An Efficient Privacy Preserving Technique Using Decoy Passwords

Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 6

Abstract

As per the rapid growth and essentiality in the field of information security, the data authentication and data access control are the major concerns. Now - a - days many us ers prefer to share their data through websites are bound to have many security related issues such as leakage of password file. To provide security against cyber threats in the above dimensions We proposed a decoy based passwords system. Honeywords are th e Decoy (fake) passwords. If an attacker steals the password file, it will include original password and honeywords and password cracking becomes tougher. Further we improved the flatness of honeyword generation system using masked password generation algo rithm based on randomized technique. So, for an adversary it will become harder to distinguish between original password and a honeyword. The administrator gets notification if any illegal login done apart from the genuine user. In this system the main adv antage is that sensitive data can’t be viewed by the unauthorized user. For this Identity Based Encryption (IBE) has been implemented. By this, only the user with genuine credentials allowed to view the original data.

Authors and Affiliations

Gannamaneni Siri Venkata Bhanu

Keywords

Related Articles

Globalisation's impact on the G lobal Public Goods & Public Bad : An Economics view on the EBOLA outbreak

A trend called globalization, which started at the early onset of this century, has increased interdependency among international nations. This interdependency has both negative as well as positive effects....

Real - time Misbehavior Detection Approach By Prof Relay Node Formu l ation

Wireless sensor networks (WSNs) often consist of tiny devices and offer a variety of potential means to monitor the environme nt. WSNs are easily moved to several types of attack because of their use in cri...

A Study on Awareness of Tuberculosis among the Population of the Field Practice Area of Urban Health Centre, Panagal, Nalgonda District, Andhra Pradesh

A descriptive cross sectional study using Simple Random Sampling technique was used to select a sample of 310 houses from universe of 2373 houses of during the time period of 28 th o f May to 28 th of July for a period...

Training and Development and Organizational Performance: The Moderating Effect of Organizational Commitment

The purpose of this study was to find out the impact of training and development on organizational performance and to find out the moderating effect of organizational commitment on the relationship between t raining and...

The Study on Employer Brand Strategy Privately Enterprises from the attitude of Human Resource Management

In order to achieve advantage within the competition for talent, non - public enterprises need to produce an enabling strategy to draw in and retain talent that is Employer Brand strategy. The paper defines the that mean...

Download PDF file
  • EP ID EP313783
  • DOI -
  • Views 71
  • Downloads 0

How To Cite

Gannamaneni Siri Venkata Bhanu (2017). An Efficient Privacy Preserving Technique Using Decoy Passwords. International Journal of Scientific Research and Management, 5(6), -. https://europub.co.uk/articles/-A-313783