An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks 

Abstract

Concerns about privacy and security have received greater attention with the rapid growth and public acceptance of the Internet and the pervasive deployment of various network technologies. Anonymous network services is a large field of research and development that steadily continues to grow. Several credential systems have been proposed in which users can authenticate to services anonymously. Various anonymous network are readily available such as tor, i2p these allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. But this provision can be utilized both by the genuine users and misbehaving ones alike. Dishonest users take advantage of anonymity for abusive purpose such as website defacing. The administrators of these websites are unable to blacklist such users since their identity is not known. As a result they block the complete network using onion routing to ensure protection to their servers denying anonymous access to genuine and dishonest users alike. To surmount this problem, assuming a tor environment a credential system is proposed which enables the system administrators to detect any malicious activity and further block the malicious user continuing un-interrupted access to genuine users 

Authors and Affiliations

Santhosh S , Asst. Prof Alok Ranjan,

Keywords

Related Articles

Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator  

A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the w...

Overview Of Video Condensation In Streaming Video  

proficient browsing of long video series a main tool in video surveillance. Example: for earlier event video forensics, but can also be used for quick review of moving pictures and home videos. Since there are ma...

Leakage Power Reduction Through Hybrid Multi-Threshold CMOS Stack Technique In Power Gating Switch

In this paper Two Hybrid digital circuit design techniques are produced as Hybrid Multi-Threshold CMOS complete stack technique and Hybrid Multi-Threshold CMOS partial stack technique for reducing the leakage power dissi...

A SURVEY ON ENHANCED APPROACH FOR CATEGORICAL LINK BASED CLUSTERING 

Data clustering is a challenging task in data mining technique. Various clustering algorithms are developed to cluster or categorize the datasets. Many algorithms are used to cluster the categorical data. Some algo...

Design of Area Efficient High Speed Parallel Multiplier Using Low Power Technique on 0.18um technology

Based on the simplification of the addition operations in a low-power bypassing-based multiplier, a low-cost low-power bypassing-based multiplier is proposed. Row-bypassing multiplier, column-bypassing multiplier and bru...

Download PDF file
  • EP ID EP156976
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

Santhosh S, Asst. Prof Alok Ranjan, (2013). An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(3), 1175-1180. https://www.europub.co.uk/articles/-A-156976