ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 3)

Publication Date:

Authors : ;

Page : 67-73

Keywords : secrecy; anonymous; privacy; pseudonym. Blacklisting;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing this secrecy for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block all known exit nodes of anonymizing networks, denying secrecy access to misbehaving and behaving users alike. To address this problem, present Nymble, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Our system is thus agnostic to different servers’ definitions of misbehavior servers can blacklist user’s .by using of Mesh technique. Which has been completely blocked by several services because of users who abuse their secrecy and providing security with MD5 algorithm?

Last modified: 2013-04-20 19:52:51