An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments

被引:22
|
作者
Ardagna, Claudio A. [1 ]
Conti, Mauro [2 ]
Leone, Mario [2 ]
Stefa, Julinda [3 ]
机构
[1] Univ Milan, Dipartimento Informat, Crema, Italy
[2] Univ Padua, Dipartimento Matemat, Padua, Italy
[3] Univ Roma La Sapienza, Dipartimento Informat, I-00185 Rome, Italy
关键词
Anonymity; mobile cloud computing; mobile communications; smartphone clones;
D O I
10.1109/TSC.2014.2304717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing spread of mobile cloud computing paradigm is changing the traditional mobile communication infrastructure. Today, smartphones can rely on virtual (software) "clones" in the cloud, offering backup/recovery solutions as well as the possibility to offload computations. As a result, clones increase the communication and computation capabilities of smartphones, making their limited batteries last longer. Unfortunately, mobile cloud introduces new privacy risks, since personal information of the communicating users is distributed among several parties (e. g., cellular network operator, cloud provider). In this paper, we propose a solution implementing an end-to-end anonymous communication protocol between two users in the network, which leverages properties of social networks and ad hoc wireless networks. We consider an adversary model where each party observing a portion of the communication possibly colludes with others to uncover the identity of communicating users. We then extensively analyze the security of our protocol and the anonymity preserved against the above adversaries. Most importantly, we assess the performance of our solution by comparing it to Tor on a real testbed of 36 smartphones and relative clones running on Amazon EC2 platform.
引用
收藏
页码:373 / 386
页数:14
相关论文
共 50 条
  • [1] Anonymous end-to-end communications in adversarial mobile clouds
    Ardagna, Claudio A.
    Ariyapala, Kanishka
    Conti, Mauro
    Pinotti, Cristina M.
    Stefa, Julinda
    PERVASIVE AND MOBILE COMPUTING, 2017, 36 : 57 - 67
  • [2] An end-to-end communication architecture for collaborative virtual environments
    Shirmohammadi, S
    Georganas, ND
    COMPUTER NETWORKS, 2001, 35 (2-3) : 351 - 367
  • [3] An end-to-end authentication protocol for satellite communication network
    Zhang, X. (zhangxl9497@gmail.com), 1600, Science Press (50):
  • [4] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [5] An end-to-end transport protocol for extreme wireless network environments
    Subramanian, Vijaynarayanan
    Kalyanaraman, Shivkumar
    Ramakrishnan, K. K.
    MILCOM 2006, VOLS 1-7, 2006, : 3000 - 3006
  • [6] A Network Assisted End-to-End Security Protocol for Mobile Applications
    He, Lisha
    Zhang, Ning
    He, Lirong
    Rogers, Ian
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
  • [7] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
    Dojen, Reiner
    Pasca, Vladimir
    Coffey, Tom
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
  • [8] A new privacy and authentication protocol for end-to-end mobile users
    Lee, CC
    Yang, CC
    Hwang, MS
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2003, 16 (09) : 799 - 808
  • [9] Enhancement of end-to-end communication dependability of mobile computer network
    Shen, Qingguo
    Cheng, Shixin
    Jisuanji Xuebao/Chinese Journal of Computers, 21 (07): : 663 - 668
  • [10] End-to-end encrypted communication security technology for mobile terminals
    Zhang, Xiaozhi
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 179 - 195