An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments

被引:22
|
作者
Ardagna, Claudio A. [1 ]
Conti, Mauro [2 ]
Leone, Mario [2 ]
Stefa, Julinda [3 ]
机构
[1] Univ Milan, Dipartimento Informat, Crema, Italy
[2] Univ Padua, Dipartimento Matemat, Padua, Italy
[3] Univ Roma La Sapienza, Dipartimento Informat, I-00185 Rome, Italy
关键词
Anonymity; mobile cloud computing; mobile communications; smartphone clones;
D O I
10.1109/TSC.2014.2304717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing spread of mobile cloud computing paradigm is changing the traditional mobile communication infrastructure. Today, smartphones can rely on virtual (software) "clones" in the cloud, offering backup/recovery solutions as well as the possibility to offload computations. As a result, clones increase the communication and computation capabilities of smartphones, making their limited batteries last longer. Unfortunately, mobile cloud introduces new privacy risks, since personal information of the communicating users is distributed among several parties (e. g., cellular network operator, cloud provider). In this paper, we propose a solution implementing an end-to-end anonymous communication protocol between two users in the network, which leverages properties of social networks and ad hoc wireless networks. We consider an adversary model where each party observing a portion of the communication possibly colludes with others to uncover the identity of communicating users. We then extensively analyze the security of our protocol and the anonymity preserved against the above adversaries. Most importantly, we assess the performance of our solution by comparing it to Tor on a real testbed of 36 smartphones and relative clones running on Amazon EC2 platform.
引用
收藏
页码:373 / 386
页数:14
相关论文
共 50 条
  • [31] A secure end-to-end proximity NFC-based mobile payment protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    COMPUTER STANDARDS & INTERFACES, 2019, 66
  • [32] A new end-to-end authentication protocol for mobile users to access internet services
    He, LS
    Zhang, N
    He, LR
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 239 - 250
  • [33] The HOP Protocol: Reliable Latency-Bounded End-to-End Multipath Communication
    Chiariotti, Federico
    Zanella, Andrea
    Kucera, Stepan
    Fahmi, Kariem
    Claussen, Holger
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (05) : 2281 - 2295
  • [34] 100 Gbit/s End-to-End Communication: Adding Flexibility with Protocol Templates
    Buechner, Steffen
    Hasani, Alireza
    Lopacinski, Lukasz
    Kraemer, Rolf
    Nolte, Joerg
    PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 263 - 266
  • [35] Providing end-to-end location privacy in IP-based mobile communication
    Krishnatmurthi, G
    Chaskar, H
    Siren, R
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 1264 - 1269
  • [36] An end-to-end authentication protocol in wireless application protocol
    Yang, JP
    Shin, W
    Rhee, KH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259
  • [37] END-TO-END ENERGY EFFICIENT COMMUNICATION
    Dittmann, Lars
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND APPLICATION, ICCTA2011, 2011, : 323 - 327
  • [38] End-to-End Protocol for the Detection of SARS-CoV-2 from Built Environments
    Parker, Ceth W.
    Singh, Nitin
    Tighe, Scott
    Blachowicz, Adriana
    Wood, Jason M.
    Seuylemezian, Arman
    Vaishampayan, Parag
    Urbaniak, Camilla
    Hendrickson, Ryan
    Laaguiby, Pheobe
    Clark, Kevin
    Clement, Brian G.
    O'Hara, Niamh B.
    Couto-Rodriguez, Mara
    Bezdan, Daniela
    Mason, Christopher E.
    Venkateswaran, Kasthuri
    MSYSTEMS, 2020, 5 (05)
  • [39] A Cloud-RAN based end-to-end computation offloading in Mobile Edge Computing
    Gholivand, Rezvan
    Movahedi, Zeinab
    COMPUTER COMMUNICATIONS, 2021, 175 : 193 - 204
  • [40] SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
    Raza, Shahid
    Helgason, Tomas
    Papadimitratos, Panos
    Voigt, Thiemo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 77 : 40 - 51