International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 9 Issue 2, February 2020

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

The anonymizing network is network which hides the clients IP address from the server by using the sequence of the routers. But users are using this network for defacing the popular websites. Currently these popular website administrator blocks the IP address of the malicious user. But if user is inside the anonymizing network then website administrator will not able to find the IP address of the owner. Then the administrator will block all the existing nodes of the anonymizing network. This will deny the anonymous access to the misbehaving nodes along with users which are not misbehaving. To solve this problem we present the Nymble which will block only those users which are misbehaving inside the network. Also we are maintaining the privacy of those nodes which are behaving maliciously inside the anonymizing network.

Keywords: Onion routing, anonymous blacklisting, privacy, revocation

Edition: Volume 9 Issue 2, February 2020

Pages: 236 - 238


How to Cite this Article?

Anand A. Maha, Jayprakash D. Sonone, "Nymber Server in Anonymizing Network: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20195240, Volume 9 Issue 2, February 2020, 236 - 238

44 PDF Views | 31 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Onion routing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 967 - 970

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 515 - 517

Allowing Genuine Users and Blocking Bad Users in Anonymizing Network: The Nymble

Anand A. Maha, P. B. Kumbarkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 236 - 238

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

Share this article

Similar Articles with Keyword 'anonymous blacklisting'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 515 - 517

Allowing Genuine Users and Blocking Bad Users in Anonymizing Network: The Nymble

Anand A. Maha, P. B. Kumbarkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 236 - 238

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

Share this article

Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1483 - 1486

A Study of Differentially Private Frequent Itemset Mining

Trupti Kenekar, A. R. Dani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 751 - 753

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar

Share this article

Similar Articles with Keyword 'revocation'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1182 - 1185

Implementation of Robust Multi Owner Multi Group Data Security Algorithm for Cloud Environment

Charanraj B R, K.R. Shylaja, Ravinandan M E

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2319 - 2324

Public Integrity Checking for Dynamic Data Sharing among Multi Groups

Athulya Prabhakaran, Nithya VP

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this article

Top