Today’s mobile devices have changed the way we interact with technology. Internet, cloud access, online banking, instant messaging, and file exchange through the cloud are just a handful of the myriad of smartphone services that we make use of every day. At the same time, the very enablers of these services–mobile internet providers and cloud platforms that host them–pose several threats to the anonymity of our communications. In this paper, we consider the problem of providing end-to-end anonymous communications and file exchange under the cooperative privacy threat of involved parties including network operators and cloud providers, which actively tamper with the communication. We propose a solution for delay-tolerant applications (similar to Whatsapp or Email) and prove the security properties of the protocol under this strong attack model. Finally, we present an experimental analysis of the efficiency of our protocol in terms of performance overhead.

Anonymous end-to-end communications in adversarial mobile clouds / C.A. Ardagna, K. Ariyapala, M. Conti, C.M. Pinotti, J. Stefa. - In: PERVASIVE AND MOBILE COMPUTING. - ISSN 1574-1192. - 36(2017 Apr), pp. 57-67. [10.1016/j.pmcj.2016.09.001]

Anonymous end-to-end communications in adversarial mobile clouds

C.A. Ardagna
Primo
;
2017

Abstract

Today’s mobile devices have changed the way we interact with technology. Internet, cloud access, online banking, instant messaging, and file exchange through the cloud are just a handful of the myriad of smartphone services that we make use of every day. At the same time, the very enablers of these services–mobile internet providers and cloud platforms that host them–pose several threats to the anonymity of our communications. In this paper, we consider the problem of providing end-to-end anonymous communications and file exchange under the cooperative privacy threat of involved parties including network operators and cloud providers, which actively tamper with the communication. We propose a solution for delay-tolerant applications (similar to Whatsapp or Email) and prove the security properties of the protocol under this strong attack model. Finally, we present an experimental analysis of the efficiency of our protocol in terms of performance overhead.
anonymity; mobile cloud computing; wireless network
Settore INF/01 - Informatica
apr-2017
Article (author)
File in questo prodotto:
File Dimensione Formato  
pervasive_mobile_computing.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 532.68 kB
Formato Adobe PDF
532.68 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
453704.pdf

accesso aperto

Tipologia: Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione 220.18 kB
Formato Adobe PDF
220.18 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/453704
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 5
social impact