ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Prevention of Data Using Concept of Honeywords

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.7, No. 2)

Publication Date:

Authors : ; ; ;

Page : 120-123

Keywords : honeypot; honeywords; intruder; authentication; security; password;

Source : Downloadexternal Find it from : Google Scholarexternal


Data Security plays a pivotal and decisive role in current times. Passwords could be authenticated easily using brute forces. Various other technologies used such as an OTP or code generators require third hand devices. Users authentic password are amalgamated with honeywords and stored as sweet words in an encrypted file within the database. These sweet words even after getting in the hands of an invader bewail him. The proffered system has an additional security authentication i.e. the key validity stage. The intruder when enters password with conjecture then after three attempts he will be directed towards a page showing decoy files and at the same time an alert will be send to the genuine user notifying him about the infringement.

Last modified: 2018-03-07 15:15:37