Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "0062d594-baa6-4f18-ae58-50f27d75cc32"}, "_deposit": {"id": "3093", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3093"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3093", "sets": ["user-ytu"]}, "communities": ["ytu"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "\u003cp\u003eReceived: 14 August, 2018 Accepted: 02 October, 2018 Online: 14 October, 2018\u003cbr\u003e\n\u0026nbsp;Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network.\u0026nbsp; However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable in brute-force attacks because of user-generated weak or repeated passwords. The problem of weak password based encryption algorithm prompted us to introduce honey encryption (HE). Honey encryption and honeywords help to minimize this vulnerability of password based encryption algorithm and they can prevent the text based messages from brute face attacks in order to make messaging communication more secure and efficient. However, the conventional HE has message space limitation in Distribution Transforming Encoder (DTE) process and storage overhead problem in honeywords generation process. Therefore, our proposed honey encryption algorithm uses discrete distribution function in DTE process to solve message space limitation instead of using cumulative distribution function. Storage overhead and typo safety problem can overcome by using our proposed honeywords generation method in honey encryption algorithm. Furthermore, we also propose hashing and salting algorithm for securing password and key expansion. In this paper, we describe the case studies as a calculation of DTE and hashing and salting algorithm. And then, we design and implement the improved honey encryption mechanisms and honeywords generation algorithm in message transmission process. Finally, we show the comparison results using mathematical model in DTE process and security analysis of our system\u003c/p\u003e"}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Private data"}, {"interim": "Honey encryption"}, {"interim": "Honeywords"}, {"interim": "Distribution Transforming"}, {"interim": "Encoder"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-04-01"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm.pdf", "filesize": [{"value": "706 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 706000.0, "url": {"url": "https://meral.edu.mm/record/3093/files/Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm.pdf"}, "version_id": "586c97db-5a72-4770-9a7f-06c3a53369bf"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "No. 5", "subitem_journal_title": "Advances in Science, Technology and Engineering Systems Journal", "subitem_pages": "311-320", "subitem_volume": "Vol. 3"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thanda Win"}, {"subitem_authors_fullname": "Khin Su Myat Moe"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Journal article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2018-10-24"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "10.5281/zenodo.2620107"}, "item_title": "Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm", "item_type_id": "21", "owner": "1", "path": ["1596119372420"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003093", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-04-01"}, "publish_date": "2019-04-01", "publish_status": "0", "recid": "3093", "relation": {}, "relation_version_is_last": true, "title": ["Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm"], "weko_shared_id": -1}
  1. Yangon Technological University
  2. Department of Computer Engineering and Information Technology

Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm

http://hdl.handle.net/20.500.12678/0000003093
http://hdl.handle.net/20.500.12678/0000003093
09577cf4-e8e5-4c88-88d5-0e034bd5741e
0062d594-baa6-4f18-ae58-50f27d75cc32
None
Preview
Name / File License Actions
Protecting Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm.pdf (706 Kb)
Publication type
Journal article
Upload type
Publication
Title
Title Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Language en
Publication date 2018-10-24
Authors
Thanda Win
Khin Su Myat Moe
Description
<p>Received: 14 August, 2018 Accepted: 02 October, 2018 Online: 14 October, 2018<br>
&nbsp;Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network.&nbsp; However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable in brute-force attacks because of user-generated weak or repeated passwords. The problem of weak password based encryption algorithm prompted us to introduce honey encryption (HE). Honey encryption and honeywords help to minimize this vulnerability of password based encryption algorithm and they can prevent the text based messages from brute face attacks in order to make messaging communication more secure and efficient. However, the conventional HE has message space limitation in Distribution Transforming Encoder (DTE) process and storage overhead problem in honeywords generation process. Therefore, our proposed honey encryption algorithm uses discrete distribution function in DTE process to solve message space limitation instead of using cumulative distribution function. Storage overhead and typo safety problem can overcome by using our proposed honeywords generation method in honey encryption algorithm. Furthermore, we also propose hashing and salting algorithm for securing password and key expansion. In this paper, we describe the case studies as a calculation of DTE and hashing and salting algorithm. And then, we design and implement the improved honey encryption mechanisms and honeywords generation algorithm in message transmission process. Finally, we show the comparison results using mathematical model in DTE process and security analysis of our system</p>
Keywords
Private data, Honey encryption, Honeywords, Distribution Transforming, Encoder
Identifier 10.5281/zenodo.2620107
Journal articles
No. 5
Advances in Science, Technology and Engineering Systems Journal
311-320
Vol. 3
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-08-30 13:53:05.791186
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL