Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 3)Publication Date: 2013-03-15
Authors : J.Praveen Kumar B.Shyam Kumar;
Page : 67-73
Keywords : secrecy; anonymous; privacy; pseudonym. Blacklisting;
Abstract
Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing this secrecy for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block all known exit nodes of anonymizing networks, denying secrecy access to misbehaving and behaving users alike. To address this problem, present Nymble, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Our system is thus agnostic to different servers’ definitions of misbehavior servers can blacklist user’s .by using of Mesh technique. Which has been completely blocked by several services because of users who abuse their secrecy and providing security with MD5 algorithm?
Other Latest Articles
- Design of Search Engine using Vector Space Model for Personalized Search
- Prolonged Network Lifetime and Data Wholeness by Clusters Using B-Ct Algorithm?
- Federated Network Security Administration Framework?
- Energy Awareness in HPC: A Survey?
- Signal Strength and System Operating Margin Estimation for Vehicular Ad-Hoc Networks in Rayleigh Fading Environment?
Last modified: 2013-04-20 19:52:51