International Journal of Computer Technology and Applications
Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on trusted third parties who can collude to de-anonymizing users of the scheme. Networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites.