Research Article | Open Access | Download PDF
Volume 3 | Issue 1 | Year 2013 | Article Id. IJCOT-V3I3P305 | DOI : https://doi.org/10.14445/22492593/IJCOT-V3I3P305
Efficient Restricting of bad Users among Unidentified Users in a Network
K Anitha , M Chandra Naik
Citation :
K Anitha , M Chandra Naik, "Efficient Restricting of bad Users among Unidentified Users in a Network," International Journal of Computer & Organization Trends (IJCOT), vol. 3, no. 1, pp. 37-41, 2013. Crossref, https://doi.org/10.14445/22492593/ IJCOT-V3I3P305
Abstract
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, Tor) from further misbehaviour, without compromising their privacy, and while preserving the privacy of all of the non-abusive users. Our system provides a privacy-preserving analog of IP address banning, and is modelled after the well-known Nymble system. Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers. , this hides the user’s identities and IP address from the server. This may be an advantage for the misbehaving users to destroy popular websites. To avoid such activities, servers may try to block the misbehaving user, but it is not possible in case of anonymous networks. In such cases, if the abuser routes through an anonymizing network, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users. To overcome this problem, a nymble system is designed in which servers can blacklist the misbehaving users without compromising their anonymity. This paper explains the idea that the different service providers have different blacklisting policies. For example, Wikipedia might want to block a user one day for the first misbehaviour, one week for the second one, etc. In order to do this, we have to develop a dynamic link ability window whose length can be increased exponentially. Thus, at the start of each linkability window, all service providers must reset their blacklists and forgive all prior misbehavior.
Keywords
Anonymous blacklisting, privacy, revocation, Pseudonymous systems, anonymous credential systems.
References
[1] B. Gedik and L. Liu, “Protecting location privacy with personalized k-anonymity: Architecture and algorithms,” IEEE TMC,vol. 7, no. 1, pp. 1.18, 2008.
[2] C. Cornelius, A. Kapadia, P.P. Tsang, and S.W. Smith, “Nymble: Blocking Misbehaving Users in Anonymizing Networks,” Technical Report TR2008-637, Dartmouth College, Computer Science, Dec. 2008.
[3] J. Feigenbaum, A. Johnson, and P.F. Syverson, “A Model of Onion Routing with Provable Anonymity,” Proc. Conf. Financial Cryptography, Springer, pp. 57-71, 2007.
[4] Johnson, P.C., Kapadia, A., Tsang, P.P., Smith, S.W.: Nymble: Anonymous IP-address blocking. In: Borisov, N., Golle, P. (eds.) Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol. 4776, pp. 113{133. Springer (June 2007)
[5] D. Chaum, “Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms,” Proc. Int’l Conf. Cryptology (AUSCRYPT), Springer, pp. 246-264, 1990.
[6] Holt, J.E., Seamons, K.E.: Nym: Practical pseudonymity for anonymous networks. Internet Security Research Lab Technical Report 2006-4, Brigham Young University, Provo, UT, USA (June 2006)
[7] Lewman, A. handrew@torproject.orgi: Re: Talking w/local service CEOs [LJ, goog...], http://marc.info/?l=tortalk&m=126137307104914&w=2, [Private e-mail message to hgrarpamp@gmail.comi; 21-December2009]
[8]Dingledine, R. harma@freehaven.neti: Re: Banned from Slashdot, http://archives.seul.org/or/talk/Jun2005/msg00002.html, [Private e-mail message to Jamie McCarthy; 01-June-2005]
[9] CmdrTaco: Slashdot FAQ - accounts, http://slashdot.org/faq/accounts.shtml#ac900, [Online; accessed 11-January-2010; modified 02-July-2002]
[10] Brickell, E., Li, J.: Enhanced Privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities. In: Ning, P., Yu, T. (eds.) WPES. pp. 21{30. ACM (2007)