International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Review Papers | Computer Science & Engineering | India | Volume 9 Issue 2, February 2020

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

The anonymizing network is network which hides the clients IP address from the server by using the sequence of the routers. But users are using this network for defacing the popular websites. Currently these popular website administrator blocks the IP address of the malicious user. But if user is inside the anonymizing network then website administrator will not able to find the IP address of the owner. Then the administrator will block all the existing nodes of the anonymizing network. This will deny the anonymous access to the misbehaving nodes along with users which are not misbehaving. To solve this problem we present the Nymble which will block only those users which are misbehaving inside the network. Also we are maintaining the privacy of those nodes which are behaving maliciously inside the anonymizing network.

Keywords: Onion routing, anonymous blacklisting, privacy, revocation

Edition: Volume 9 Issue 2, February 2020

Pages: 236 - 238

Share this Article

How to Cite this Article?

Anand A. Maha, Jayprakash D. Sonone, "Nymber Server in Anonymizing Network: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20195240, Volume 9 Issue 2, February 2020, 236 - 238

75 PDF Views | 69 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'Onion routing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 967 - 970

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 236 - 238

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 515 - 517

Allowing Genuine Users and Blocking Bad Users in Anonymizing Network: The Nymble

Anand A. Maha, P. B. Kumbarkar

Share this Article

Similar Articles with Keyword 'anonymous blacklisting'

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 236 - 238

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 515 - 517

Allowing Genuine Users and Blocking Bad Users in Anonymizing Network: The Nymble

Anand A. Maha, P. B. Kumbarkar

Share this Article

Similar Articles with Keyword 'privacy'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 751 - 753

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2383 - 2384

Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey

Prerana Deokar, Praveen Barapatre

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1587 - 1591

Layers of Internet Privacy

Amit Dabas, Ashish Kumar Sharma

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 487 - 491

Policy based Collaborative Tagging for Privacy Protection

Benazeer Inamdar, Gyankamal Chhajed

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Similar Articles with Keyword 'revocation'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2319 - 2324

Public Integrity Checking for Dynamic Data Sharing among Multi Groups

Athulya Prabhakaran, Nithya VP

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2579 - 2581

Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes

Sumedha Tathavadekar, Vikas Maral

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1877 - 1881

Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption

Aakanksha Maliye, Sarita Patil

Share this Article



Top