Security and Privacy Challenges in Connected Vehicular Cloud Computing

被引:49
|
作者
Masood, Arooj [1 ]
Lakew, Demeke Shumeye [1 ]
Cho, Sungrae [1 ]
机构
[1] Chung Ang Univ, Sch Comp Sci & Engn, Seoul 156756, South Korea
来源
基金
新加坡国家研究基金会;
关键词
Cloud computing; Security; Privacy; Vehicular ad hoc networks; Computer architecture; Tutorials; Vehicular cloud computing; security; privacy; security and privacy; LIGHTWEIGHT AUTHENTICATION; LOCATION PRIVACY; ATTACKS; BLOCKCHAIN; NETWORKS; VEHICLE; THREATS; DESIGN; ISSUES; PRESERVATION;
D O I
10.1109/COMST.2020.3012961
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular cloud computing (VCC) is an improvement from conventional cloud computing to new revolutionized computing services including intelligent transportation, autonomous driving and vehicle control, Internet browsing, online documentation, and infotainment. It enables vehicles to autonomously share heterogeneous computational resources while solving unanticipated critical problems dynamically. However, in a world of black hats, technology often has a dark side as well. Therefore, the VCC is limited by considerable security and privacy challenges. The special characteristics of VCC, including the multitenancy nature of clouds, intermittent wireless communications, high mobility of vehicles, and rapid resource elasticity with decentralized operations, have promoted security solutions used in vehicular ad hoc networks and conventional cloud computing to be revised. This paper first presents a state-of-the-art study of VCC that focuses on VCC architecture, its features analysis, and extensive VCC applications. Second, the proposed threats identification taxonomy and an exhaustive survey on security and privacy issues in VCC are presented under a layered approach: physical resource layer, vehicle-to-anything (V2X) network layer, and vehicular cloud layer, as well as at a complete system level. Finally, we highlight and discuss challenges and open research issues that can be considered as future research directions.
引用
收藏
页码:2725 / 2764
页数:40
相关论文
共 50 条
  • [41] Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection
    Shariati, S. Mandi
    Abouzarjomehri
    Ahmadzadegan, M. Hossein
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1078 - 1082
  • [42] Security and Privacy Implications of Cloud Computing - Lost in the Cloud
    Tchifilionova, Vassilka
    OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 149 - 158
  • [43] Security and Privacy in Fog Computing: Challenges
    Mukherjee, Mithun
    Matam, Rakesh
    Shu, Lei
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Choudhury, Nikumani
    Kumar, Vikas
    IEEE ACCESS, 2017, 5 : 19293 - 19304
  • [44] Secure Outsourced Computation in Connected Vehicular Cloud Computing
    Shao, Jun
    Wei, Guiyi
    IEEE NETWORK, 2018, 32 (03): : 36 - 41
  • [45] Vehicular Cloud Architectures: Taxonomy, Security and Challenges
    Zouaidi, Soukeina
    Belghith, Abdelfettah
    Lengliz, Ilhem
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [46] On Privacy and Security Challenges in Smart Connected Homes
    Bugeja, Joseph
    Jacobsson, Andreas
    Davidsson, Paul
    2016 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2016, : 172 - 175
  • [47] An exploration of security and privacy among cloud computing
    Chen, Chih-Yung
    Tu, Jih-Fu
    INNOVATION, COMMUNICATION AND ENGINEERING, 2014, : 219 - 222
  • [48] On Current Trends in Security and Privacy of Cloud Computing
    Sahin, Serap
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 171 - 175
  • [49] A Novel Cloud Computing Algorithm of Security and Privacy
    Chen, Chih-Yung
    Tu, Jih-Fu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [50] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168