A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle Applications

被引:18
|
作者
Salek, M. Sabbir [1 ]
Khan, Sakib Mahmud [1 ]
Rahman, Mizanur [2 ]
Deng, Hsien-Wen [3 ]
Islam, Mhafuzul [1 ]
Khan, Zadid [1 ]
Chowdhury, Mahsrur [1 ]
Shue, Mitch [3 ]
机构
[1] Clemson Univ, Glenn Dept Civil Engn, Clemson, SC 29634 USA
[2] Univ Alabama, Dept Civil Construct & Environm Engn, Tuscaloosa, AL 35487 USA
[3] Clemson Univ, Sch Comp, Clemson, SC 29634 USA
关键词
Cloud computing; Computer security; Computer architecture; Internet of Things; Transportation; Computer crime; Real-time systems; connected vehicle (CV); cybersecurity; Internet of Things (IoT); VANET SECURITY CHALLENGES; PRIVACY CHALLENGES; BLOCKCHAIN; KEY; AUTHENTICATION; SCHEME; COMMUNICATION; ARCHITECTURE; MANAGEMENT; FRAMEWORK;
D O I
10.1109/JIOT.2022.3152477
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an Internet of Things (IoT) environment, cloud computing is emerging as a technologically feasible and economically viable solution for supporting real-time and non-real-time connected vehicle (CV) applications due to its unlimited storage, enormous computing capabilities, and cost advantage, i.e., cloud computing costs less than owning such systems. However, maintaining cybersecurity is a major challenge in cloud-supported CV applications as it requires CVs and various transportation or non-transportation services to exchange data with the cloud via multiple wired and wireless communication networks. In this article, we review the cybersecurity requirements of cloud-supported CV applications, such as confidentiality, integrity, availability, authentication, accountability, and privacy. Our review also identifies the associated cybersecurity challenges that might impact cloud-supported CV applications and corresponding solutions to these challenges. In addition, we present future research opportunities to prevent and mitigate cybersecurity issues in cloud computing for CV-related applications.
引用
收藏
页码:8250 / 8268
页数:19
相关论文
共 50 条
  • [21] Users' perception of cybersecurity, trust and cloud computing providers' performance
    Xu, Hongjiang
    Mahenthiran, Sakthi
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (05) : 816 - 835
  • [22] Enhancing cybersecurity in cloud computing and WSNs: A hybrid IDS approach
    Sundaramoorthy, K.
    Purushothaman, K. E.
    Sonia, J. Jeba
    Kanthimathi, N.
    COMPUTERS & SECURITY, 2024, 147
  • [23] Applying Virtualization and Cloud Computing Platform in Designing Cybersecurity Lab
    Nguyen Pham Sy
    Trung Tran
    Tung Nguyen Khanh
    Tuan Nguyen Dinh
    Phuong Luong Thi Bich
    2023 ASIA MEETING ON ENVIRONMENT AND ELECTRICAL ENGINEERING, EEE-AM, 2023,
  • [24] Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing
    Temghart, Abdelkarim Ait
    Marwan, Mbarek
    Baslam, Mohamed
    Security and Communication Networks, 2023, 2023
  • [25] Measuring the Cybersecurity of Cloud Computing A Stakeholder Centered Economic Approach
    Ahmed, Nahla Murtada
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONICS ENGINEERING (ICCEEE), 2013, : 294 - 299
  • [26] A REVIEW ON RELATIONSHIP BETWEEN IOT- CLOUD COMPUTING - FOG COMPUTING (APPLICATIONS AND CHALLENGES)
    El Idrissi, Mohammed
    Elbeqqali, Omar
    Riffi, Jamal
    2019 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS 2019), 2019,
  • [27] Supporting Multi-Cloud in Serverless Computing
    Zhao, Haidong
    Benomar, Zakaria
    Pfandzelter, Tobias
    Georgantas, Nikolaos
    2022 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC, 2022, : 285 - 290
  • [28] A REVIEW ON CLOUD COMPUTING
    Puri, Gurmeher Singh
    Tiwary, Ravi
    Shukla, Shipra
    2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 63 - 68
  • [29] A Review of Cloud Computing
    Dudin, E. B.
    Smetanin, Yu. G.
    SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2011, 38 (04) : 280 - 284
  • [30] SECURITY AND PRIVACY OF CONNECTED VEHICULAR CLOUD COMPUTING
    Li, Hongwei
    Lu, Rongxing
    Misic, Jelena
    Mahmoud, Mohamed
    IEEE NETWORK, 2018, 32 (03): : 4 - 6