Abstract
Cloud computing has been widely adopted across the IT industry due to its scalable, cost-effective, and efficient services. It has many applications in areas such as healthcare, mobile cloud computing (MCC), and vehicular ad hoc networks (VANET). Vehicular cloud networks (VCN) is another application of cloud computing which is a combination of cloud and VANET technologies. It is composed of three clouds named vehicular cloud, infrastructure cloud, and traditional IT cloud. In this chapter, the three clouds involved in VCN are presented using a three-tier architecture, and the security issues related to each tier are described in detail. After describing the detailed architecture of VANET, their components, and their important characteristics, this chapter presents the architecture of VCN. It is followed by the detailed analysis of the threats to which each tier-cloud of VCN is vulnerable.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611
Chandrasekaran G (2008) VANETs: the networking platform for future vehicular applications. Department of Computer Science, Rutgers University
Boukerche A, Oliveira HA, Nakamura EF, Loureiro AA (2008) Vehicular ad hoc networks: a new challenge for localization-based systems. Comput Commun 31(12):2838–2849
Ahmad F, Adnane A (2015) Design of trust based context aware routing protocol in vehicular networks. In: Ninth IFIP WG 11.11 international conference on trust management (IFIPTM’15), Hamburg
Ahmad F, Marwat SNK, Zaki Y, Goerg C (2014) Tailoring LTE-advanced for M2M communication using wireless inband relay node. In: Proceedings of world telecommunications congress 2014 (WTC’14). VDE, Berlin, Germany, pp 1–3
Ahmad F, Marwat SNK, Zaki Y, Mehmood Y, Cörg C (2014) Machine-to-machine sensor data multiplexing using LTE-advanced relay node for logistics. In: 4th international conference on dynamics in logistics (LDIC’14), Bremen
Mármol FG, Kuhnen MQ (2013) Reputation-based web service orchestration in cloud computing: a survey. Concurr Comput Pract Exp. doi: 10.1002/cpe.3177
Alriyami Q, Adnane A, Kim Smith A (2014) Evaluation criteria for trust management in vehicular ad-hoc networks (VANETs). In: The 3rd international conference on connected vehicles & expo (ICCVE 2014), Vienna. IEEE
Raya M, Hubaux J-P (2007) Securing vehicular ad-hoc networks. J Comput Secur 15(1):39–68
Li F, Wang Y, Routing in vehicular ad-hoc networks: a survey. IEEE Veh Technol Mag
Lin Y-W, Chen Y-S, Lee S (2010) Routing protocols in vehicular ad hoc networks: a survey and future perspectives. J Inf Sci Eng 26(3):913–932
Benamar M, Benamar N, Singh KD, El Ouadghiri D (2013) Recent study of routing protocols in VANET: survey and taxonomy. In: WVNT 2013: 1st international workshop on vehicular networks and telematics, Marrakech
Al-kahtani M (2012) Survey on security attacks in vehicular ad hoc networks(VANETs). In: 6th international conference on signal processing and communication systems (ICSPCS), Gold Coast, pp 1–9
Wex P, Breuer J, Held A, Leinmuller T, Delgrossi L (2008) Trust issues for vehicular ad-hoc networks. In: Vehicular technology conference, 2008. VTC Spring 2008, Singapore. IEEE, pp 2800–2804
Grassi G, Pesavento D, Wang L, Pau G, Vuyyuru R, Wakikawa R, Zhang L (2013) Acm hotmobile 2013 poster: vehicular inter-networking via named data. ACM SIGMOBILE Mob Comput Commun Rev 17(3):23–24
Grassi G, Pesavento D, Pau G, Vuyyuru R, Wakikawa R, Zhang L (2014) VANET via named data networking. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS), Toronto. IEEE, pp 410–415
Olariu S, Eltoweissy M, Younis M (2011) Towards autonomous vehicular clouds. EAI Endorsed ICST Trans Mob Commun Appl 11:e2
Bernstein D, Vidovic N, Modi S (2010) A cloud PAAS for high scale, function, and velocity mobile applications-with reference application as the fully connected car. In: Proceedings of the 2010 fifth international conference on systems and networks communications (ICSNC), Nice. IEEE Computer Society, pp 117–123
Son J, Eun H, Oh H, Kim S, Hussain R (2012) Rethinking vehicular communications: merging vanet with cloud computing. In: Proceedings of the 2012 IEEE 4th international conference on cloud computing technology and science (CloudCom), Taipei. IEEE Computer Society, pp 606–609
Yu R, Zhang Y, Gjessing S, Xia W, Yang K (2013) Toward cloud-based vehicular networks with efficient resource management. IEEE Netw 27:48–55
Lee E, Lee E-K, Gerla M, Oh S (2014) Vehicular cloud networking: architecture and design principles. IEEE Commun Mag 52:148–155
Nilsson DK, Larson UE (2008) Combining physical and digital evidence in vehicle environments. In: Third international workshop on systematic approaches to digital forensic engineering (SADFE’08), Berkeley. IEEE, pp 10–14
Nilsson DK, Larson UE (2008) Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. In: Proceedings of the 1st ACM international conference on forensic applications and techniques in telecommunications, information, and multimedia, Adelaide
Yan G, Rawat D, Bista B (2012) Towards secure vehicular clouds. In: Sixth international conference on complex, intelligent and software intensive systems (CISIS), Palermo, pp 370–375
Plossl K, Nowey T, Mletzko C (2006) Towards a security architecture for vehicular ad-hoc networks. In: IEEE first international conference on availability, reliability and security (ARES), Vienna
Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1:53–66
Grover J, Gaur MS, Laxmi V (2013) Trust establishment techniques in VANET. In: Wireless network security, signals and communication technology. Springer, Berlin, pp 273–301
Group TTW et al (2013) The notorious nine: cloud computing top threats in 2013. In: Cloud security alliance, 2013, San Francisco
Kortchinsky K (2009) Cloudburst: A VMware guest to host escape story. In: Black Hat USA, Las Vegas
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58
Choubey R, Dubey R, Bhattacharjee J (2011) A survey on cloud computing security, challenges and threats. Int J Comput Sci Eng (IJCSE) 3(3):1227–1231
Kazim M, Zhu SY (2015) A survey on top security threats in cloud computing. Int J Adv Comput Sci Appl (IJACSA) 6(3):109–113
Zafar MS, Ahmad F (2014) A study on personalization and customization mechanisms of vehicular cloud platform. In: IEEE/ACM 7th international conference on utility and cloud computing (UCC), London, pp 812–817
Patel P, Ranabahu AH, Sheth AP (2009) Service level agreement in cloud computing. In: International conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA), Orlando, USA
Whitney L (2009) Amazon EC2 cloud service hit by botnet, outage. CNET News, vol 11
Matthews JN, Dow EM, Deshane T, Hu W, Bongio J, Wilbur PF, Johnson B (2008) Running xen: a hands-on guide to the art of virtualization. Prentice Hall PTR, Upper Saddle River
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ahmad, F., Kazim, M., Adnane, A. (2015). Vehicular Cloud Networks: Architecture and Security. In: Zhu, S., Hill, R., Trovati, M. (eds) Guide to Security Assurance for Cloud Computing. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-25988-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-25988-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25986-4
Online ISBN: 978-3-319-25988-8
eBook Packages: Computer ScienceComputer Science (R0)