Implementation of Round Key AES with Honey Technique for Securing the Public Cloud Data Storage

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Recent security incidents on public cloud data storage had raised concerns on cloud data security. Development in the hacking area has risen in the past few years. Due to this, Cyber Security is needed which plays an important role to cover the secret information. Currently, the attack of challenging channel is both the symmetric as well as the asymmetric encryption algorithm. Since, in both criteria the secret key has to be transmitting through a security challenging channel. For this many techniques have been put forward. The Main focus is on the vulnerabilities of the private keys while hoarded in different places for the fast utilization of the round key of the AES algorithm. In the view of the hackers, extracting the private key is nearly as same as obtaining the plain text itself. So, the honey encryption technique is used to futile the attacker by producing the fake key for each and every try of the Key puncher. An indication will be generated automatically to the storage manager when an attempt is made by the attacker. The Honey encryption is the best algorithm to overcome the drawbacks of the AES algorithm but it has some time constraints which are also eliminated here. Thus, eliminating the Brute Force Attack and providing a secure system for storing the secret key.

     

     


  • Keywords


    Honey Encryption, AES, Dictionary Attack, Distribution Transforming Encoder, Distribution Transforming Decoder and Brute Force Attack.

  • References


      [1] Air Juels. “A bodyguard of lies: the use of honey objects in information security”. http://dl.acm.org/citation.cfm?id=2613088.

      [2] AirJuels, Ronald L. Rivest. “Honeywords: Making Password-Cracking Detectable”. https://people.csail.mit.edu/rivest/pubs/JR13.pdf.

      [3] Aris Juels, A.; Ristenpart, T. “Honey Encryption: Encryption beyond the Brute-Force Barrier”. Security & Privacy, IEEE Year: 2014, Volume: 12, Issue: 4.

      [4] Asif, M.K. Al-Harthi, Y.S. ”Intrusion detection system using Honey Token based Encrypted Pointers to mitigate cyber threats for critical infrastructure networks”. Systems, Man and Cybernetics (SMC), 2014 IEEE International Conference.

      [5] Chatterjee, R.; Bonneau, J.; Juels, A.; Ristenpart, T. “Cracking-Resistant Password Vaults Using Natural Language Encoders”. Security and Privacy (SP), 2015 IEEE Symposium on 2015.

      [6] Chih-Hsu Yen Bing-Fei Wu. ”Simple error detection methods for hardware implementation of Advanced Encryption Standard”. Computers, IEEE Transactions on (Volume:55 , Issue: 6 ).

      [7] AnkangZhang ,Deguang Le ,Jinyi Chang ,Xingdou Gou ,.”Parallel AES algorithm for fast Data Encryption on GPU”. Computer Engineering and Technology (ICCET), 2010 2nd International Conference on(Volume:6 ).

      [8] Elkilani, W.S.; Abdul-Kader, H.M.“Performance of encryption techniques for real time video streaming”. Networking and Media Convergence, 2009. ICNM 2009. International Conference .

      [9] Hamalainen P. Alho T. Hannikainen M. Hamalainen T.D. “Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core”. Digital System Design: Architectures, Methods and Tools, 2006. DSD 2006. 9th EUROMICRO Conference.

      [10] Ji Won Yoon, Seoul. “Visual Honey Encryption: Application to Steganography”. http://dl.acm.org/citation.cfm?id=2756606.

      [11] Khose, P.N,Raut, V.G.”Implementation of AES algorithm on FPGA for low area consumption”. Pervasive Computing (ICPC), 2015 International Conference.

      [12] KuobinDai.”Secure Digital Library Technology Research Based on VPN”. Intelligence Information Processing and Trusted Computing (IPTC), 2011 2nd International Symposium.

      [13] Luan Lan.”The AES Encryption and Decryption Realization Based on FPGA”. Computational Intelligence and Security (CIS), 2011 Seventh International Conference.

      [14] [14] Mihaljevic, M.J.; Kohno, R. “On wireless communications privacy and security evaluation of encryption techniques”. Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE.

      [15] Nirvan Tyagi, Jessica Wang, Kevin Wen, Daniel Zuo. “Honey Encryption Applications” . http://www.mit.edu/~ntyagi/papers/honey-encryption-cc.pdf

      [16] Taha, M.; Schaumont, P. “Key Updating for Leakage Resiliency with Application to AES Modes of Operation”. Information Forensics and Security, IEEE Transactions on 2015.

      [17] Xiang Li JunliChen ;Dinghu Qin ; Wanggen Wan . “Research and realization based on hybrid encryption algorithm of improved AES and ECC”. Audio Language and Image Processing (ICALIP), 2010 International Conference.

      [18] G. Ramprabu, S. Nagarajan, “Design and Analysis of Novel Modified Cross Layer Controller for WMSN”, Indian Journal of Science and Technology, Vol 8(5), March 2015, pp.438-444.


 

View

Download

Article ID: 16815
 
DOI: 10.14419/ijet.v7i3.1.16815




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.