Abstract
Cloud Computing plays a vital role in current IT sector. Every advantage of cloud comes with major security issues. Cloud credential security concern has been listed as top security threat in the Treacherous 12 by Cloud Security Alliance in 2016. The login credentials of a cloud user can be easily cracked with the existing tools. Honeywords are used to protect the passwords in password database. Honeywords are set of decoy passwords stored along with the legitimate password in hashed password database. Honeyword list along with the legitimate password are called as sweetword list. In current scenario the list of sweetwords can be stolen by launching brute force attack, dictionary attack or other password cracking attacks to the Hashed password database and the cloud user’s legitimate password can be inverted. To avoid such attacks an improvised salt generator named as Salt-Chlorine is proposed. Salt-chlorine algorithm generates highly unpredictable pseudo-random Salt to enhance the integrity of the cloud user account. Salt-Chlorine generator generates complex salts (SC) and SC is hashed with both the honeywords and cloud users legitimate password to confuse the attacker and to withstand the attacks on hashed password database. The proposed method increases the complexity of identifying the legitimate password in the list of sweetwords. The analysis demonstrates the privacy and security level of the passwords stored in cloud password database and the passwords are more secured than the existing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Erguler, I.: Achieving flateness: selecting the honeywords from existing users passwords. IEEE Trans. Dependable Secure Comput. 13, 284–295 (2016)
Cloud Security Alliance: The Treacherous 12- Cloud Computing Top Threats in 2016, February 2016
Vance, A.: If your password is 123456, just make it hackme. New York Times, January 2010
Brown, K.: The dangers of weak hashes. SANS Institute InfoSec Reading Room, Maryland, US, pp. 1–22, November 2013
Juels, A., Rivest, R.L.: Honeywords: making password-cracking detectable. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 145–160 (2013)
Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Proceedings of the 15th European Symposium on Research in Computer Security, pp. 286–302 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nathezhtha, T., Vaidehi, V. (2017). Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials. In: Thampi, S., MartÃnez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_13
Download citation
DOI: https://doi.org/10.1007/978-981-10-6898-0_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6897-3
Online ISBN: 978-981-10-6898-0
eBook Packages: Computer ScienceComputer Science (R0)