645 research outputs found

    A PRACTICAL APPROACH FOR SUPERVISION OF TOR NETWORKS

    Get PDF
    While the website administrators cannot blacklist individual Internet protocol address of malicious users, they blacklist complete anonymizing system. On the other hand these measures reduce malicious activity through anonymizing networks at the expense of disallowing anonymous access towards behaving users. In our work we provide widespread credential system known as Nymble which is an effective system. It can be used to include a layer of accountability towards any publicly accepted anonymizing network. Here the servers overcome a potential to blacklist misbehaving users, as a result blocking users without compromising their anonymity. The proposed system makes usage of secured cryptographic hash functions, secured digital signatures, and secured symmetric-key encryption as well as data structures for maintaining efficiency. Our work will enhance the majority approval of anonymizing networks, which has, so far, been totally blocked by quite a lot of services because of users who misuse their anonymity. Our system verifies that users are responsive of their blacklist position before they present a nymble, and disconnect instantly if they are blacklisted
    • …
    corecore