Visible to the public Secure Storage System Using Cryptographic Techniques

TitleSecure Storage System Using Cryptographic Techniques
Publication TypeConference Paper
Year of Publication2022
AuthorsAlShalaan, Manal, AlSubaie, Reem, Ara, Anees
Conference Name2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU)
Date Publishedmar
KeywordsBrute Force Attack, brute force attacks, Collaboration, Databases, denial of service attack, DoS, Encryption, Force, hashing, honey encryption, Human Behavior, human factors, Internet, passwords, policy-based governance, pubcrawl, random password, Real-time Systems, security requirements, storage system, user interfaces
AbstractIn the era of Internet usage growth, storage services are widely used where users' can store their data, while hackers techniques pose massive threats to users' data security. The proposed system introduces multiple layers of security where data confidentiality, integrity and availability are achieved using honey encryption, hashed random passwords as well as detecting intruders and preventing them. The used techniques can ensure security against brute force and denial of service attacks. Our proposed methodology proofs the efficiency for storing and retrieving data using honey words and password hashing with less execution time and more security features achieved compared with other systems. Other systems depend on user password leading to easily predict it, we avoid this approach by making the password given to the user is randomly generated which make it unpredictable and hard to break. Moreover, we created a simple user interface to interact with users to take their inputs and store them along with the given password in true database, if an adversary detected, he will be processed as a normal user but with fake information taken from another database called false database, after that, the admin will be notified about this illegitimate access by providing the IP address. This approach will make the admin have continuous detection and ensure availability and confidentiality. Our execution time is efficient as the encryption process takes 244 ms and decryption 229 ms.
DOI10.1109/WiDS-PSU54548.2022.00039
Citation Keyalshalaan_secure_2022