{"created":"2020-09-27T03:32:31.162401+00:00","id":5525,"links":{},"metadata":{"_buckets":{"deposit":"06bae902-2a4c-4892-9728-689f014d366a"},"_deposit":{"created_by":30,"id":"5525","owner":"30","owners":[30],"owners_ext":{"displayname":"","email":"khinmohmohaung@gmail.com","username":""},"pid":{"revision_id":0,"type":"recid","value":"5525"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/5525","sets":["1582963413512:1596119372420"]},"communities":["ytu"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable in brute-force attacks because of user-generated weak or repeated passwords. The problem of weak password based encryption algorithm prompted us to introduce honey encryption (HE). Honey encryption and honeywords help to minimize this vulnerability of password based encryption algorithm and they can prevent the text based messages from brute face attacks in order to make messaging communication more secure and efficient. However, the conventional HE has message space limitation in Distribution Transforming Encoder (DTE) process and storage overhead problem in honeywords generation process. Therefore, our proposed honey encryption algorithm uses discrete distribution function in DTE process to solve message space limitation instead of using cumulative distribution function. Storage overhead and typo safety problem can overcome by using our proposed honeywords generation method in honey encryption algorithm. Furthermore, we also propose hashing and salting algorithm for securing password and key expansion. In this paper, we describe the case studies as a calculation of DTE and hashing and salting algorithm. And then, we design and implement the improved honey encryption mechanisms and honeywords generation algorithm in message transmission process. Finally, we show the comparison results using mathematical model in DTE process and security analysis of our system."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Private data"},{"interim":"Honey encryption"},{"interim":"Honeywords"},{"interim":"Distribution Transforming"},{"interim":"Encoder"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-09-27"}],"displaytype":"preview","filename":"ASTESJ Publication Journal.pdf","filesize":[{"value":"707 Kb"}],"licensetype":"license_0","url":{"url":"https://meral.edu.mm/record/5525/files/ASTESJ Publication Journal.pdf"},"version_id":"89b39569-71af-4573-a5c0-a802fa6253f7"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_journal_title":"Advances in Science, Technology and Engineering Systems Journal","subitem_pages":"pp 311-320 (2018)","subitem_volume":"Vol. 3, No. 5,"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thanda Win"},{"subitem_authors_fullname":"Khin Su Myat Moe"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Journal article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2018-10-14"},"item_title":"Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm","item_type_id":"21","owner":"30","path":["1596119372420"],"publish_date":"2020-09-27","publish_status":"0","recid":"5525","relation_version_is_last":true,"title":["Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm"],"weko_creator_id":"30","weko_shared_id":-1},"updated":"2021-12-13T01:11:34.012032+00:00"}