Today’s mobile devices have changed the way we interact with technology. Internet, cloud access, online banking, instant messaging, and file exchange through the cloud are just a handful of the myriad of smartphone services that we make use of every day. At the same time, the very enablers of these services–mobile internet providers and cloud platforms that host them–pose several threats to the anonymity of our communications. In this paper, we consider the problem of providing end-to-end anonymous communications and file exchange under the cooperative privacy threat of involved parties including network operators and cloud providers, which actively tamper with the communication. We propose a solution for delay-tolerant applications (similar to Whatsapp or Email) and prove the security properties of the protocol under this strong attack model. Finally, we present an experimental analysis of the efficiency of our protocol in terms of performance overhead.
Anonymous end-to-end communications in adversarial mobile clouds / C.A. Ardagna, K. Ariyapala, M. Conti, C.M. Pinotti, J. Stefa. - In: PERVASIVE AND MOBILE COMPUTING. - ISSN 1574-1192. - 36(2017 Apr), pp. 57-67. [10.1016/j.pmcj.2016.09.001]
Anonymous end-to-end communications in adversarial mobile clouds
C.A. ArdagnaPrimo
;
2017
Abstract
Today’s mobile devices have changed the way we interact with technology. Internet, cloud access, online banking, instant messaging, and file exchange through the cloud are just a handful of the myriad of smartphone services that we make use of every day. At the same time, the very enablers of these services–mobile internet providers and cloud platforms that host them–pose several threats to the anonymity of our communications. In this paper, we consider the problem of providing end-to-end anonymous communications and file exchange under the cooperative privacy threat of involved parties including network operators and cloud providers, which actively tamper with the communication. We propose a solution for delay-tolerant applications (similar to Whatsapp or Email) and prove the security properties of the protocol under this strong attack model. Finally, we present an experimental analysis of the efficiency of our protocol in terms of performance overhead.File | Dimensione | Formato | |
---|---|---|---|
pervasive_mobile_computing.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Dimensione
532.68 kB
Formato
Adobe PDF
|
532.68 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
453704.pdf
accesso aperto
Tipologia:
Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione
220.18 kB
Formato
Adobe PDF
|
220.18 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.