Skip to main content

Secure Smart Vehicle Cloud Computing System for Smart Cities

  • Chapter
  • First Online:

Part of the book series: Studies in Big Data ((SBD,volume 39))

Abstract

We acquire or provide most of the services with the help of the Internet in the fast-growing world. We should deploy various kinds of systems globally so that other users can practice the same effortlessly, and use storage framework to provide conveniences world-wide effectively. Nowadays, we practice vehicular communication technology to exchange diversified data for varied intentions, which helps vehicle operators in diversified manners such as traffic awareness, weather conditions, road assistance, automatic toll payment system, etc. In this chapter, we converse about data transmission through vehicular ad-hoc networks, cloud computing in the vehicular technology. After that, we survey of different schemes related to secure routing and geo-location details of vehicles. We illustrate concerning security demands, possible attacks, and challenges in the vehicular cloud computing (VCC) architecture. Conclusively, we suggest a new identification scheme to get access of the VCC system from the user end, which can be secured against varied attacks. Moreover, we do analysis of the suggested system to determine security worthiness and measure total required time to execute the phases.

The original version of this chapter was revised: Missed out author corrections have been incorporated. The erratum to this chapter is available at https://doi.org/10.1007/978-3-319-73676-1_18

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. S. Olariu, I. Khalil, M. Abuelela, Taking VANET to the clouds. Int. J. Pervasive Comput. Commun. 7(1), 7–21 (2011)

    Article  Google Scholar 

  2. M. Eltoweissy, S. Olariu, M. Younis, Towards autonomous vehicular clouds, in International Conference on Ad Hoc Networks (Springer, Berlin, Heidelberg, 2010), pp. 1–16

    Google Scholar 

  3. S. Biswas, R. Tatchikou, F. Dion, Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety. IEEE Commun. Mag. 44(1), 74–82 (2006)

    Article  Google Scholar 

  4. I. Takai, T. Harada, M. Andoh, K. Yasutomi, K. Kagawa, S. Kawahito, Optical vehicle-to-vehicle communication system using LED transmitter and camera receiver. IEEE Photonics J. 6(5), 1–14 (2014)

    Article  Google Scholar 

  5. C. Perkins, E. Belding-Royer, S. Das, Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561) (2003)

    Google Scholar 

  6. V. Namboodiri, M. Agarwal, L. Gao, A study on the feasibility of mobile gateways for vehicular ad-hoc networks, in Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (2004), pp. 66–75

    Google Scholar 

  7. V. Naumov, R. Baumann, T. Gross, An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces, in Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (2006), pp. 108–119

    Google Scholar 

  8. S.K. Dhurandher, S. Misra, M.S. Obaidat, M. Gupta, K. Diwakar, P. Gupta, Efficient angular routing protocol for inter-vehicular communication in vehicular ad hoc networks. IET Commun. 4(7), 826–836 (2010)

    Article  Google Scholar 

  9. C. Wu, S. Ohzahata, T. Kato, Flexible, portable, and practicable solution for routing in VANETs: a fuzzy constraint Q-learning approach. IEEE Trans. Veh. Technol. 62(9), 4251–4263 (2013)

    Article  Google Scholar 

  10. R. Chen, F. Bao, M. Chang, J.H. Cho, Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans. Parallel Distrib. Syst. 25(5), 1200–1210 (2014)

    Article  Google Scholar 

  11. S.K. Bhoi, P.M. Khilar, SIR: a secure and intelligent routing protocol for vehicular ad hoc network. IET Netw. 4(3), 185–194 (2014)

    Article  Google Scholar 

  12. S. Capkun, J.P. Hubaux, Secure positioning in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 221–232 (2006)

    Article  Google Scholar 

  13. X. Lin, X. Sun, P.H. Ho, X. Shen, GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  14. C. Zhang, R. Lu, X. Lin, P.H. Ho, X. Shen, An efficient identity-based batch verification scheme for vehicular sensor networks, in The 27th Conference on Computer Communications, INFOCOM 2008 (IEEE, 2008), pp. 246–250

    Google Scholar 

  15. Gongjun Yan, Stephan Olariu, Michele C. Weigle, Providing location security in vehicular Ad Hoc networks. IEEE Wirel. Commun. 16(6), 48–53 (2009)

    Article  Google Scholar 

  16. J. Sun, C. Zhang, Y. Zhang, Y. Fang, An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21(9), 1227–1239 (2010)

    Article  Google Scholar 

  17. D. Wu, Y. Zhang, L. Bao, A.C. Regan, Location-based crowdsourcing for vehicular communication in hybrid networks. IEEE Trans. Intell. Transp. Syst. 14(2), 837–846 (2013)

    Article  Google Scholar 

  18. J. Kang, R. Yu, X. Huang, M. Jonsson, H. Bogucka, S. Gjessing, Y. Zhang, Location privacy attacks and defenses in cloud-enabled internet of vehicles. IEEE Wirel. Commun. 23(5), 52–59 (2016)

    Article  Google Scholar 

  19. N. Santos, K.P. Gummadi, R. Rodrigues, Towards trusted cloud computing. HotCloud 9(9), 3 (2009)

    Google Scholar 

  20. M. Jensen, J. Schwenk, N. Gruschka, L.L. Iacono, On technical security issues in cloud computing, in IEEE International Conference on Cloud Computing, 2009. CLOUD’09 (2009), pp. 109–116

    Google Scholar 

  21. C. Wang, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for data storage security in cloud computing, in Proceedings of the IEEE INFOCOM (2010), pp. 1–9

    Google Scholar 

  22. C. Wang, S.S. Chow, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  23. J. Zhou, X. Dong, Z. Cao, A.V. Vasilakos, Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans. Inf. Forensics Secur. 10(6), 1299–1314 (2015)

    Article  Google Scholar 

  24. R. Madhusudhan, R.C. Mittal, Dynamic ID-based remote user password authentication schemes using smart cards: a review. J. Netw. Comput. Appl. 35(4), 1235–1248 (2012)

    Article  Google Scholar 

  25. T. Limbasiya, N. Doshi, An analytical study of biometric based remote user authentication schemes using smart cards. Comput. Electr. Eng. 59, 305–321 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

We are grateful to the anonymous reviewers for their noteworthy time and effort in suggesting their exceptional views on the chapter in the review process. In addition, we are thankful to editors for the handling of this book. This work is partially supported by Early Career Research Award from Science and Engineering Research Board (SERB), Department of Science and Technology(DST), Govt. of India, New Delhi, India (Project Number: ECR/2015/000256).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debasis Das .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Limbasiya, T., Das, D. (2018). Secure Smart Vehicle Cloud Computing System for Smart Cities. In: Mishra, B., Das, H., Dehuri, S., Jagadev, A. (eds) Cloud Computing for Optimization: Foundations, Applications, and Challenges. Studies in Big Data, vol 39. Springer, Cham. https://doi.org/10.1007/978-3-319-73676-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73676-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73675-4

  • Online ISBN: 978-3-319-73676-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics