The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users.
Preserving smartphone users' anonymity in Cloudy Days / C.A. Ardagna, M. Conti, M. Leone, J. Stefa - In: 22nd International conference on computer communications and networks, ICCCN 2013 : Nassau, Bahamas, july 30 - august 2, 2013 : conference proceedingsPiscataway : Institute of electrical and electronics engineers, 2013. - ISBN 9781467357746. - pp. 1-5 (( Intervento presentato al 22. convegno International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2013) tenutosi a Nassau, Bahamas nel 2013 [10.1109/ICCCN.2013.6614170].
Preserving smartphone users' anonymity in Cloudy Days
C.A. ArdagnaPrimo
;
2013
Abstract
The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users.File | Dimensione | Formato | |
---|---|---|---|
ACLS.MobiPST2013.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Dimensione
167.59 kB
Formato
Adobe PDF
|
167.59 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.