The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users.

Preserving Smartphone Users' Anonymity in Cloudy Days / Claudio A., Ardagna; Mauro, Conti; Mario, Leone; Stefa, Julinda. - STAMPA. - 2013-:(2013), pp. 1-5. (Intervento presentato al convegno IEEE International Conference on Computer Communications and Networks (ICCCN), 2013 tenutosi a Nassau, Bahamas nel 30 Luglio-2 Agosto 2013) [10.1109/ICCCN.2013.6614170].

Preserving Smartphone Users' Anonymity in Cloudy Days

STEFA, JULINDA
2013

Abstract

The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users.
2013
IEEE International Conference on Computer Communications and Networks (ICCCN), 2013
clouds; mobile communication; cloning; protocols; cryptography; receivers; ieee 802.11 standards
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Preserving Smartphone Users' Anonymity in Cloudy Days / Claudio A., Ardagna; Mauro, Conti; Mario, Leone; Stefa, Julinda. - STAMPA. - 2013-:(2013), pp. 1-5. (Intervento presentato al convegno IEEE International Conference on Computer Communications and Networks (ICCCN), 2013 tenutosi a Nassau, Bahamas nel 30 Luglio-2 Agosto 2013) [10.1109/ICCCN.2013.6614170].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/530603
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? ND
social impact