Review on Data Prevention Using Honeywords

Authors(3) :-Pranav Bhagat, Sadia Ameen, Sadia Patka

In today’s world , data security is the important for the growth of organizations and to maintain their historical and current data . These data are generally secured or protected using passwords. But what if the passwords get into wrong hands or get cracked? To solve this problem and to prevent data from unauthorized access the idea of Honeywords came into existence .The concept of “Honeywords” is to store multiple decoy passwords with the original password that the user itself has created. Whenever an unauthorized person tries to access the data using the decoy password he/she gets access to decoy files. Honeywords creates ambiguity for the adversary to get to real password and prevents password.

Authors and Affiliations

Pranav Bhagat
Student, Department of Computer Science and Engineering, Anjuman College of Engineering & Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Maharashtra, India
Sadia Ameen
Student, Department of Computer Science and Engineering, Anjuman College of Engineering & Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Maharashtra, India
Sadia Patka
Assistant Professor, Department of Computer Science and Engineering, Anjuman College of Engineering & Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, Maharashtra, India

Security, Password, Honeypot, Honeyword, Sweetword

  1. A. Juels and R. L. Rivest, "Honeywords: Making Password-crackingDetectable" in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communication Security, ser. CCS ‟2013. New York, NY, USA:ACM, 2013, pp. 145–160.
  2. Imran Erguler, "Achieving Flatness: Selecting the Honeywords from Existing User Passwords," IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 284 - 1295, February 2015.
  3. Manisha Bhole, "Honeywords for Password Security and Management" in Journal of International Research Journal of Engineering and Technology(IRJET)– e-ISSN:2395-0056 ,P-ISSN:2395-0072, Volume 04 , Issue :06 ,June - 2017 ,pp. 534 - 538 .
  4. Prashant Muthiya & Sachin Padvi et. al. , "Achieving Flatness : Selecting Honeywords From Existing User Passwords" in Journal of International Journal for Engineering Application & Management (IJREAM)–ISSN: 2494-9150 , Volume 02 , Issue :10 , Jan - 2017 ,pp. 25-27.
  5. Ms. Komal Naik & Prof. Varsha Bhosale et. al. , "Generating Honeywords From Real Passwords with Decoy Mechanism " in Journal of International Journal for Engineering Application & Management (IJREAM)–ISSN:2494- 9150 , Volume 02 , Issue :04 , July - 2016 .
  6. Pratik Mongal & Ravindra Suryawanshi et. al. , "Making Honeywords from Actual Passwords with Distraction Mechanism" in Journal of International Journal of Emerging Technology and Advanced Engineering–ISSN:2250-2459 , Volume 06 , Issue : 9 , Sept - 2016 ,pp. 178-181.
  7. Gary C. Kessler ,"Passwords-Strengths and Weaknesses" in proceesing of Internet and Internetworking Security , J.P. Cavanagh(ed.) ,Anerbach,1997

Publication Details

Published in : Volume 4 | Issue 3 | January-February 2018
Date of Publication : 2018-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 403-405
Manuscript Number : NCAEAS4382
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Pranav Bhagat, Sadia Ameen, Sadia Patka, " Review on Data Prevention Using Honeywords", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 3, pp.403-405, January-February-2018.
Journal URL : http://ijsrst.com/NCAEAS4382

Article Preview