CFP last date
20 January 2025
Reseach Article

Desing and Implementation of Distributed Security using Onion Routing

Published on March 2012 by Ashish T. Bhole, Savita H. Lambole
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 3
March 2012
Authors: Ashish T. Bhole, Savita H. Lambole
a50592f9-15b1-4c62-af52-f8d927614f46

Ashish T. Bhole, Savita H. Lambole . Desing and Implementation of Distributed Security using Onion Routing. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 3 (March 2012), 1-6.

@article{
author = { Ashish T. Bhole, Savita H. Lambole },
title = { Desing and Implementation of Distributed Security using Onion Routing },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 3 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/icwet2012/number3/5326-1017/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Ashish T. Bhole
%A Savita H. Lambole
%T Desing and Implementation of Distributed Security using Onion Routing
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 3
%P 1-6
%D 2012
%I International Journal of Computer Applications
Abstract

Although methods for reaching security goals such as secrecy, integrity and authentication are widely used in the Internet, there is no widely-used solution providing anonymity. Onion Routing is a flexible communication infrastructure and one such application which enables users to have anonymous communication and yet is so reliable from eavesdroppers and traffic analyzers. First it securely establishes the connection. To ensure the security well known networking and Public key Cryptographic techniques are utilized. Here the identities of the sender and the receiver are hidden by an onion structure, which is cryptographically layered data structure that defines the route through the onion routing network. After the route is established by making the entries into the routing table, the data is transmitted over the channel, which is also repeatedly encrypted. Once the data is transferred the connection is destroyed. Onion routing provides the efficient way of protection, which we have implemented.

References
  1. K. Kaviya, “Network Security Implementation by Onion Routing” Sri Ramakrishna Engineering College, 2009 International Conference on Information and Multimedia Technology.
  2. Aaron Johnson,Paul Syverson “More Anonymous Onion Routing Through Trust” International Conference,2008,Center for High Assurance Computer Systems, U.S. Naval Research Laboratory, Washington, DC 20375 USA
  3. Roger Dingledine,Nick Mathewson,Paul Syverson “Tor: The Second-Generation Onion Router” Naval Research Lab, LNCS 2009
  4. Aniket Kate, Greg Zaverucha, and Ian Goldberg “Pairing-Based Onion Routing” David R. Cheriton School of Computer Science University of Waterloo, Research project 2008, Waterloo, ON, Canada N2L 3G1
  5. Paul Syverson , Gene Tsudik y,Michael Reed ,Carl Landwehr z “Towards an Analysis of Onion Routing Security” Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, SC, IEEE CS Press, January 2000.
  6. Paul F. Syverson, David M. Goldschlag, and Michael G. Reed “Anonymous Connections and Onion Routing”, Naval Research Laboratory , 12th Annual Computer Security Applications Conference,San Diego, CA, IEEE CS Press, December, 1998
  7. Can Tang,Ian Goldberg “An Improved Algorithm for Tor Circuit Scheduling”, CCS’10, October 4–8, 2010, Chicago, Illinois, USA. Copyright 2010 ACM 978-1-4503-0244-9/10/10 ...$10.00.
  8. Stefen Michels “Analysing Onion Routing Bachelor-Thesis” ,June 22, 2009
  9. Torreleasenotes https://git.torproject.org/checkout/tor/master/ReleaseNotes.
  10. D. Eastlake 3rd and P. Jones. US Secure HashAlgorithm 1 (SHA1). RFC 3174 (Informa- tional), September 2001. Updated by RFC4634
  11. Michael G. Reed, Paul F. Syverson, David M. Goldschlag. “Proxies for anonymous Routing”. Naval Research Laboratory, Washington DC.
  12. RSA Algorithm.on internet.
  13. The Anonymizer. http://www.anonymizer.com
Index Terms

Computer Science
Information Sciences

Keywords

Anonymous communication Onion routing Anonymity TOR Security Cryptography RSA OR