DocumentCode
256262
Title
RCS-blocking abusive users in anonymizing networks
Author
Pise, S. ; Kumar, R.
Author_Institution
Dept. of Comput. Eng., S.P.P.U., Pune, India
fYear
2014
fDate
22-24 Dec. 2014
Firstpage
179
Lastpage
183
Abstract
Anonymizing network gives anonymous access to its users by hiding their IP address. Tor is such an anonymizing network which channels Internet traffic through worldwide network having number of relays to hide user´s usage, its location from anyone performing network traffic analysis. But few bad users misuse this anonymity and under the cover of anonymous access, they misbehave to defame well known websites. Website administrator depends on blocking IP address of misbehaving users machines but as these users are coming from anonymizing network, blocking of their IP address is not possible. In such cases, Web site admin blocks entire anonymizing network, thereby denying access to good and bad users at the same time. The Reliable Credential system (RCS) comes up with the solution where it blocks abusive users in anonymizing network and has many more improvements compared to base system, Nymble. The most vital feature of RCS is the use of two pseudonym managers with ring signature approach for enhanced security of user´s identity. In RCS, user´s identity is his machine´s MAC address and based on this identity, misbehaving users are blacklisted. System is reliable and can handle failure of its credential manager with the backup credential manager and perform better than Nymble. Our system gives better result by giving improved reliability and preventing Sybil attack. Also it mitigates risk of colluding Pseudonym manager and Credential manager, and that is how keeps user´s identity more secured. The anonymity of any user is not at all compromised in this solution.
Keywords
IP networks; computer network security; IP address blocking; MAC address; Nymble; RCS; Sybil attack prevention; Sybil attack reliability; abusive user blocking; anonymizing networks; pseudonym manager; pseudonym managers; reliable credential system; ring signature approach; user identity security; Authentication; Computers; Cryptography; IP networks; Reliability; Servers; Anonymizing networks; Credential Manager; Pseudonym Manager; Ring Signature; TOR;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Computing and Networking (GCWCN), 2014 IEEE Global Conference on
Conference_Location
Lonavala
Type
conf
DOI
10.1109/GCWCN.2014.7030874
Filename
7030874
Link To Document