Loading...
Please wait, while we are loading the content...
Similar Documents
NYMBLE : Protecting the Privacy of Users in Anonymous Networks and Blacklisting Misbehaving Users
| Content Provider | Semantic Scholar |
|---|---|
| Author | Rosaline, R. Anto Arockia |
| Copyright Year | 2012 |
| Abstract | R.Anto Arockia Rosaline Assistant Professor Department of Information Technology Rajalakshmi Engineering College, Chennai. E-mail: antoarockiarosaline.r@rajalakshmi.edu.in V.Deepti Sarojini Benitta Department of Information Technology Rajalakshmi Engineering College, Chennai. E-mail: deeptibeni@gmail.com Abstract: Anonymizing networks hide the client’s IP address and allow the client to access the internet. It protects the privacy of users but unfortunately some users have misused such networks for abusive purposes. Website administrators block the IP addresses of misbehaving users and as a result they block all the known exit nodes of the anonymizing networks, denying anonymous access to misbehaving and behaving users alike. Since the server does not identify individual user’s activities all the users are blocked from accessing resources of the server from the particular anonymous network. In the proposed system the users are identified individually without revealing their identity. Nymble is the proposed system in which the servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. The system detects the misbehaving users and adds them to the blacklist. Thus the server can blacklist the misbehaving users without knowledge of their IP address and allows behaving users to connect anonymously. Those of the users in the blacklist are blocked from accessing the resources for a specified time that is set by the administrators. The proposed system has several important properties which overcomes the drawbacks of the existing system. The properties are anonymous authentication, backward unlinkability, subjective blacklisting, fast authentication speeds, blacklist sharing, rate limited anonymous connections, revocation auditability and also addresses Sybil attacks. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://iasir.net/IJEBEApapers/IJEBEA12-207.pdf |
| Alternate Webpage(s) | http://www.iasir.net/IJEBEApapers/IJEBEA12-207.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |