The increasing spread of mobile cloud computing paradigm is changing the traditional mobile communication infrastructure. Today, smartphones can rely on virtual (software) “clones” in the cloud, offering backup/recovery solutions as well as the possibility to offload computations. As a result, clones increase the communication and computation capabilities of smartphones, making their limited batteries last longer. Unfortunately, mobile cloud introduces new privacy risks, since personal information of the communicating users is distributed among several parties (e.g., cellular network operator, cloud provider). In this paper, we propose a solution implementing an end-to-end anonymous communication protocol between two users in the network, which leverages properties of social networks and ad hoc wireless networks. We consider an adversary model where each party observing a portion of the communication possibly colludes with others to uncover the identity of communicating users. We then extensively analyze the security of our protocol and the anonymity preserved against the above adversaries. Most importantly, we assess the performance of our solution by comparing it to Tor on a real testbed of 36 smartphones and relative clones running on Amazon EC2 platform.

An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments / Claudio A., Ardagna; Mauro, Conti; Mario, Leone; Stefa, Julinda. - In: IEEE TRANSACTIONS ON SERVICES COMPUTING. - ISSN 1939-1374. - STAMPA. - 7:(2014), pp. 373-386. [10.1109/TSC.2014.2304717]

An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments

STEFA, JULINDA
2014

Abstract

The increasing spread of mobile cloud computing paradigm is changing the traditional mobile communication infrastructure. Today, smartphones can rely on virtual (software) “clones” in the cloud, offering backup/recovery solutions as well as the possibility to offload computations. As a result, clones increase the communication and computation capabilities of smartphones, making their limited batteries last longer. Unfortunately, mobile cloud introduces new privacy risks, since personal information of the communicating users is distributed among several parties (e.g., cellular network operator, cloud provider). In this paper, we propose a solution implementing an end-to-end anonymous communication protocol between two users in the network, which leverages properties of social networks and ad hoc wireless networks. We consider an adversary model where each party observing a portion of the communication possibly colludes with others to uncover the identity of communicating users. We then extensively analyze the security of our protocol and the anonymity preserved against the above adversaries. Most importantly, we assess the performance of our solution by comparing it to Tor on a real testbed of 36 smartphones and relative clones running on Amazon EC2 platform.
2014
smartphone clones, Anonymity, mobile cloud computing, mobile communications
01 Pubblicazione su rivista::01a Articolo in rivista
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments / Claudio A., Ardagna; Mauro, Conti; Mario, Leone; Stefa, Julinda. - In: IEEE TRANSACTIONS ON SERVICES COMPUTING. - ISSN 1939-1374. - STAMPA. - 7:(2014), pp. 373-386. [10.1109/TSC.2014.2304717]
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/540072
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 39
  • ???jsp.display-item.citation.isi??? 24
social impact