You are on page 1of 3

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 5 Issue: 9 81 – 83
_______________________________________________________________________________________________

NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks

1
R. Ravikumar, 2 J. Ramesh Kumar
1
Asst.professor, Dept.of.Computer Science, Tamil University, Thanjavur-613010
2
Research Scholar, Dept.of.Computer Science, Tamil University, Thanjavur-613010

Abstract: If a user wants to connect to a server has to provide his credentials where as some of the user (avoids to enter their original
credentials) connect through anonymizing network such tor browser. Internet services can be accessed privately through anonymizing networks
like Tor. A set of routers are used to achieve this in order to hide the identity of client from server. The advent of anonymizing networks
assured that users could access internet services with complete privacy avoiding any possible hindrance. IP was being shown everywhere, To
advertisers and other places, even from SPAM who compromised users identity. Anonymizing networks such as Tor allow users to access
Internet services privately by using a series of routers to hide the client’s IP address from the server. In order to allow users to access Internet
services privately, anonymizing networks like Tor uses a series of routers to hide the client’s IP address from the server. Anonymizing networks
such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server.

Keywords: Nymble, anonymizing networks, symmetric cryptography, anonymizing networks, privacy, Nymble revocation.

__________________________________________________*****_________________________________________________

I. INTRODUCTION pseudonym manager) without hindering the remaining


The previous system or existing system provides network. User also has his complete privacy without having
internet services to the users irrespective of their behavior. to compromise until he behaves.
Due to this it causes many threats to the system. Because of
this abusive purposes increases .It does not provide any kind II . PROPOSED SOLUTION
of security & has a chance of misbehaving with the server’s The problem of blacking misbehaving users has
confidential information. To address this problem of properties such as addressing Sybil attack, revocation
misbehaving activities we introduce a Nymble system. auditability, rate-limited anonymous connections, fast
Nymble is the system which provides the security with the authentication speeds, subjective blacklisting, backward
chance of blocking the misbehaving users with the server. It unlinkability, and anonymous authentication. In the
enhances the security to the data which is stored in the proposed system security is provided when users connect to
server. It provides the feature such as backward web sites. Users get pseudonyms from Pseudonym Manager
unlinkability, blacklisting, and fast access. in order to gain access to web sites. These pseudonyms help
There are several answers for addressing this in gaining anonymous access to web sites. The system
problem, each offering some amount of accountability. In ensures that genuine users connect to web sites and their
case of pseudonymous credential systems users register into anonymity is preserved.
websites by making use of pseudonyms that are added to a
blacklist if any user attempts to misbehave. The results of 1) Blacklist validation: The server sends the blacklist status
this approach are pseudonymity for every user, and lessen to the user along with its signing keys. The signing keys are
the strength of the anonymity that is offered by the produced by the message authentication code. The verifying
anonymizing network. algorithms are used to verify the blacklist status that was
Anonymous authentication, backward unlink ability, updated by the NM.
subjective blacklisting, fast authentication speeds, rate-
limited anonymous connections, revocation auditability 2) Ticket examination: The NM before issuing the nymble
(where users can verify whether they have been blacklisted). session id verifies the pseudo name if it was signed by the
In this system we aim to generate nymbles, which are not PM. The keys which were shared during the system setup is
easy to connect, however a stream of these nymbles assures used to verify the pseudo name.
we a simulation to anonymous access. Here we provide a Although this work applies to anonymizing
means where the website administrator can block user networks in general, we consider Tor for purposes of
without knowing his IP address (ie through pseudonym exhibition. Building and prototyping a system based on our
generated: which is a random secret identity with the proposed solution is ongoing work. In this paper we present
81
IJRITCC | September 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 9 81 – 83
_______________________________________________________________________________________________
our proposed solution and protocol. Anonymizing networks issues related with resource-based blocking in , and suggest
such as Tor allow users to access Internet services privately other alternatives for resources. We do not claim to solve the
by using a series of routers to hide the client’s IP address Sybil attack. This problem is faced by any credential system,
from the server. and we suggest some promising approaches based on
resource-based blocking since we aim to create a real-world
2.1. Advantages: deployment.
1. Intends to bind identity of an nameless user to a fictitious
name, generated from user’s IP address. This idea enables a IV. SECURITY MODEL
server to complainaboutmisbehavior of a user and blacklist Nymble aims for four security goals. We provide
his future tickets. informaldefinitions here; a detailed formalism can be found
2. Honest users remain anonymous, &blacklist future in our technical report , which explains how these goals
connections of particular users and their requests remain must also resist coalition attacks.
unlink able. 4.1. Goals and threats
3. All connections of a blacklisted user before the complaint An entity can be termed as honest when its
will remain anonymous. operations abide by the system’s specification. An honest
4. A user can check whether he is blacklisted or not at the entity attempts to infer knowledge from its own information
beginning of a connection. (e.g., its secrets, state, and protocol communications). An
5. Users are aware of their blacklist status before accessing a honest entity becomes corrupt when it is compromised by an
service. attacker, and hence, reveals its information at the time of
6. Servers can blacklist users for whatever reason, and the compromise. Blacklistability assures that any legitimate
privacy of blacklisted users is maintained. server can surely block misbehaving users. Also, if an
honest server complains about a misbehaving user in the
There are several solutions to this problem, each present linkability window, it will be successful and the user
providing some degree of accountability. In pseudonymous will not be able to connect. Rate-limiting assures that any
credential systems, users log into web sites using legitimate server that no user can connect to it more than
pseudonyms, which can be added to a blacklist if a user once within any single time period. Nonframeability
misbehaves. Unfortunately, this approach results in guarantees that any legitimate user can connect through
pseudonymity for all users, and weakens the anonymity nymble to that server. This keeps an attacker from framing a
provided by the anonym zing network. legitimate user, e.g., by getting the user blocked for
someone else’s misbehavior. Here we assume each user has
III. AN OVERVIEW TO NYMBLE a single unique identity. When IP addresses are used, a user
We now present a high-level overview of the can be “framed” as an honest user who later obtains the
Nymble system, and defer the entire protocol description same IP address. Nonframeability holds true only against
and security analysis to subsequent sections. attackers with different IP addresses. A user is considered
legitimate by a server only if he has not been blacklisted,
and has not exceeded the rate limit. Honest servers are able
to distingish between honest and dishonest users Fig 2. The
life cycle of a misbehaving user. If the server complains in
time period tc about a user’s connection in t*.the user
becomes linkable starting in tc. The complain in tc. can
include nimble tickets from onlu tc-1 and earlier Anonymity
protects the anonymity of honest users, regardless of their
legitimacy according to the (possibly corrupt) server; the
server cannot learn any more information beyond whether
the user behind (an attempt to make) a nymble connection is
3.1. Resource-based blocking legitimate or illegitimate.
To limit the number of identities a user can obtain
(called the Sybil attack), the Nimble system binds nimblest V. CONCLUDION
to resources that are sufficiently difficult to obtain in great We have proposed and built a comprehensive
numbers. For example, we have used IP addresses as the credential system called Nymble, which can be used to add a
resource in our implementation, but our scheme generalizes layer of accountability to any publicly known anonymizing
to other resources such as email addresses, identity network. The misbehaving post, even when flagged as
certificates, and trusted hardware. We address the practical abusive, is usually not immediately removed from the
82
IJRITCC | September 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 9 81 – 83
_______________________________________________________________________________________________
website. Anonymizing networks as Tor, thus far, has been
completely blocked by several web services because of users
who abuse their anonymity. Servers are able to blacklist
users who are misbehaving and maintain privacy of them,
and it is showed that it is possible to attain those properties
in a manner which is practical, effective, as well as sensitive
to requirements of both users as well as services.

REFERENCE
[1] C. Cornelius, A. Kapadia, P.P. Tsang, and S.W. Smith,
“Nymble: Blocking Misbehaving Users in Anonymizing
Networks,” Technical Report TR2008-637, Dartmouth
College, Computer Science, Dec. 2008.
[2] G. Ateniese, D.X. Song, and G. Tsudik, “Quasi-Efficient
Revocation in Group Signatures,” Proc. Conf. Financial
Cryptography, Springer, pp. 183-197, 2002.
[3] M. Bellare, H. Shi, and C. Zhang, “Foundations of
GroupSignatures: The Case of Dynamic Groups,” Proc.
Cryptographer’sTrack at RSA Conf. (CT-RSA),
Springer, pp. 136-153, 2005.
[4] D. Boneh and H. Shacham, “Group Signatures with
Verifier-Local Revocation,” Proc. ACM Conf. Computer
and Comm. Security,pp. 168-177, 2004.
[5] M. Bellare and P. Rogaway, “Random Oracles Are
Practical: A Paradigm for Designing Efficient Protocols,”
Proc. First ACM Conf. Computer and Comm. Security,
pp. 62-73, 1993.
[6] D. Boneh and H. Shacham. Group Signatures with
Verifier-Local Revocation. In ACM Conference on
Computer and Communications Security, pages 168–
177. ACM, 2004.
[7] S. Brands. Untraceable Off-line Cash in Wallets with
Observers (Extended Abstract). In CRYPTO, LNCS 773,
pages 302–318. Springer, 1993.
[8] E. Bresson and J. Stern. Efficient Revocation in Group
Signatures. In Public Key Cryptography, LNCS 1992,
pages 190–206. Springer, 2001.
[9] J. Camenisch and A. Lysyanskaya. An Efficient System
for Nontransferable Anonymous Credentials with
Optional Anonymity Revocation. In EUROCRYPT,
LNCS 2045, pages 93–118. Springer, 2001.

83
IJRITCC | September 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________

You might also like