A Security Design combining the advantages of Cryptanalysis and Anonymous routing protocol to achieve data secrecy and anonymity

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2012 by IJCTT Journal
Volume-3 Issue-2                           
Year of Publication : 2012
Authors :Varsha Waingankar, Swetha S

MLA

Varsha Waingankar, Swetha S"A Security Design combining the advantages of Cryptanalysis and Anonymous routing protocol to achieve data secrecy and anonymity"International Journal of Computer Trends and Technology (IJCTT),V3(2):247-252 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Since internet is widely used these days , users privacy has become the main concern. Privacy is related to anonymity .Basic requirement for anonymity is to unlink the user’s identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made use of such as identity based cryptography, blind messages, pseudonyms and ticket based protocol. But only the use of cryptography will not provide with the existence of confidential communication so anonymous routing protocol used along with cryptography helps to achieve better anonymity. With the use of anonymous routing protocol multiple packets cannot be linked to have originated from the same client . Hence the real network identity will be concealed making it difficult to find the client and the confidential relationship between the parties involved in communication.

References-

[1] Jinyuan Sun, Member, IEEE, Chi Zhang, Student Member, IEEE, Yanchao Zhang, Member, IEEE, and Yuguang Fang, Fellow, IEEE “SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
[2] On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems . Matthew Edman ACM Journal Name, Vol. V, No. N, Month 2008, Pages 1{39.
[3] Attacks on Anonymity Systems: The Theory Roger Dingledine http://freehaven.net/
[4] R Dingledine, N Mathewson, and P Syverson. Tor: The Second Generation Onion Router. InProceedings of the 13th USENIX Security Symposium, pages 303–320, August 2004
[5] Michael G. Reed, Paul F. Syverson, David M. Goldschlag. “Proxies for anonymous Routing”. Naval Research Laboratory, Washington DC.
[6]TARo: Trusted Anonymous Routing for MANETs Jiefeng (Terence) Chen National ICT Australia Roksana Boreli ,National ICT Australia , Vijay Sivaraman School of Electrical Engineering and Telecommunications , University of New South Wales , Australia.

Keywords —anonymity, privacy, routing protocol, onion routing, cryptography, and pseudonym.