DocumentCode :
256262
Title :
RCS-blocking abusive users in anonymizing networks
Author :
Pise, S. ; Kumar, R.
Author_Institution :
Dept. of Comput. Eng., S.P.P.U., Pune, India
fYear :
2014
fDate :
22-24 Dec. 2014
Firstpage :
179
Lastpage :
183
Abstract :
Anonymizing network gives anonymous access to its users by hiding their IP address. Tor is such an anonymizing network which channels Internet traffic through worldwide network having number of relays to hide user´s usage, its location from anyone performing network traffic analysis. But few bad users misuse this anonymity and under the cover of anonymous access, they misbehave to defame well known websites. Website administrator depends on blocking IP address of misbehaving users machines but as these users are coming from anonymizing network, blocking of their IP address is not possible. In such cases, Web site admin blocks entire anonymizing network, thereby denying access to good and bad users at the same time. The Reliable Credential system (RCS) comes up with the solution where it blocks abusive users in anonymizing network and has many more improvements compared to base system, Nymble. The most vital feature of RCS is the use of two pseudonym managers with ring signature approach for enhanced security of user´s identity. In RCS, user´s identity is his machine´s MAC address and based on this identity, misbehaving users are blacklisted. System is reliable and can handle failure of its credential manager with the backup credential manager and perform better than Nymble. Our system gives better result by giving improved reliability and preventing Sybil attack. Also it mitigates risk of colluding Pseudonym manager and Credential manager, and that is how keeps user´s identity more secured. The anonymity of any user is not at all compromised in this solution.
Keywords :
IP networks; computer network security; IP address blocking; MAC address; Nymble; RCS; Sybil attack prevention; Sybil attack reliability; abusive user blocking; anonymizing networks; pseudonym manager; pseudonym managers; reliable credential system; ring signature approach; user identity security; Authentication; Computers; Cryptography; IP networks; Reliability; Servers; Anonymizing networks; Credential Manager; Pseudonym Manager; Ring Signature; TOR;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Computing and Networking (GCWCN), 2014 IEEE Global Conference on
Conference_Location :
Lonavala
Type :
conf
DOI :
10.1109/GCWCN.2014.7030874
Filename :
7030874
Link To Document :
بازگشت