An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments

被引:22
|
作者
Ardagna, Claudio A. [1 ]
Conti, Mauro [2 ]
Leone, Mario [2 ]
Stefa, Julinda [3 ]
机构
[1] Univ Milan, Dipartimento Informat, Crema, Italy
[2] Univ Padua, Dipartimento Matemat, Padua, Italy
[3] Univ Roma La Sapienza, Dipartimento Informat, I-00185 Rome, Italy
关键词
Anonymity; mobile cloud computing; mobile communications; smartphone clones;
D O I
10.1109/TSC.2014.2304717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing spread of mobile cloud computing paradigm is changing the traditional mobile communication infrastructure. Today, smartphones can rely on virtual (software) "clones" in the cloud, offering backup/recovery solutions as well as the possibility to offload computations. As a result, clones increase the communication and computation capabilities of smartphones, making their limited batteries last longer. Unfortunately, mobile cloud introduces new privacy risks, since personal information of the communicating users is distributed among several parties (e. g., cellular network operator, cloud provider). In this paper, we propose a solution implementing an end-to-end anonymous communication protocol between two users in the network, which leverages properties of social networks and ad hoc wireless networks. We consider an adversary model where each party observing a portion of the communication possibly colludes with others to uncover the identity of communicating users. We then extensively analyze the security of our protocol and the anonymity preserved against the above adversaries. Most importantly, we assess the performance of our solution by comparing it to Tor on a real testbed of 36 smartphones and relative clones running on Amazon EC2 platform.
引用
收藏
页码:373 / 386
页数:14
相关论文
共 50 条
  • [41] SECURE COMMUNICATION IN INTERNET ENVIRONMENTS - A HIERARCHICAL KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION
    LU, WP
    SUNDARESHAN, MK
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (10) : 1014 - 1023
  • [42] Vehicle-to-Vehicle Communication: End-to-End Performance Evaluation in Dense Propagation Environments
    Pitsiladis, Giorgos T.
    Papanikolaou, Dimitrios
    Panagopoulos, Athanasios D.
    Antoniou, Constantinos
    2015 9TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2015,
  • [43] CCAG: End-to-End Point Cloud Registration
    Wang, Yong
    Zhou, Pengbo
    Geng, Guohua
    An, Li
    Liu, Yangyang
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2024, 9 (01) : 435 - 442
  • [44] A survey on end-to-end point cloud learning
    Tang, Xikai
    Huang, Fangzheng
    Li, Chao
    Ban, Dayan
    IET IMAGE PROCESSING, 2023, 17 (05) : 1307 - 1321
  • [45] End-to-end point cloud registration with transformer
    Wang, Yong
    Zhou, Pengbo
    Geng, Guohua
    An, Li
    Zhang, Qi
    Artificial Intelligence Review, 2025, 58 (01)
  • [46] End-to-End Cloud Application Cloning With Ditto
    Liang, Hmingyu
    Gan, Yu
    Li, Yueying
    Torres, Carlos
    Dhanotia, Abhishek
    Ketkar, Mahesh
    Delimitrou, Christina
    IEEE MICRO, 2024, 44 (04) : 34 - 43
  • [47] Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol
    Zahid, Rimsha
    Anwar, Muhammad Waseem
    Azam, Farooque
    Amjad, Anam
    Mukhtar, Danish
    INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2022, 2022, 1665 : 148 - 159
  • [48] E-MQTT: End-to-End Synchronous and Asynchronous Communication Mechanisms in MQTT Protocol
    Im, Yerin
    Lim, Mingyu
    APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [49] An End-to-End Caching Protocol for Web Services
    Liyanaarachchi, Amila
    Weerawarana, Shahani
    INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER2012), 2012, : 96 - 102
  • [50] SMSSec: An end-to-end protocol for secure SMS
    Lo, Johnny Li-Chang
    Bishop, Judith
    Eloff, J. H. P.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 154 - 167