Today’s mobile devices have changed the way we interact with technology. Internet, cloud access, online banking, instant messaging, and file exchange through the cloud are just a handful of the myriad of smartphone services that we make use of every day. At the same time, the very enablers of these services–mobile internet providers and cloud platforms that host them–pose several threats to the anonymity of our communications. In this paper, we consider the problem of providing end-to-end anonymous communications and file exchange under the cooperative privacy threat of involved parties including network operators and cloud providers, which actively tamper with the communication. We propose a solution for delay-tolerant applications (similar to Whatsapp or Email) and prove the security properties of the protocol under this strong attack model. Finally, we present an experimental analysis of the efficiency of our protocol in terms of performance overhead.

Anonymous end-to-end communications in adversarial mobile clouds / Ardagna, Claudio A.; Ariyapala, Kanishka; Conti, Mauro; Pinotti, Cristina M.; Stefa, Julinda. - In: PERVASIVE AND MOBILE COMPUTING. - ISSN 1574-1192. - STAMPA. - 36:(2017), pp. 57-67. [10.1016/j.pmcj.2016.09.001]

Anonymous end-to-end communications in adversarial mobile clouds

STEFA, JULINDA
2017

Abstract

Today’s mobile devices have changed the way we interact with technology. Internet, cloud access, online banking, instant messaging, and file exchange through the cloud are just a handful of the myriad of smartphone services that we make use of every day. At the same time, the very enablers of these services–mobile internet providers and cloud platforms that host them–pose several threats to the anonymity of our communications. In this paper, we consider the problem of providing end-to-end anonymous communications and file exchange under the cooperative privacy threat of involved parties including network operators and cloud providers, which actively tamper with the communication. We propose a solution for delay-tolerant applications (similar to Whatsapp or Email) and prove the security properties of the protocol under this strong attack model. Finally, we present an experimental analysis of the efficiency of our protocol in terms of performance overhead.
2017
Anonymity; Mobile cloud computing; Wireless network
01 Pubblicazione su rivista::01a Articolo in rivista
Anonymous end-to-end communications in adversarial mobile clouds / Ardagna, Claudio A.; Ariyapala, Kanishka; Conti, Mauro; Pinotti, Cristina M.; Stefa, Julinda. - In: PERVASIVE AND MOBILE COMPUTING. - ISSN 1574-1192. - STAMPA. - 36:(2017), pp. 57-67. [10.1016/j.pmcj.2016.09.001]
File allegati a questo prodotto
File Dimensione Formato  
Stefa_anonymous_2017.pdf

solo gestori archivio

Note: Articolo Principale
Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 553.64 kB
Formato Adobe PDF
553.64 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/906590
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 5
social impact