scholarly journals Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey

2020 ◽  
Vol 2020 ◽  
pp. 1-25 ◽  
Author(s):  
Muhammad Sameer Sheikh ◽  
Jun Liang ◽  
Wensong Wang

Vehicular networks are becoming a prominent research field in the intelligent transportation system (ITS) due to the nature and characteristics of providing high-level road safety and optimized traffic management. Vehicles are equipped with the heavy communication equipment which requires a high power supply, on-board computing device, and data storage devices. Many wireless communication technologies are deployed to maintain and enhance the traffic management system. The ITS is capable of providing services to the traffic authorities and precautionary measures to the drivers and passengers. Several methods have been proposed for discussing the security and privacy issues for the vehicular ad hoc networks (VANETs) and vehicular cloud computing (VCC). They receive a great deal of attention from researchers around the world since they are new technologies, and they can improve road safety and enhance traffic flow by utilizing the vehicles resources and communication system. Firstly, the VANETs are presented, including the basic overview, characteristics, threats, and attacks. The location privacy methodologies are elaborated, which can protect the confidential information of the vehicle, such as the location detail and driver information. Secondly, the trust management models in the VANETs are comprehensively discussed, followed by the comparison of the cryptography and trust models in terms of different kinds of attacks. Then, the simulation tools and applications of the VANETs are discussed, and the evolution is presented from the VANETs to VCC in the vehicular network. Thirdly, the VCC is discussed from its architecture and the security and privacy issues. Finally, several research challenges on the VANETs and VCC are presented. In sum, this survey comprehensively covers the location privacy and trust management models of the VANETs and discusses the security and privacy issues in the VCC, which fills the gap of existing surveys. Also, it indicates the research challenges in the VANETs and VCC.

2018 ◽  
Vol 8 (10) ◽  
pp. 1964 ◽  
Author(s):  
Qazi Ali ◽  
Naveed Ahmad ◽  
Abdul Malik ◽  
Gauhar Ali ◽  
Waheed Rehman

Intelligent transport system (ITS), owing to their potential to enhance road safety and improve traffic management, have attracted attention from automotive industries and academia in recent years. The underlying technology—i.e., vehicular ad-hoc networks (VANETs)—provide a means for vehicles to intelligently exchange messages regarding road and traffic conditions to enhance safety. The open nature of ITS as wireless communication technology leads to many security and privacy challenges. These challenges pertain to confidentiality, authentication, integrity, non-repudiation, location privacy, identity privacy, anonymity, certificate revocation, and certificate resolution. This article aims to propose a novel taxonomy of security and privacy issues and solutions in ITS. Furthermore, categorization of security and privacy schemes in ITS and their limitations are discussed with various parameters—scalability, privacy, computational cost, communication overhead, latency—and various types of security attacks has been analyzed. This article leverages new researchers for challenges and opportunities related to security and privacy in ITS.


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


Author(s):  
S. R. Mani Sekhar ◽  
Sharmitha S. Bysani ◽  
Vasireddy Prabha Kiranmai

Security and privacy issues are the challenging areas in the field of internet of things (IoT) and fog computing. IoT and fog has become an involving technology allowing major changes in the field of information systems and communication systems. This chapter provides the introduction of IoT and fog technology with a brief explanation of how fog is overcoming the challenges of cloud computing. Thereafter, the authors discuss the different security and privacy issues and its related solutions. Furthermore, they present six different case studies which will help the reader to understand the platform of IoT in fog.


Author(s):  
Nida Kauser Khanum ◽  
Pankaj Lathar ◽  
G. M. Siddesh

Fog computing is an extension of cloud computing, and it is one of the most important architypes in the current world. Fog computing is like cloud computing as it provides data storage, computation, processing, and application services to end-users. In this chapter, the authors discuss the security and privacy issues concerned with fog computing. The issues present in cloud are also inherited by fog computing, but the same methods available for cloud computing are not applicable to fog computing due to its decentralized nature. The authors also discuss a few real-time applications like healthcare systems, intelligent food traceability, surveillance video stream processing, collection, and pre-processing of speech data. Finally, the concept of decoy technique and intrusion detection and prevention technique is covered.


Author(s):  
Manoranjini J. ◽  
Anbuchelian S.

The rapid massive growth of IoT and the explosive increase in the data used and created in the edge networks led to several complications in the cloud technology. Edge computing is an emerging technology which is ensuring itself as a promising technology. The authors mainly focus on the security and privacy issues and their solutions. There are a lot of important features which make edge computing the most promising technology. In this chapter, they emphasize the security and privacy issues. They also discuss various architectures that enable us to ensure safe technologies and also provide an analysis on various designs that enable strong security models. Next, they make a detailed study on different cryptographic techniques and trust management systems. This study helps us to identify the pros and cons that led us to promising implementations of edge computing in the current scenario. At the end of the chapter, the authors discuss on various open research areas which could be the thrust areas for the next era.


2015 ◽  
pp. 1370-1414
Author(s):  
Jaydip Sen

Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security, and privacy issues still pose significant challenges. In this chapter, the authors describe various service and deployment models of cloud computing and identify major challenges. In particular, they discuss three critical challenges: regulatory, security, and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.


Author(s):  
Amavey Tamunobarafiri ◽  
Shaun Aghili ◽  
Sergey Butakov

Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.


Author(s):  
Jie Zhang

An increasingly large number of cars are being equipped with GPS and Wi-Fi devices, forming vehicular ad-hoc networks (VANETs) and enabling vehicle to vehicle communication with the goal of providing increased passenger and road safety. However, dishonest peers (vehicles) in a VANET may send out false information to maximize their own utility. Given the dire consequences of acting on false information in this context, there is a serious need to establish trust among peers. This article first discusses the challenges for trust management caused by the important characteristics of VANET environments, and identifies desired properties that effective trust management should incorporate in order to address the challenges. The author then surveys and evaluates existing trust models in VANETs, and points out that none of the trust models has achieved all the properties. Finally, the author proposes some important future directions for research towards effective trust management for VANETs.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 238
Author(s):  
S. Iniyan ◽  
M. Senthilraja ◽  
R. Srinivasan ◽  
A. Palaniraj

Cell phones are turning into a basic piece of our day by day life because of most proficient and powerful specialized devices without time and space boundation. Everybody has a portable, tablet, tablet with calling office i.e. Fablet. Distributed computing (DC) has been broadly perceived as the cutting edge's registering foundation with the fast development of portable applications and the support of Cloud Computing for an assortment of administrations, the Mobile Cloud Computing (MCC) is presented as an incorporation of Cloud Computing into the Mobile Environment. Portable Cloud Computing is picking up stream. MCC is alluded to as the framework where both the information stockpiling and the information handling occur outside the cell phone. In MCC condition, Cloud Computing, Mobile Computing and Application confront a few difficulties like Mobile Computation Offloading, Seamless Connectivity, Vendor/Data Lock-in, Long WAN Latency, Live VM (Virtual Machine) relocation issues, Low Bandwidth, Energy-Efficient Transmissions and Trust-Security and Privacy Issues. In this paper, I have talked about around a few difficulties and issues identified with the Mobile Cloud Computing. This paper gives data about Mobile Cloud Computing Application, Security and Issues.


Sign in / Sign up

Export Citation Format

Share Document