• DocumentCode
    256262
  • Title

    RCS-blocking abusive users in anonymizing networks

  • Author

    Pise, S. ; Kumar, R.

  • Author_Institution
    Dept. of Comput. Eng., S.P.P.U., Pune, India
  • fYear
    2014
  • fDate
    22-24 Dec. 2014
  • Firstpage
    179
  • Lastpage
    183
  • Abstract
    Anonymizing network gives anonymous access to its users by hiding their IP address. Tor is such an anonymizing network which channels Internet traffic through worldwide network having number of relays to hide user´s usage, its location from anyone performing network traffic analysis. But few bad users misuse this anonymity and under the cover of anonymous access, they misbehave to defame well known websites. Website administrator depends on blocking IP address of misbehaving users machines but as these users are coming from anonymizing network, blocking of their IP address is not possible. In such cases, Web site admin blocks entire anonymizing network, thereby denying access to good and bad users at the same time. The Reliable Credential system (RCS) comes up with the solution where it blocks abusive users in anonymizing network and has many more improvements compared to base system, Nymble. The most vital feature of RCS is the use of two pseudonym managers with ring signature approach for enhanced security of user´s identity. In RCS, user´s identity is his machine´s MAC address and based on this identity, misbehaving users are blacklisted. System is reliable and can handle failure of its credential manager with the backup credential manager and perform better than Nymble. Our system gives better result by giving improved reliability and preventing Sybil attack. Also it mitigates risk of colluding Pseudonym manager and Credential manager, and that is how keeps user´s identity more secured. The anonymity of any user is not at all compromised in this solution.
  • Keywords
    IP networks; computer network security; IP address blocking; MAC address; Nymble; RCS; Sybil attack prevention; Sybil attack reliability; abusive user blocking; anonymizing networks; pseudonym manager; pseudonym managers; reliable credential system; ring signature approach; user identity security; Authentication; Computers; Cryptography; IP networks; Reliability; Servers; Anonymizing networks; Credential Manager; Pseudonym Manager; Ring Signature; TOR;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Computing and Networking (GCWCN), 2014 IEEE Global Conference on
  • Conference_Location
    Lonavala
  • Type

    conf

  • DOI
    10.1109/GCWCN.2014.7030874
  • Filename
    7030874