The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users.

Preserving smartphone users' anonymity in Cloudy Days / C.A. Ardagna, M. Conti, M. Leone, J. Stefa - In: 22nd International conference on computer communications and networks, ICCCN 2013 : Nassau, Bahamas, july 30 - august 2, 2013 : conference proceedingsPiscataway : Institute of electrical and electronics engineers, 2013. - ISBN 9781467357746. - pp. 1-5 (( Intervento presentato al 22. convegno International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2013) tenutosi a Nassau, Bahamas nel 2013 [10.1109/ICCCN.2013.6614170].

Preserving smartphone users' anonymity in Cloudy Days

C.A. Ardagna
Primo
;
2013

Abstract

The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users.
Settore INF/01 - Informatica
2013
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
ACLS.MobiPST2013.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 167.59 kB
Formato Adobe PDF
167.59 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/227640
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? ND
social impact