Restricting Mischievous Users in Anonymizing Networks G.Ramya ,Ms.VijiAmuthaMary

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
Restricting Mischievous Users in Anonymizing
Networks
G.Ramya1,Ms.VijiAmuthaMary2
M.E Computer Science and Engineering1, Faculty of Computer science2, Sathyabama University1, Sathyabama University2,
Chennai-600119, India
Abstract: Tor is a form of network comprised of indirect
tunnels that allows users and groups to improve their
seclusion and security on the Internet. Individuals use
Tor network to keep websites from tracking them. Then
website Administrators blocks entire network which is
connected to the abusive system to get rid of the
intruder. Hence, good users also get blocked due to this
action. So a Nymble system is developed in which
servers can “blacklist” unrefined users without
affecting good users and also sustaining secrecy across
the network. Even though Nymble System was useful
in syncing target servers with the system for an effective
reporting and countering mechanisms, it has a huge
computation overhead. So the proposed system tweak
Nymble allows users to access Internet services
privately by using a sequence of servers and proxy
repositories to hide the client’s IP address from the
target servers instead of the numerous routers based IP
hiding approach of preceding systems. These methods
ensure that the number of algorithms to sync target
servers with Nymble system is not beyond 10 thus
sinking the computation overhead. By revoking a user
for a period of time spanning multiple linkability
windows. This gives service providers more flexibility in
deciding how long to block individual users.
name. In our proposed work to do that, it requires some
changes in the design of PM. The new pseudonym
procedure needs two rounds of communication linking the
user and set of Pseudonym Managers: In the first round, the
user must prefer a random PM and connect to it directly to
demand the codename, which is a pseudonym of user’s IP
address.
A request is valid if the user IP address does not
come from a known anonymzing network and it has not
been used prior to obtaining a codename in this likability
window. The user prefers another random PM in the
second round of the pseudonym registration. The user
connects to that PM using an anonymizing network and
sends (codename, σ) pair to him. After obtaining the pair
and verifying the ring signature
the PM issues a
pseudonym that the user can use it to connect to the
Nymble Managers.if Nymble Manager goes out of service
for any reason like a a DoS attack or system crash, new
users cannot subscribe into the system and service
providers cannot extract linking token of disobedient users.
So we need more than one nymble manager
II.
Keywords: Anonymity, Pseudonymity, Unobservability,
Unlinkability
I.
INTRODUCTION
Anonymizing networks such as Crowds and Tor
direct traffic through independent nodes in detach
administrative domains to hide the originating IP address.
Anonymizing networks allows users to access Internet
services privately by using a sequence of routers to hide the
client’s IP address from the server.. Nymble system
provides all the following properties that are vital character
for successful flow of anonymization services, anonymous
authentication, backward unlinkability, biased blacklisting,
fast authentication speeds, the rate-limited anonymous
connections, and revocation auditability. Pseudonymity
means using a pseudonym as a substitute of one’s “real”
ISSN: 2231-5381
RELATED WORK:
Some of the authors of the Nymble system tried to
eliminate the role of a trusted third party (TTP). They
developed an anonymous credential system called BLAC
using a signature proof of knowledge (SPK) scheme. In this
system there is an entity called Group Manager (GM) who
is responsible for issuing credential for users. This entity
should not be considered a TTP since GM does not know
the credential of a user and hence can’t revoke user’s
privacy
In 1991, Chaum and van Heyst proposed group
signatures, wherein each member of a group can sign any
message on behalf of the group. Anyone can verify a group
signature using the group’s public key, but only a special
entity known as the Revocation Manager (RM) can
http://www.ijettjournal.org
Page 88
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
determine which group member produced a particular
group signature
IV.
PROPOSED SYSTEM:
Tsang et al proposed Blacklistable Anonymous
Credentials (BLAC) in the following year. BLAC removes
the trust assumptions from Nymble by eliminating the role
of the NM entirely. Similar to the work of Brands et al.
authentication with an SP in BLAC requires User to prove
that her credential is not present on a blacklist of revoked
credentials.
Some users all the time look to behave badly with
servers, there major objective is to make the server down.
The trouble with nymble is nymble manager blacklists a
user for one likability window (i.e.1 day), on the other day
again user can misbehave with same server or other server.
User can continue it as his everyday activity as Nymble
manager doesn’t have any means to identify such type of
users while preserving anonymity.
Schwartz et al. proposed contract-based revocation.
They leverage ideas from trusted computing to construct a
contract-based revocation system, called RECAP, using
group signatures as the underlying primitive. In particular,
they use remote attestation to allow User to confirm that
the software running on the RM will only deanonymize
user in the event that user violates a pre-agreed-upon
convention
Solution to this problem is, Pseudo Tracker is
developed as part of Pseudonym Manager in our tweak
Nymble System. Pseudo tracker contains identity
information of the user and Rating. A user registered
recently is highly rated. This rating is used to track the
users. If a user misbehaves with a server then the server
complaints to Nymble Manager (NM). NM Complaints the
picky Pseudonym to Pseudonym Manager.
Pseudo tracker
Lin and Hopper proposed Jack in late 2010. Jack
builds on the Nymble framework to weaken Nymble’s trust
assumptions. It reduces the level of trust in the VI (called
the Credential Manager (CM) in that scheme) by
eliminating the link between User’s actual identity and her
nymbles. User’s Nym (we revert to this terminology since a
pseudonym in Jack is decidedly not a verinym) in Jack is
instead based on user-chosen randomness; thus, the ZKverinym property is easily satisfied
rating
System setup
Pseudonym
manager
Sends blacklisted users
Nymble
manager
Credential Acquisition
connects
blacklist
Update
Tor network
III.
EXISTING SYSTEM:
Nymble connection
Nymble utilizes two trusted third parties (TTPs)
called the Pseudonym Manager (PM) and the Nymble
Manager (NM).The PM is in charge for combining a user's
IP address with the pseudonym deterministically generated
based on the user's IP address. The NM pairs a user's
pseudonym with the end server. Only if the two managers
are not colluding with each other, the user's connections
remain anonymous to the PM, pseudonymous to the NM
and anonymous to servers that the user connects to.. To do
this user must first connect openly with the PM before
receiving the pseudonym. The PM's one and only
responsibility it to map IP addresses to the pseudonyms.
User then connects to the NM through Tor network
presenting the pseudonym and destined server. The NM
does not know that the IP address of the user, but the
pseudonym provided by the PM guarantees that some
distinctive IP address maps to the pseudonym. User
receives a set of nymble tickets as credential for the end
server. In Existing Nymble no technique to track such users
because of the backward Unlinkability.
ISSN: 2231-5381
user gets another server connection
Server 1
Server 2
Figure 1: The Extended Nymble system
architecture
showing the various modes of Interaction. Note thatusers
interact with the NM and servers though the anonymizing
network
V.
PSEUDO TRACKER BASED
TRACKING:
Pseudo Tracker is developed (as shown in Fig 1) as
part of Pseudonym Manager in our tweak Nymble System.
Pseudo tracker contains identity information of the user and
Rating. A user registered recently is highly rated. This
rating is used to track the users. If a user misbehaves with a
http://www.ijettjournal.org
Page 89
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
server then the server complaints to Nymble Manager
(NM). NM Complaints the particular Pseudonym to
Pseudonym Manager.Pseudonym Manager sends this
information to Pseudo Tracker, where the rating of
misbehaving user decline depending on no of times user
misbehaved. NM uses rating to blacklist a user for many
linkability windows.
VI.
NYMBLE MANAGER:
After obtaining a pseudonym from the PM, the user
connects to the Nymble Manager (NM) throughout the
anonymizing network, and requests nymbles for access to a
scrupulous server (such asWikipedia). A user’s wishes to
the NM are therefore pseudonymous, and nymbles are
generated using the user’s pseudonym and the server’s
identity. These nymbles are specific to a particular userserver pair. However as long as the PM and the NM do not
get together the Nymble system cannot identify which user
is connecting to what server; the NM knows only the
pseudonym-server pair, and the PM knows only the user
identity-pseudonym pair.
VII.
users through the signature. Drawbacks of Traceable
Signature involve these signatures are traceable and
whenever a user misuses his facilities the manager steps in
and traces the history of the user by the signature.
SECURE CONNECTION :
To provide the requisite cryptographic protection and
security properties, the NM encapsulates nymbles within
nymble tickets. Servers wrap seeds into linking tokens, and
therefore, linking tokens being used to link future nymble
tickets. Whenever a user is blacklisted the pseudonym of
the particular user is send to PM and user gets connected to
another server.
Algorithm 1: NMVerifyPseudonym
Input: {pnym,w}
Output: {true or false}
1 Extract verifyKeyPM1…n from keys in nmState
2 (nym,σnym) := pnym
3 return σnym == RingSig:Verify(nym|| || w,
verifyKeyPM1…n)
Traceable Signatures
In this mechanism, the data can now be signed
like the documents of paper. The electronic signatures [10]
can be assigned to each user to put them on their messages
instead of names and the encoded message will also
contain their signature so the receiver will have the
authentication about the sender without knowing the IP
address of the user or any other identity related information
about him. On the other hand there are group signatures too
which a group or a network can use to identify itself and its
ISSN: 2231-5381
Table 1. Who trusts whom to be how for what guarantee
Cryptographic primitives
Nymble uses the subsequent edifice blocks
i.
Secure cryptographic hash functions. These are
oneway and collision-resistant functions that
resemble random oracles. Denote the range of the
hash functions by H.
ii.
Secure message authentication (MA). These
consist of the key generation (MA.KeyGen), and
the message authentication code (MAC)
computation (MA.Mac) algorithms. Denote the
domain of MACs by M.
iii.
Secure symmetric-key encryption (Enc). These
consist of the key generation (Enc.KeyGen),
encryption (Enc.Encrypt), and decryption
(Enc.Decrypt) algorithms. Denote the domain of
ciphertexts by!
iv.
Secure digital signatures (Sig). These consist of
the key generation (Sig.KeyGen), signing
(Sig.Sign), and verification
v.
(Sig.Verify) algorithms. Denote the domain of
signatures.
VIII.
TIME
While a user’s access within a time period is tied to a single
nymble ticket, the use of different nymble tickets across
time periods grants the user anonymity between time
periods. Smaller time periods provide users with higher
rates of anonymous authentication, whilelonger time
periods allow servers to rate-limit the number of
misbehaviors from a particular user before he or she is
blocked. For example, T could be set to five minutes,
andW to one day (and thus, L ¼ 288). The linkability
window allows for dynamism since resources such as IP
addresses can get reassigned
http://www.ijettjournal.org
Page 90
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
IX.
DATASTRUCTURES AND MODULES
Nymble uses several important data structures,
and we divide them into the following 4 modules:
Module 1: Generation of pseudonym
The PM issues pseudonyms to users. A pseudonym pnym
has two components nym and mac: nym is a pseudorandom
X.
PERFORMANCE ANALYSIS :
Multiple Link ability: With multiple likability
windows, Nymble construction still has Accountability and
also Nonframeability because each ticket is valid for and
only for a specific linkability window; it still has
Anonymity because pseudonyms are an output of a
collision-resistant function that takes the likability window
as input
Fig 2. Evolution of seeds and nymbles. Given seedsi.
it is easy to Compute nymblei, nymblei+1..nymbleL, but
not nymble*, nymblei……., nymblei-1.mapping of the
user’s identity (e.g., IP address),7 the linkability window w
for which the pseudonym is suitable, and the PM’s secret
key nymKeyP ; mac is a MAC that the NM uses to verify
the integrity of the pseudonym.
Algorithm. PMCreatePseudonym
Input: (uid,w) € H * _
Persistent state: pmState € Sp
Output: pnym € P
1: Extract nymKeyP ; macKeyNP from pmState
2: nym :¼ MA:Mac(uid||w, nymKeyP )
3: mac :¼ MA:Mac(nym||w, macKeyNP)
4: return pnym :¼ (nym, mac)
Module 2: Generation of nymble
Nymble, a pseudorandom number, acts the role of an
identifier for a particular time period. Nymbles (presented
by a user) across periods are unlinkable unless a server has
blacklisted that user. Nymbles are presented as part of a
nymble ticket, as described next. The seed for the next time
period (seednext) is computed from the seed for the current
time period (seedcur) as seednext ¼ f(seedcur):
Algorithm: NMVerifyTicket
Input: (sid, t, w,ticket) € H * _2 * T
Persistent state: svrState
Output: b € (true; false)
1: Extract macKeyN from keys in nmState
2: (. , nymble, ctxt, macN, macNS ) := ticket
3: content := sid||t||w||nymble||ctxt
4: return macN =? MA:Mac(content, macKeyN)
ISSN: 2231-5381
Figure 3: Comparison results with pseudo
with time efficiency results.
.
frames
As shown in the above figure similarity results of
each Nymble client associated with Nymble server is
obtainable in the component process of the anonymizer
network for individual progress of each client results with
time comparison.
Blacklist Ability: An honest PM and NM will issue a
alliance of unique users at most valid credentials for a
given server. Nymble Manager can issue valid tickets, and
for any given time period, the coalition has at most valid
tickets, thus making at most connections in any time period
irrespective of server’s blacklisting. It is enough to show
that if each of the users has been blacklisted in some
previous time period, the alliance cannot authenticate in the
time period.
XI.
IMPLEMENTATION AND
EXPERIMENTAL SETUP:
Network simulator tool can be used to implement the
above system due to its in built properties and
characteristics. Assume that the PM and NM will not be
compromised at any cost. The PM and NM can be
implemented as hosts or servers. In this system PM and
NM are to be implemented as servers. The system requires
2.2GHz Intel Pentium Dual-Core with 4GB RAM
http://www.ijettjournal.org
Page 91
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
XII.
CONCLUSION:
We have proposed a comprehensive credential system
called tweak Nymble, which can be used to add a layer of
accountability to any publicly known anonymizing
network. Servers can blacklist misbehaving users for a
period of time while maintaining their privacy, and it is
seen how these properties can be attained in a way that is
practical, efficient, and sensitive to needs of both users and
services. Hope that this proposed work will increase the
mainstream taking of anonymizing networks such as Tor,
which has thus far been completely blocked by several
services because of users who abuse their anonymity.
ACKNOWLEDGMENT
We would like to thank Dr.B.Bharathi, Head of the
Department, Department of Computer Science and
Engineering and MS.VijiAmuthaMary for her all
encouragement and support.
REFERENCES:
1.
Patrick P. Tsang, Apu Kapadia, Member, IEEE, Cory
Cornelius, and Sean W. Smith “Nymble: Blocking
Misbehaving Users in Anonymizing Networks” IEEE
transactions on
dependable and secure computing, vol. 8,
no. 2, march-April 2011.
2.
D. Chaum and E. van Heyst, “Group Signatures,” Proc. Int’l
Conf. Theory and Application of Cryptographic Techniques
(EUROCRYPT), pp. 257-265, 1991
3.
Edward J. Schwartz. Contractual Anonymity. Master’s
thesis, Carnegie Mellon University,The Information
Networking Institute, Pittsburgh, Pennsylvania, USA, May
2009.
4.
Zi Lin and Nick Hopper. Jack: Scalable Accumulator-based
Nymble System. In Keith Frikken, editor, Proceedings of
WPES 2010, pages 53–62. Association for Computing
Machinery (ACM) Press, New York, NY, USA, October
2010.
5.
Jason E. Holt and Kent E. Seamons. Nym: Practical
Pseudonymity for Anonymous Networks. Technical Report
2006-4, Brigham Young University, Internet Security
Research Lab, Provo, Utah, USA, June 2006.
6.
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The
Second-Generation Onion Router. In Usenix Security
Symposium, pages 303–320, Aug. 2004
ISSN: 2231-5381
http://www.ijettjournal.org
Page 92
Download