International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)
Privacy and security are two important concerns for supporting roaming users across administrative domains. In current technology, a roaming user many times uses encrypted tunnels, e.g., Virtual Private Networks (VPNs), to control the privacy and secrecy of their interactions. However, due to its encrypted standard, the traffic flowing through these tunnels cannot be verified and regulated by the foreign network's firewall, which may beyond the foreign network widely open to many various attacks from the Internet. This paper can be endured if the users reveal their traffic to the foreign network or the foreign network reveals its firewall rules to the tunnel endpoints.