IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 04

Published on: April 2026

HONEY CLOUD: A HONEYPOT NETWORK APPROACH FOR ENHANCED SECURITY TO THE CLOUD

A.VISHNU PRIYA I.Y BHARATH P.SAI KIRAN G. SWARANALATHA

V.NARESH KUMAR

Department of CSE CMR Technical Campus Hyderabad Telangana India

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

Cloud computing systems have become very popular because they make it easy for users to store and access data from anywhere. At the same time, these systems face several security challenges. Attacks such as credential stuffing, password guessing, and brute-force attempts are common, where an attacker keeps trying different combinations of usernames and passwords to gain access.

To counteract these threats, one common method is to restrict the number of login attempts. When a user enters incorrect credentials multiple times, the account may be temporarily locked. While this approach can reduce unauthorized access, it does not help in understanding how the attacker is attempting to break into the system. As a result, administrators get very little information about attack patterns.

Firewalls are also used to filter and block suspicious requests. However, they mainly focus on prevention and do not provide detailed insights into attacker behavior. To address this issue, a honeypot system can be used. A honeypot is a dummy system designed to look like a real one and is placed between users and the actual backend server.

How to Cite this Paper

PRIYA, A., BHARATH, I., KIRAN, P. & SWARANALATHA, G. (2026). Honey Cloud: A Honeypot Network Approach for Enhanced Security to the Cloud. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.336

PRIYA, A.VISHNU, et al.. "Honey Cloud: A Honeypot Network Approach for Enhanced Security to the Cloud." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.336.

PRIYA, A.VISHNU,I.Y BHARATH,P.SAI KIRAN, and G. SWARANALATHA. "Honey Cloud: A Honeypot Network Approach for Enhanced Security to the Cloud." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.336.

Search & Index

References

Lance Spitzner, Honeypots: Tracking Hackers, Addison-Wesley, 2003.

Jyatiti Mokube and Michele Adams,
Honeypots: Concepts, Approaches, and Challenges, Proceedings of the 45th Annual Southeast Regional Conference, 2007.

Karthik Sadasivam, Banuprasad Samudrala, and T. Andrew Yang,
Design of Network Security Projects Using Honeypots, Journal of Computing Sciences in Colleges.

Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou,
Ensuring Data Storage Security in Cloud Computing, IEEE International Workshop on Quality of Service, 2009.

Balachandra Reddy Kandukuri, Ramya Paturi, and Atanu Rakshit,
Cloud Security Issues, IEEE International Conference on Services Computing, 2009.

Abdul Elminaam, Mohamed Kader, and Mohamed Hadhoud,
Performance Evaluation of Symmetric Encryption Algorithms, International Journal of Network Security.

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: Apr 13 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top