Skip to main content

Vehicular Cloud Networks: Architecture and Security

  • Chapter
  • First Online:

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Cloud computing has been widely adopted across the IT industry due to its scalable, cost-effective, and efficient services. It has many applications in areas such as healthcare, mobile cloud computing (MCC), and vehicular ad hoc networks (VANET). Vehicular cloud networks (VCN) is another application of cloud computing which is a combination of cloud and VANET technologies. It is composed of three clouds named vehicular cloud, infrastructure cloud, and traditional IT cloud. In this chapter, the three clouds involved in VCN are presented using a three-tier architecture, and the security issues related to each tier are described in detail. After describing the detailed architecture of VANET, their components, and their important characteristics, this chapter presents the architecture of VCN. It is followed by the detailed analysis of the threats to which each tier-cloud of VCN is vulnerable.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611

    Google Scholar 

  2. Chandrasekaran G (2008) VANETs: the networking platform for future vehicular applications. Department of Computer Science, Rutgers University

    Google Scholar 

  3. Boukerche A, Oliveira HA, Nakamura EF, Loureiro AA (2008) Vehicular ad hoc networks: a new challenge for localization-based systems. Comput Commun 31(12):2838–2849

    Google Scholar 

  4. Ahmad F, Adnane A (2015) Design of trust based context aware routing protocol in vehicular networks. In: Ninth IFIP WG 11.11 international conference on trust management (IFIPTM’15), Hamburg

    Google Scholar 

  5. Ahmad F, Marwat SNK, Zaki Y, Goerg C (2014) Tailoring LTE-advanced for M2M communication using wireless inband relay node. In: Proceedings of world telecommunications congress 2014 (WTC’14). VDE, Berlin, Germany, pp 1–3

    Google Scholar 

  6. Ahmad F, Marwat SNK, Zaki Y, Mehmood Y, Cörg C (2014) Machine-to-machine sensor data multiplexing using LTE-advanced relay node for logistics. In: 4th international conference on dynamics in logistics (LDIC’14), Bremen

    Google Scholar 

  7. Mármol FG, Kuhnen MQ (2013) Reputation-based web service orchestration in cloud computing: a survey. Concurr Comput Pract Exp. doi: 10.1002/cpe.3177

  8. Alriyami Q, Adnane A, Kim Smith A (2014) Evaluation criteria for trust management in vehicular ad-hoc networks (VANETs). In: The 3rd international conference on connected vehicles & expo (ICCVE 2014), Vienna. IEEE

    Google Scholar 

  9. Raya M, Hubaux J-P (2007) Securing vehicular ad-hoc networks. J Comput Secur 15(1):39–68

    Google Scholar 

  10. Li F, Wang Y, Routing in vehicular ad-hoc networks: a survey. IEEE Veh Technol Mag

    Google Scholar 

  11. Lin Y-W, Chen Y-S, Lee S (2010) Routing protocols in vehicular ad hoc networks: a survey and future perspectives. J Inf Sci Eng 26(3):913–932

    Google Scholar 

  12. Benamar M, Benamar N, Singh KD, El Ouadghiri D (2013) Recent study of routing protocols in VANET: survey and taxonomy. In: WVNT 2013: 1st international workshop on vehicular networks and telematics, Marrakech

    Google Scholar 

  13. Al-kahtani M (2012) Survey on security attacks in vehicular ad hoc networks(VANETs). In: 6th international conference on signal processing and communication systems (ICSPCS), Gold Coast, pp 1–9

    Google Scholar 

  14. Wex P, Breuer J, Held A, Leinmuller T, Delgrossi L (2008) Trust issues for vehicular ad-hoc networks. In: Vehicular technology conference, 2008. VTC Spring 2008, Singapore. IEEE, pp 2800–2804

    Google Scholar 

  15. Grassi G, Pesavento D, Wang L, Pau G, Vuyyuru R, Wakikawa R, Zhang L (2013) Acm hotmobile 2013 poster: vehicular inter-networking via named data. ACM SIGMOBILE Mob Comput Commun Rev 17(3):23–24

    Google Scholar 

  16. Grassi G, Pesavento D, Pau G, Vuyyuru R, Wakikawa R, Zhang L (2014) VANET via named data networking. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS), Toronto. IEEE, pp 410–415

    Google Scholar 

  17. Olariu S, Eltoweissy M, Younis M (2011) Towards autonomous vehicular clouds. EAI Endorsed ICST Trans Mob Commun Appl 11:e2

    Google Scholar 

  18. Bernstein D, Vidovic N, Modi S (2010) A cloud PAAS for high scale, function, and velocity mobile applications-with reference application as the fully connected car. In: Proceedings of the 2010 fifth international conference on systems and networks communications (ICSNC), Nice. IEEE Computer Society, pp 117–123

    Google Scholar 

  19. Son J, Eun H, Oh H, Kim S, Hussain R (2012) Rethinking vehicular communications: merging vanet with cloud computing. In: Proceedings of the 2012 IEEE 4th international conference on cloud computing technology and science (CloudCom), Taipei. IEEE Computer Society, pp 606–609

    Google Scholar 

  20. Yu R, Zhang Y, Gjessing S, Xia W, Yang K (2013) Toward cloud-based vehicular networks with efficient resource management. IEEE Netw 27:48–55

    Google Scholar 

  21. Lee E, Lee E-K, Gerla M, Oh S (2014) Vehicular cloud networking: architecture and design principles. IEEE Commun Mag 52:148–155

    Google Scholar 

  22. Nilsson DK, Larson UE (2008) Combining physical and digital evidence in vehicle environments. In: Third international workshop on systematic approaches to digital forensic engineering (SADFE’08), Berkeley. IEEE, pp 10–14

    Google Scholar 

  23. Nilsson DK, Larson UE (2008) Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. In: Proceedings of the 1st ACM international conference on forensic applications and techniques in telecommunications, information, and multimedia, Adelaide

    Google Scholar 

  24. Yan G, Rawat D, Bista B (2012) Towards secure vehicular clouds. In: Sixth international conference on complex, intelligent and software intensive systems (CISIS), Palermo, pp 370–375

    Google Scholar 

  25. Plossl K, Nowey T, Mletzko C (2006) Towards a security architecture for vehicular ad-hoc networks. In: IEEE first international conference on availability, reliability and security (ARES), Vienna

    Google Scholar 

  26. Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1:53–66

    Google Scholar 

  27. Grover J, Gaur MS, Laxmi V (2013) Trust establishment techniques in VANET. In: Wireless network security, signals and communication technology. Springer, Berlin, pp 273–301

    Google Scholar 

  28. Group TTW et al (2013) The notorious nine: cloud computing top threats in 2013. In: Cloud security alliance, 2013, San Francisco

    Google Scholar 

  29. Kortchinsky K (2009) Cloudburst: A VMware guest to host escape story. In: Black Hat USA, Las Vegas

    Google Scholar 

  30. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58

    Google Scholar 

  31. Choubey R, Dubey R, Bhattacharjee J (2011) A survey on cloud computing security, challenges and threats. Int J Comput Sci Eng (IJCSE) 3(3):1227–1231

    Google Scholar 

  32. Kazim M, Zhu SY (2015) A survey on top security threats in cloud computing. Int J Adv Comput Sci Appl (IJACSA) 6(3):109–113

    Google Scholar 

  33. Zafar MS, Ahmad F (2014) A study on personalization and customization mechanisms of vehicular cloud platform. In: IEEE/ACM 7th international conference on utility and cloud computing (UCC), London, pp 812–817

    Google Scholar 

  34. Patel P, Ranabahu AH, Sheth AP (2009) Service level agreement in cloud computing. In: International conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA), Orlando, USA

    Google Scholar 

  35. Whitney L (2009) Amazon EC2 cloud service hit by botnet, outage. CNET News, vol 11

    Google Scholar 

  36. Matthews JN, Dow EM, Deshane T, Hu W, Bongio J, Wilbur PF, Johnson B (2008) Running xen: a hands-on guide to the art of virtualization. Prentice Hall PTR, Upper Saddle River

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farhan Ahmad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ahmad, F., Kazim, M., Adnane, A. (2015). Vehicular Cloud Networks: Architecture and Security. In: Zhu, S., Hill, R., Trovati, M. (eds) Guide to Security Assurance for Cloud Computing. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-25988-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25988-8_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25986-4

  • Online ISBN: 978-3-319-25988-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics