An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments

被引:22
|
作者
Ardagna, Claudio A. [1 ]
Conti, Mauro [2 ]
Leone, Mario [2 ]
Stefa, Julinda [3 ]
机构
[1] Univ Milan, Dipartimento Informat, Crema, Italy
[2] Univ Padua, Dipartimento Matemat, Padua, Italy
[3] Univ Roma La Sapienza, Dipartimento Informat, I-00185 Rome, Italy
关键词
Anonymity; mobile cloud computing; mobile communications; smartphone clones;
D O I
10.1109/TSC.2014.2304717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing spread of mobile cloud computing paradigm is changing the traditional mobile communication infrastructure. Today, smartphones can rely on virtual (software) "clones" in the cloud, offering backup/recovery solutions as well as the possibility to offload computations. As a result, clones increase the communication and computation capabilities of smartphones, making their limited batteries last longer. Unfortunately, mobile cloud introduces new privacy risks, since personal information of the communicating users is distributed among several parties (e. g., cellular network operator, cloud provider). In this paper, we propose a solution implementing an end-to-end anonymous communication protocol between two users in the network, which leverages properties of social networks and ad hoc wireless networks. We consider an adversary model where each party observing a portion of the communication possibly colludes with others to uncover the identity of communicating users. We then extensively analyze the security of our protocol and the anonymity preserved against the above adversaries. Most importantly, we assess the performance of our solution by comparing it to Tor on a real testbed of 36 smartphones and relative clones running on Amazon EC2 platform.
引用
收藏
页码:373 / 386
页数:14
相关论文
共 50 条
  • [21] POLYNOMIAL END-TO-END COMMUNICATION
    AWERBUCH, B
    MANSOUR, Y
    SHAVIT, N
    30TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 1989, : 358 - 363
  • [22] A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments
    Hsu, Chien-Lung
    Chuang, Tzu-Hsien
    Chen, Yu-Han
    Lin, Tzu-Wei
    Lu, Huang-Chia
    2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 133 - 138
  • [23] SDN-based End-to-End Flow Control in Mobile Slice Environments
    Meneses, Flavio
    Corujo, Daniel
    Neto, Augusto
    Aguiar, Rui L.
    2018 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2018,
  • [24] Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication
    Zhou, YB
    Zhang, ZF
    Feng, DG
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 372 - 374
  • [25] End-to-End Availability of Cloud Services
    Netes, Victor
    PROCEEDINGS OF THE 2018 22ND CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2018, : 198 - 203
  • [26] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [27] Group Anonymous D2D Communication with End-to-End Security in LTE-A
    Hsu, Ruei-Hau
    Lee, Jemin
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 451 - 459
  • [28] Flexible IoT security middleware for end-to-end cloud-fog communication
    Mukherjee, Bidyut
    Wang, Songjie
    Lu, Wenyi
    Neupane, Roshan Lal
    Dunn, Daniel
    Ren, Yijie
    Su, Qi
    Calyam, Prasad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 688 - 703
  • [29] BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users
    Saxena, Neetesh
    Shen, Hong
    Komninos, Nikos
    Choo, Kim-Kwang Raymond
    Chaudhari, Narendra S.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 550 - 565
  • [30] Low end-to-end delay fuzzy networking protocol for mobile wireless sensing
    Mazaheri, Mohammad
    Kavian, Yousef S.
    Sharif, Hamid
    Rashvand, Habib F.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (15): : 2406 - 2418