The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users.
Preserving Smartphone Users' Anonymity in Cloudy Days / Claudio A., Ardagna; Mauro, Conti; Mario, Leone; Stefa, Julinda. - STAMPA. - 2013-:(2013), pp. 1-5. (Intervento presentato al convegno IEEE International Conference on Computer Communications and Networks (ICCCN), 2013 tenutosi a Nassau, Bahamas nel 30 Luglio-2 Agosto 2013) [10.1109/ICCCN.2013.6614170].
Preserving Smartphone Users' Anonymity in Cloudy Days
STEFA, JULINDA
2013
Abstract
The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.