LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

A Novel Encryption Algorithm for Securing Files in the Cloud using Phony Documents

Photo by lukaszlada from unsplash

Organizations have chosen to leverage cloud services due to their simplicity and cost-effectiveness, however, the challenge of securing documents from malicious threats and persistent data breach have driven an increasing… Click to show full abstract

Organizations have chosen to leverage cloud services due to their simplicity and cost-effectiveness, however, the challenge of securing documents from malicious threats and persistent data breach have driven an increasing use of cryptographic techniques for protecting documents in the cloud. Current cloud encryption schemes fail to provide optimal security as a practical attacker may find the key and subsequently recover the message stored in the cloud by using advanced cryptanalytic tools to brute-force the key. We propose the use of decoys and deception to enhance the security of the cloud using phony documents. Our approach uses the semantics/syntactic structure of natural language to build contextually correct and convincing message content that fools an attacker that tries to brute force an encrypted message. Therefore, a practical attacker that steals a ciphertext cannot find the key, the message or any fragment of the message. Given the consistent ascent in cyber-attacks on cloud servers and infrastructures which have debilitated open and private sectors, our proposed encryption approach cannot be disregarded.

Keywords: phony documents; novel encryption; cloud using; using phony; message; encryption

Journal Title: International Journal of Electrical and Computer Engineering
Year Published: 2019

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.