Loading

Simulation of Anonymity Network Model
Omkar Ghaisas1, Irfan Siddavatam2, Ashwini Dalvi3, Faruk Kazi4

1Omkar Ghaisas, Department of Information Technology, K J Somaiya College of Engineering, Mumbai (Maharashtra), India.
2Dr. Irfan Siddavatam, Department of Information Technology, K J Somaiya College of Engineering, Mumbai (Maharashtra), India.
3Prof. Ashwini Dalvi, Department of Information Technology, K J Somaiya College of Engineering, Mumbai (Maharashtra) India.
4Dr. Faruk Kazi, Department of Electronics, Veermata Jijabai Technological Institute, Mumbai (Maharashtra) India.
Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 1630-1635
| Volume-8 Issue-7, May 2019 | Retrieval Number: G6309058719/19©BEIESP

Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In order to protect privacy a user might want to be anonymous over internet. Tor is most used network when it comes to achieving internet anonymity. But Tor network itself is not secure. If tor network gets compromised then anonymity of Tor client will get compromised which means ip address of user’s computer will be noted at Website interface. Hence we have proposed a model which gives advance anonymity to the Tor client. The model consists of three components Local Host, Remote Terminal and Target Website. Due to inclusion of Remote Terminal even though Tor gets compromised only ip address of Remote Terminal gets noted at the website interface. Hence user’s ip address is never noted at web interface or user is anonymous. This paper provides simulation tests on anonymity model using shadow. In Simulation Results we have graphs which show different relationships between Benchmark parameter which are throughput, goodput, ticks, control overhead and retransmission overhead.
Keyword: Internet Anonymity, Tor, Shadow, Privacy.
Scope of the Article: Advanced Computer Networking.