International Conference and Workshop on Emerging Trends in Technology |
Foundation of Computer Science USA |
ICWET2012 - Number 3 |
March 2012 |
Authors: Ashish T. Bhole, Savita H. Lambole |
a50592f9-15b1-4c62-af52-f8d927614f46 |
Ashish T. Bhole, Savita H. Lambole . Desing and Implementation of Distributed Security using Onion Routing. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 3 (March 2012), 1-6.
Although methods for reaching security goals such as secrecy, integrity and authentication are widely used in the Internet, there is no widely-used solution providing anonymity. Onion Routing is a flexible communication infrastructure and one such application which enables users to have anonymous communication and yet is so reliable from eavesdroppers and traffic analyzers. First it securely establishes the connection. To ensure the security well known networking and Public key Cryptographic techniques are utilized. Here the identities of the sender and the receiver are hidden by an onion structure, which is cryptographically layered data structure that defines the route through the onion routing network. After the route is established by making the entries into the routing table, the data is transmitted over the channel, which is also repeatedly encrypted. Once the data is transferred the connection is destroyed. Onion routing provides the efficient way of protection, which we have implemented.