionâ€. Pervasive Computing (ICPC), 2015 International Conference.

      [12] KuobinDai.â€Secure Digital Library Technology Research Based on VPNâ€. Intelligence Information Processing and Trusted Computing (IPTC), 2011 2nd International Symposium.

      [13] Luan Lan.â€The AES Encryption and Decryption Realization Based on FPGAâ€. Computational Intelligence and Security (CIS), 2011 Seventh International Conference.

      [14] [14] Mihaljevic, M.J.; Kohno, R. “On wireless communications privacy and security evaluation of encryption techniquesâ€. Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE.

      [15] Nirvan Tyagi, Jessica Wang, Kevin Wen, Daniel Zuo. “Honey Encryption Applications†. http://www.mit.edu/~ntyagi/papers/honey-encryption-cc.pdf

      [16] Taha, M.; Schaumont, P. “Key Updating for Leakage Resiliency with Application to AES Modes of Operationâ€. Information Forensics and Security, IEEE Transactions on 2015.

      [17] Xiang Li JunliChen ;Dinghu Qin ; Wanggen Wan . “Research and realization based on hybrid encryption algorithm of improved AES and ECCâ€. Audio Language and Image Processing (ICALIP), 2010 International Conference.

      [18] G. Ramprabu, S. Nagarajan, “Design and Analysis of Novel Modified Cross Layer Controller for WMSNâ€, Indian Journal of Science and Technology, Vol 8(5), March 2015, pp.438-444.

  • Downloads

  • How to Cite

    L, S., & Renjit J, A. (2018). Implementation of Round Key AES with Honey Technique for Securing the Public Cloud Data Storage. International Journal of Engineering & Technology, 7(3.1), 128-132. https://doi.org/10.14419/ijet.v7i3.1.16815