nymble blocking system_need

21
1

Upload: manzeer-fasaludeen

Post on 27-Oct-2014

131 views

Category:

Documents


1 download

DESCRIPTION

This is a presentation for seminar for B.Tech. This paper is a IEEE topic

TRANSCRIPT

Page 1: Nymble Blocking System_need

1

Page 2: Nymble Blocking System_need

2

Page 3: Nymble Blocking System_need

Introduction Nymble Properties The Nymble System Security Model Disadvantages Conclusion

3Nymble Blocking System

Page 4: Nymble Blocking System_need

Anonymous network eg: Tor

IP hiding facilities Users misuses this network for abuse They deface popular websites Websites cannot blacklist individual malicious

users IP address They blacklist entire anonymizing network

4Nymble Blocking System

Page 5: Nymble Blocking System_need

In pseudonymous credential systems Users are added to a blacklist This weakens the anonymity

In anonymous credential system Group signatures Lacks scalability

5Nymble Blocking System

Page 6: Nymble Blocking System_need

Nymble is a system that allows websites to selectively blacklist users of anonymizing networks such as Tor without knowing the user's IP-address. Users not on the blacklist enjoy anonymity while blacklisted users are not allowed future connections for a duration of time while their previous connections remain unlinkable. Since Nymble allows websites to blacklist anonymious users of their choice, and since users are notified of their blacklist status, Nymble gives websites the power to define their own definition of "misbehavior"

Nymble Blocking System 6

Page 7: Nymble Blocking System_need

Properties

Anonymous Authentication

Backward Unlinkability

Subjective Blacklisting

7Nymble Blocking System

Page 8: Nymble Blocking System_need

Fast Authentication Speeds

Rate-Limited Anonymous Connections

Revocation Auditability

Sybil attack

Nymble Blocking System 8

Page 9: Nymble Blocking System_need

In Nymble, users acquire an ordered collection of nymbles, a special type of pseudonym, to connect to Websites. Without additional information, these nymbles are computationally hard to link,4 and hence, using the stream of nymbles simulates anonymous access to services. Web sites, however, can blacklist users by obtaining a seed for a particular nymble, allowing them to link future nymbles from the same user—those used before the complaint remain unlinkable. Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously.

9Nymble Blocking System

Page 10: Nymble Blocking System_need

10Nymble Blocking System

Fig. The Nymble system architecture showing the various modes of interaction

Page 11: Nymble Blocking System_need

Resource-Based Blocking   To limit the Sybil attack the Nymble

system binds nymbles to resources that are sufficiently difficult

to obtain in great numbers.

11Nymble Blocking System

Page 12: Nymble Blocking System_need

The Pseudonym Manager The Nymble Manager   Blacklisting a User

12Nymble Blocking System

Page 13: Nymble Blocking System_need

13Nymble Blocking System

Page 14: Nymble Blocking System_need

Notifying the User of Blacklist Status

14Nymble Blocking System

Page 15: Nymble Blocking System_need

Nymble aims for four security goals.     Blacklistability Rate-limiting assures Nonframeability Anonymity

15Nymble Blocking System

Page 16: Nymble Blocking System_need

Nymble Blocking System 16

Page 17: Nymble Blocking System_need

Nymble is comprehensive credential system. Add a layer of accountability to any publicly known

anonymizing network. Servers blacklist misbehaving users maintaining their

privacy. Increase the mainstream acceptance of anonymizing

network.

17Nymble Blocking System

Page 18: Nymble Blocking System_need

www.wikipedia.com www.seminarprojects.com www.airccse.org www.torproject.org

18Nymble Blocking System

Page 19: Nymble Blocking System_need

19Nymble Blocking System

Page 20: Nymble Blocking System_need

20

Nymble Blocking System

Page 21: Nymble Blocking System_need

Nymble Blocking System 21

System Setup

ServerRegistration

BlacklistUpdateAndComplaining

Tor