A Novel Cloud Computing Architecture Oriented Internet of Vehicles

  • He XUEmail author
  • Ye DING
  • Peng LI
  • Ruchuan WANG
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 1)


Internet of Vehicles is one of the applications of the Internet of things technology in the field of intelligent transportation, and cloud computing is a new computing model which can provide services to users. The road safety requirements are very important in Internet of Vehicles, such as road accidents, motor vehicle violations of traffic signs, the driver drinking or fatigue driving and other issues which are needed to be timely warning and performing related processing. For this purpose, a novel cloud computing application framework is proposed, which can deal with the problem of road traffic safety in time, and solve the problem of real-time multimedia service and security authentication service on the vehicle terminal, making the Internet of Vehicles users to enjoy the network service at anytime and anywhere.


Internet of Vehicles Cloud Computing Electric Power Cloud Internet of Things 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Barrero F, Guevara J A, Vargas E, et al. Networked transducers in intelligent transportation systems based on the IEEE 1451 standard[J]. Computer Standards & Interfaces. 2014, 36(2): 300-311.Google Scholar
  2. 2.
    Erl T, Puttini R, Mahmood Z. Cloud Computing: Concepts, Technology, & Architecture[M]. Pearson Education, 2013.Google Scholar
  3. 3.
    Yuriyama M, Kushida T. Integrated cloud computing environment with IT resources and sensor devices[J]. International Journal of Space-Based and Situated Computing, 2011, 1(2/3):163 - 173.Google Scholar
  4. 4.
    Kopetzky R, Nther M, Kryvinska N, et al. Strategic management of disruptive technologies: a practical framework in the context of voice services and of computing towards the cloud[J]. International Journal of Grid & Utility Computing, 2013, 4(4):47-59.Google Scholar
  5. 5.
    Shen Q, Yang Y, Wu Z, et al. Securing data services: a security architecture design for private storage cloud based on HDFS[J]. International Journal of Grid & Utility Computing, 2013, 4(4):242-254.Google Scholar
  6. 6.
    Ma K, Zhang L. Bookmarklet-triggered unified literature sharing services in the cloud[J]. International Journal of Grid & Utility Computing, 2014, 5(4):217-226.Google Scholar
  7. 7.
    Fernando N, Loke S W, Rahayu W. Mobile cloud computing: A survey[J]. Future Generation Computer Systems. 2013, 29(1): 84-106.Google Scholar
  8. 8.
    Dinh H T, Lee C, Niyato D, et al. A survey of mobile cloud computing: architecture, applications, and approaches[J]. Wireless communications and mobile computing. 2013, 13(18): 1587-1611.Google Scholar
  9. 9.
    Zhang Xiao. The power of cloud simulation laboratory project through the acceptance of China ICT companies [N].State Grid News,2011-02-11.Google Scholar
  10. 10.
    Zeadally S, Hunt R, Chen Y, et al. Vehicular ad hoc networks (VANETS): status, results, and challenges[J]. Telecommunication Systems. 2012, 50(4): 217-241.Google Scholar
  11. 11.
    Bitam S, Mellouk A, Zeadally S. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks[J]. Wireless Communications, IEEE. 2015, 22(1): 96-102.Google Scholar
  12. 12.
    Perkins C E. Ad hoc networking[M]. Addison-Wesley Professional, 2008.Google Scholar
  13. 13.
    Huang Xiaoyuan. Cloud Platform Resources Scheduling Problem Research Based on Internet of Vehicles[D]. PhD Thesis, China: Dalian University of Technology, 2014.Google Scholar
  14. 14.
    Markovic D S, Zivkovic D, Branovic I, et al. Smart power grid and cloud computing[J]. Renewable and Sustainable Energy Reviews. 2013, 24: 566-577.Google Scholar
  15. 15.
    Xia Wenlong. Mobile Cloud-based Vehicular Networks Design And Key Technologies[D]. PhD Thesis, China: Guangdong University of Technology, 2014.Google Scholar
  16. 16.
    Nkenyereye L, Jang J W. Cloud Computing Enabled External Applications to Car Users using Nomadic Smartphones[C]. International Conference on Computer Information Systems and Industrial Applications, 2015. Atlantis Press, 2015.Google Scholar
  17. 17.
    PRESS. Cloud computing will be the driving force to drive the world [J]. Information System Engineering, 2015,5(20): 6-7.Google Scholar
  18. 18.
    Basaras P, Maglaras L, Katsaros D, et al. A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks[J]. arXiv preprint arXiv:1506.05017. 2015.Google Scholar
  19. 19.
    Gazdar T, Benslimane A, Belghith A, et al. A secure cluster-based architecture for certificates management in vehicular networks[J]. Security and Communication Networks. 2014, 7(3): 665-683.Google Scholar
  20. 20.
    Hussain R. Cooperation-aware VANET clouds: providing secure cloud services to vehicular ad hoc networks[J]. Journal of information processing systems. 2014, 10(1): 103-118.Google Scholar
  21. 21.
    Lim K, Abumuhfouz I M, Manivannan D. Secure Incentive-Based Architecture for Vehicular Cloud[M]. Ad-hoc, Mobile, and Wireless Networks, Springer, 2015, 361-374.Google Scholar
  22. 22.
    Park Y, Sur C, Rhee K. Pseudonymous authentication for secure V2I services in cloudbased vehicular networks[J]. Journal of Ambient Intelligence and Humanized Computing. 2015: 1-11.Google Scholar
  23. 23.
    Zhou J, Dong X, Cao Z, et al. Secure and Privacy Preserving Protocol for Cloud-based Vehicular DTNs[J]. IEEE Transactions on Information Forensics and Security. 2015, 10(6): 1299-1314.Google Scholar
  24. 24.
    Housley R, Polk T. Planning for PKI: best practices guide for deploying public key infrastructure[M]. John Wiley & Sons, Inc., 2001.Google Scholar
  25. 25.
    Yan G, Rawat D B, Bista B B. Towards secure vehicular clouds[C]. 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), 2012. IEEE, 2012: 370-375.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Computer Science & Technology/School of softwareNanjing University of Posts and TelecommunicationsNanjingChina
  2. 2.Jiangsu High Technology Research Key Laboratory for Wireless Sensor NetworksNanjingChina

Personalised recommendations