Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 6760532, 9 pages
https://doi.org/10.1155/2017/6760532
Research Article

Protecting Private Data by Honey Encryption

1North China Institute of Computing Technology, Beijing, China
2School of ITEE, The University of Queensland, Brisbane, QLD, Australia

Correspondence should be addressed to Wei Yin; moc.liamg@861iewniy

Received 10 July 2017; Revised 6 October 2017; Accepted 6 November 2017; Published 21 November 2017

Academic Editor: Leandros Maglaras

Copyright © 2017 Wei Yin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Huang, E. Ayday, J. Fellay, J.-P. Hubaux, and A. Juels, “GenoGuard: Protecting genomic data against brute-force attacks,” in Proceedings of the 36th IEEE Symposium on Security and Privacy (SP '15), pp. 447–462, Washington, DC, USA, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. A. Juels and T. Ristenpart, “Honey encryption: security beyond the brute-force bound,” in Advances in Cryptology-EUROCRYPT 2014, pp. 293–310, 2014. View at Google Scholar
  3. P. Owezarski, “A near real-time algorithm for autonomous identification and characterization of honeypot attacks,” in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015, pp. 531–542, Singapore, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Juels and R. L. Rivest, “Honeywords: making password-cracking detectable,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13), pp. 145–160, ACM, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. N. Tyagi, J. Wang, K. Wen, and D. Zuo, “Honey encryption applications,” in Computer and Network Security, pp. 1–16, 2015. View at Google Scholar
  6. L. Spitzner, Honeytokens: The Other Honeypot, 2003.
  7. I. S. Kim and M. H. Kim, “Agent-based honeynet framework for protecting servers in campus networks,” IET Information Security, vol. 6, no. 3, pp. 202–211, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. P. Jain and A. Sardana, “Defending against internet worms using honeyfarm,” in Proceedings of the International Information Technology Conference (CUBE '12), pp. 795–800, Pune, India, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. B. Mihir, T. Ristenart, P. Rogaway, and T. Stegers, “Format-preserving encryption,” in Selected Area in Cryptography, pp. 295–312, 2009. View at Google Scholar
  10. K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton, “Protocol misidentification made easy with format-transforming encryption,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 61–72, ACM, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. P. P. Vinayak and M. A. Nahala, “Avoiding brute force attack in manet using honey encryption,” International Journal of Science and Research, vol. 4, no. 3, pp. 83–85, 2015. View at Google Scholar
  12. J. W. Yoon, H. Kim, H.-J. Jo, H. Lee, and K. Lee, “Visual honey encryption: application to steganography,” in Proceedings of the 3rd ACM Information Hiding and Multimedia Security Workshop, pp. 65–74, ACM, Portland, Ore, USA, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Jaeger, T. Ristenpart, and Q. Tang, “Honey encryption beyond message recovery security,” in Advances in Cryptology–EUROCRYPT 2016, pp. 758–788, 2016. View at Google Scholar · View at MathSciNet