IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 349-353

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Differentiating Legitimate and illegitimate users in an anonymizing network Priyanka Raj Pursuing M.Tech in Computer Science and engineering K.L.E.Society’s College of Engineering and Technology Udyambag , Belgaum-590008 [email protected]

Prof .U S Somnati Professor Computer Science and Engineering K.L.E.Society’s College of Engineering and Technology Udyambag,Belgaum-590008 [email protected] Abstract—There are many anonymizing networks were series of routers are used to hide the clients IP address from the server. When misbehaving users are encountered usually IP address are used to block and disable access but it is not practical in an anonymizing network, Hence administrators block all exit nodes of anonymizing network, denying access to both behaving and misbehaving users. To address this problem a system called Nymble is proposed where server can blacklist misbehaving users without compromising with their anonymity, different servers have their own definition of misbehavior , the privacy of blacklisted users are maintained. IndexTerms—Anonymousblacklisting,privacy,revocation,Rate-limiting, non-frameability.

1. Introduction Anonymizing network such as Tor,***,etc. make use of independent nodes to route traffic in order to hide the IP address of the client. Unfortunately some users have Misused such anonymizing network. Due to the advantage of anonymity users started defacing popular websites. Some of the malicious activity that has been found in an anonymizing network are (eg : whistle-blowing, reporting, anonymous tip lines, activism and soon )Website administrators could not blacklist individual users IP address hence they started to blacklist the entire anonymizing network. This might eliminate malicious activity in an anonymizing network but at the cost of denying anonymous access to behaving users.

2. An Overview to Nymble Nymble is a secure system which can be used by the servers or the web-site administrators to distinguish between the behaving and misbehaving users, hence being fair for the genuine users, and also by the users to keep their identity hidden therefore able to maintain anonymity. Nymble can provide the following properties: anonymous authentication, backward unlinkability, fast authentication speed, rate-limited anonymous connection, revocation auditability. In Nymble , users can acquire an ordered collection of nymbles or a special type of pseudonym which is used to connect to the websites. Each time a user logs in to access a website, the nymble provided to the user has to be submitted to the website or the server.

Priyanka Raj,IJRIT

349

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 349-353

When websites would want to blacklist the users they can do this by obtaining a seed for a particular nymble, allowing them to link future nymbles from the same user, but those nymble used before complain remains unlinkable. Our system ensures that users are aware of their blacklist status before the present a nymble,and disconnect immediately if they are blacklisted. Our system provides backward unlinkability i.e the users are observed only after the complaint and those nymbles provided by the users after the complaint are kept track of and they are linkable, but the previous access to the website before the complaint is not known hence ensuring backward unlinkability. A property called subjective blacklisting where different servers will have their own reasons to blacklist a user because they have their own definations for misbehavior hence subjective blacklisting is with respect to each individual server.

3. Literature survey Earlier there where many systems which were used in an anonymizing network to solve this problem some of them were Pseudonymmous credential system, In this system the users who want to access the organization must prove to the organization that he/she is a valid user, The user should provide his identity to the Certificate Authority(CA). Users secret key and the master key is submitted to CA. The users identity is not known to the organization. If the user cheats , then the identity of the user is disclosed. Sometimes the Credential forgery happens where the attacker misuses the credential which was issued for some other user. The anonymous credential system, where the user is unknown or anonymous. The user can get credential by authenticating themselves to the organization, group signature is used where a group may have many members, If a member signs a message using the secret key, Other members can verify it by using the public key, But the identity of the member is not revealed. The group manager to whom the member who has signed the message and the identity of that member is known. Group manager is incharge of adding or removing members from the group, all members are issued the revoking group membership certificate. The Verifier local Revocation system where the revocation list (RL) is provided to the signature verification algorithm, For each signature in the revocation list a Token is assigned for each revoked user. The algorithm accepts all unrevoked users and their signs. If the user tries to again revoke by token added to the RL, signature is no longer accepted.

4. Resource based blocking Nymble helps in limiting the number of identities a user can obtain for example the Sybil attack. Sybil attack is one where the attackers can forgery the identities in a peer to peer network, A node in a network claims multiple identities but doing this attackers can steal information or can disrupt the communication, since the IP address keeps changing its difficult to know which node it is. Resource testing : To protect the node or the certificate authority resource testing scans the computing power, storage space, network bandwidth and other parameters to determine if collection is from a single Sybil-attacking computer or series of true identity.

5. The Pseudonym Manager Pseudonym manager is one of the module in the nymble system where, users have to contact the pseudonym manager and provide the control over the resource to the pseudonym manager. The user can communicate and connect with the pseudonym manager directly(i.e. not throught the anonymizing network). Pseudonym manager provides the pseudonym to the user who registers into the PM. Ensuring that the same pseudonym is always issued for the same resource. The users need not disclose which server it intends to connect. Pseudonym managers duty is limited to map the IP address to the pseudonyms. The user contacts the pseudonym manager once per linkability window (e.g. once a day).

6. The Nymble Manager After obtaining the pseudonym from PM, the user connects to the nymble manager (NM) through the anonymizing network, and request for nymbles for access to a particular server. The users must provide their pseudonym to the NM and for this nymbles are generated by the given pseudonyms and the servers identity. The nymbles are thus particular for a user-server pair. Nymble system cannot identify which user is connecting to what

Priyanka Raj,IJRIT

350

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 349-353

server, nymble manager only knows the pseudonym-server pair and the PM only knows the user identity-pseudonym pair. To provide security NM encapsulates nymbles within nymble tickets. Servers wrap seeds into linking tokens, which are used for linking future nymble tickets

7. Time and Blacklisting a User Nymble tickets are bound to specific time period. In Fig 2 Time is divided into linkability window of duration W, where each of it is split to into L time periods of duration T(i.e. W= L * T). considering time period as t1,t2,t3,…tL, and windows w1,w2,w3…etc. . Fig 1: The lifecycle of misbehaving users.

While users access with in a time period is tied to a single nymble ticket, the use of nymble tickets across time period grants user anonymity between time periods. Smaller time periods provide users with higher rates of anonymous authentication, while longer time periods allow servers to rate-limit the number of misbehaviours from a particular user before he or she is blocked. For example. T could be set to five mins and W to one day. The linkability window the resources such as IP address can get reassigned and it is undesirable to blacklist such resource indefinitely, and it ensures forgivness of misbehavior after a certain period of time. In Fig1 A user connects and misbehaves at a server during time period t* within the linkability window w*, the server detects the misbehavior and complaints to NM in time period tc of same linkability window w*. The server presents the nymble ticket of misbehaving users and obtain and obtains the corresponding seeds fron NM, the server is able to link future connections by users in time period upto tl, the users connection is unlinkable for the rest of the day. Even though misbehaving users can be blocked from making connections remain unlinkable, thus providing backward unlinkability and subjective blacklisting.

8. Notifying the user of blacklist status If a server obtains a seed for that user, however, it can link that users subsequent connections. Users be notified of their blacklist status before they present a nymble ticket to a server, the user can download the servers blacklist and verify her status. If blacklisted the users disconnects immediately. NM issues lightweight dasies to servers as proof of a blacklist freshness, thus making blacklist updates highly efficient.

9. Blacklist ability Assures that any honest server can indeed block misbehaving users. Specially, if an honest server complains about a user that misbehaved in current linkability window, the complain will be successful and the user will not be able to “nymble-connect”, i.e., establish a Nymble-authentication connection, to the server successfully in subsequent time periods of linkability window. Rate-limiting A honest server is assured that no user can successfully nymble-connect to it more than once within any single time period. Nonframeability

Priyanka Raj,IJRIT

351

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 349-353

A honest user who is legitimate with respect to the server can nymble connect to the server, since users will have a single unique identity, hence the attacker cannot blacklist a legitimate user for someone elses misbehavior. A user is legitimate according to a server if she has not been blacklisted by the server and has not exceeded the rate limit of establishing nymble connection. Honest servers must be able to differentiate between legitimate and illegitimate users. Anonymity The users anonymity is protected regardless of their legitimacy according to the user server cannot learn any more information beyond the user behind a nymble connection is lrgitimate or illegitimate.

Fig 2: who trusts whom to be how for what guarantee 10. Trust assumptions Their might exist a corrupt user or even a corrupt server but nymble must attain its goal under such circumstance, in Fig 2 where the table shows who must trust on whom and to be how for what guarantee. For example, a corrupt PM or NM can violate Blacklistability by issuing different pseudonyms or credentials to blacklisted users. A dishonest PM (resp., NM) can frame a user by issuing her the pseudonym (resp., credential) of another user who has already been blacklisted. To undermine the Anonymity of a user, a dishonest PM (resp., NM) can first impersonate the user by cloning her pseudonym (resp., credential) and then attempt to authenticate to a server—a successful attempt reveals that the user has already made a connection to the server during the time period. Moreover, by studying the complaint log, a curious NM can deduce that a user has connected more than once if she has been complained about two or more times. As already described in Section 2.3, the user must trust that at least the NM or PM is honest to keep the user and server identity pair private.

11. Summary of updates to te Nymble protocol Users are now either legitimate or illegitimate, and are anonymous within these sets (see Section 3). This redefinition affects how a user establishes a “Nymble connection” and now prevents the server from distinguishing between users who have already connected in the same time period and those who are blacklisted, resulting in larger anonymity sets. servers obtain proofs of freshness every time period, and users directly verify the freshness of blacklists upon download. Based on a hashchain approach, the NM issues lightweight daisies to servers as proof of a blacklist’s freshness, thus making blacklist updates highly efficient.

Fig 3: evolution of seeds and nymbles

Priyanka Raj,IJRIT

352

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 349-353

12. Evolutions of seeds and nymbles Nymble Manager on receving the pseudonym from the user whould return back a nymble ticket which includes nymble encapsulated in nymble ticket. If a user misbehaves say the the server will complaint to the nymble manager and obtain the seed from NM, thus on receving the seed server can map future connection request from the same user by computing nymbles form each seed obtained.

13. Acknowledgment The authors would like to acknowledge and thank Technical Education Quality Improvement Programme [TEQIP] KLE College of Engineering and SPFU [State Project Facilitation Unit], Karnataka for supporting the research work.

14. References [1] A. Kiayias, Y. Tsiounis, and M. Yung, “Traceable Signatures,” Proc. Int’l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), Springer, pp. 571-589, 2004. [2] I. Teranishi, J. Furukawa, and K. Sako, “k-Times Anonymous Authentication (Extended Abstract),” Proc. Int’l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), Springer, pp. 308-322, 2004. [3] A. Kiayias, Y. Tsiounis, and M. Yung, “Traceable Signatures,” Proc. Int’l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), Springer, pp. 571-589, 2004. [4] T. Nakanishi and N. Funabiki, “Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps,” Proc. Int’l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), Springer, pp. 533-548, 2005. [5] L. Nguyen, “Accumulators from Bilinear Pairings and Applications,” Proc. Cryptographer’s Track at RSA Conf. (CT-RSA), Springer, pp. 275-292, 2005. [6] M. Bellare, H. Shi, and C. Zhang, “Foundations of Group Signatures: The Case of Dynamic Groups,” Proc. Cryptographer’s Track at RSA Conf. (CT-RSA), Springer, pp. 136-153, 2005 [7] B.N. Levine, C. Shields, and N.B. Margolin, “A Survey of Solutions to the Sybil Attack,” Technical Report 2006-052, Univ. of Massachusetts, Oct. 2006. [8] P.P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, “Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 7281, 2007. [9] C. Cornelius, A. Kapadia, P.P. Tsang, and S.W. Smith, “Nymble: Blocking Misbehaving Users in Anonymizing Networks,” Technical Report TR2008-637, Dartmouth College, Computer Science, Dec. 2008. [10] P.P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, “PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication,” Proc. ACM Conf. Computer and Comm. Security, pp. 333-334 2008

Priyanka Raj,IJRIT

353

Differentiating Legitimate and illegitimate users in an ...

Cryptographer's Track at RSA Conf. (CT-RSA), Springer, pp. 275-292, 2005. [6] M. Bellare, H. Shi, and C. Zhang, “Foundations of Group Signatures: The Case of ...

732KB Sizes 1 Downloads 151 Views

Recommend Documents

Differentiating Legitimate and illegitimate users in an anonymizing ...
Professor Computer Science and Engineering. K.L.E.Society's College of Engineering and Technology. Udyambag,Belgaum-590008 [email protected]. Abstract—There are many anonymizing networks were series of routers are used to hide the clients IP ad

Illegitimate son.pdf
rep.by its General Manager V.Murugesan. No.1, Pumping Station Road. Chintadripet, Chennai 600 002 .. Appellant. -vs- V.Sureshbabu .. Respondent.

DIFFERENTIATING SKILL AND LUCK Abstract: In this paper, we ...
up incorrectly these competitions may do more harm than good. If the prize ... Adverse effects only occur if the best competitor is truly a “superstar”. The “calling it ...

DIFFERENTIATING SKILL AND LUCK Abstract: In this paper, we ...
strategy for the disadvantaged player is to randomly choose between putting in effort and .... A big game. The four corners offense, and specifically the 1982 ACC ...

Legitimate Parental Partiality1
two (or just any other small number) would suffice to protect the ability of .... not, indeed should not, be in the business of continually judging whether or not ..... Stone, Family, Sex and Marriage in England 1500-1800 (London: Penguin, 1979).

Compulsive behavior in tobacco users
with the degree of impairment (Spinella, 2003, 2002). OCD is ... for obsessions (Y-BOCS-O), compulsions (Y-BOCS-C), and the total score (Y-BOCS-T). 2.2.2.

Legitimate Robbery (backpage).pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Ebook Situated Learning: Legitimate Peripheral ...
... won’t allow us The Walt Disney Company is facing a lawsuit alleging it violated federal law aimed at protecting children’s online privacy The company ...

Perceiving and rendering users in a 3D interaction - CiteSeerX
Abstract. In a computer supported distant collaboration, communication .... number of degrees of freedom, variations in the proportions of the human body and.

Perceiving and rendering users in a 3D interaction - CiteSeerX
wireless pen system [5]. The virtual rendering can be close ..... Information Processing Systems, MIT Press, Cambridge, MA, pp. 329–336 (2004). 18. Urtasun, R.

Learning to Recognize Reliable Users and Content in ...
Figure 1: Network of interactions in CQA connect- ing users, questions and answers ... service, but did not take quality of answers into considera- tion. Su et al.

Compulsive behavior in tobacco users
to nonusers, which was not due to demographic influences or use of other psychoactive drugs. Both the ... toms, which persisted after controlling for demographics and other DUFs [r(157)=.17, P=.028. (two-tailed ... Brody, A. L., Mandelkern, M. A., Lo

Differentiating Anxiety and Depression: A Test of the ...
Journal of Abnormal Psychology. 1987, Vol. 96, No. ... University of Pennsylvania Medical School ... School of Osteopathic Medicine .... criminant program (SPSS, 1983). ..... Tuma & J. D. Maser, (Eds.), Anxiety and the anxiety disorders (pp.