TRENDING ON ONEINDIA
- Chandrababu Naidu Meets Mamata Banerjee: Efforts For Anti-BJP Front
- Oppo India: Teases New Smartphone Range
- Jawa Vs Royal Enfield — A Brief Comparison
- Anushka Sharma: Unveils Her Madame Tussauds Wax Statue!
- Healthy Ways To Improve Your Daily Tea
- Latest Lowest Personal Loan Interest Rates
- Five Reasons To Visit Bum La Pass This Winter
- How Dovizioso won a red-flagged Race!
A study has revealed that the unique login identity that is verified by the network server is user friendly but it has three main flaws namely, the anonymity of communicating users, the identity theft and misplaced trust.
Mohamed Gouda and his colleagues from the University of Texas have worked on a new login based network that is linked with an unlimited list of user selected pseudonyms that bypasses all these issues.
Other the user, the network authority server will know the address of the user and the pool of the pseudonyms that is linked with the address, says the report.
The issue about the anonymous communication using the network is a very old one and it has required a considerable research, claims the statement of the researchers.
In 1981, researchers have tries to address the issue and for these couple of decades, the methods like Onion routing and Tor Protocol were used as the solutions.
However, these approaches has scaling issues that will limit the number of concurrent users without making great investments in the network servers in order to make them carry the requisite data traffic.
In the new network structure, the users will not have identities instead they will have pseudonyms with which they will be contacted and that they can change often.
The authentication is done by the users and not by the central authority certification. This network does not have identity and therefore it does not have any identity theft.
A researcher claims that this will be an all new network that is quite distinct from the reputation based peer-to-peer ones and the traditional client based ones.