Security challenges in vehicular cloud computing
Top Cited Papers
- 4 September 2012
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Intelligent Transportation Systems
- Vol. 14 (1), 284-294
- https://doi.org/10.1109/tits.2012.2211870
Abstract
In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dimensions, of conventional cloud computing. In a VC, underutilized vehicular resources including computing power, storage, and Internet connectivity can be shared between drivers or rented out over the Internet to various customers. Clearly, if the VC concept is to see a wide adoption and to have significant societal impact, security and privacy issues need to be addressed. The main contribution of this work is to identify and analyze a number of security challenges and potential privacy threats in VCs. Although security issues have received attention in cloud computing and vehicular networks, we identify security challenges that are specific to VCs, e.g., challenges of authentication of high-mobility vehicles, scalability and single interface, tangled identities and locations, and the complexity of establishing trust relationships among multiple players caused by intermittent short-range communications. Additionally, we provide a security scheme that addresses several of the challenges discussed.Keywords
This publication has 21 references indexed in Scilit:
- Taking VANET to the cloudsInternational Journal of Pervasive Computing and Communications, 2011
- Growing Artificial Transportation Systems: A Rule-Based Iterative Design ProcessIEEE Transactions on Intelligent Transportation Systems, 2011
- Parallel Control and Management for Intelligent Transportation Systems: Concepts, Architectures, and ApplicationsIEEE Transactions on Intelligent Transportation Systems, 2010
- An Identity-Based Security System for User Privacy in Vehicular Ad Hoc NetworksIEEE Transactions on Parallel and Distributed Systems, 2010
- Providing location security in vehicular Ad Hoc networksIEEE Wireless Communications, 2009
- Improving Xen security through disaggregationPublished by Association for Computing Machinery (ACM) ,2008
- IVS 05: new developments and research trends for intelligent vehiclesIEEE Intelligent Systems, 2005
- Information Security FundamentalsPublished by Informa UK Limited ,2004
- In vivo fluorescence imaging of cyanine derivative modified with epidermal growth factor EGF-Cy5.5 in a murine model of carcinogenesisPublished by SPIE-Intl Soc Optical Eng ,2003
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985