Towards an Analysis of the Architecture, Security, and Privacy Issues in Vehicular Fog Computing

被引:12
|
作者
Hoque, Mohammad Aminul [1 ]
Hasan, Ragib [1 ]
机构
[1] Univ Alabama Birmingham, SECRETLab, Dept Comp Sci, Birmingham, AL 35294 USA
来源
2019 IEEE SOUTHEASTCON | 2019年
基金
美国国家科学基金会;
关键词
Fog Computing; Vehicular Fog; Vehicular Cloud; Vehicular Network; Cloud Computing; Security; Privacy;
D O I
10.1109/southeastcon42311.2019.9020476
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The vehicular fog is a relatively new computing paradigm where fog computing works with the vehicular network. It provides computation, storage, and location-aware services with low latency to the vehicles in close proximity. A vehicular fog network can be formed on-the-fly by adding underutilized or unused resources of nearby parked or moving vehicles. Interested vehicles can outsource their resources or data by being added to the vehicular fog network while maintaining proper security and privacy. Client vehicles can use these resources or services for performing computation-intensive tasks, storing data, or getting crowdsource reports through the proper secure and privacy-preserving communication channel. As most vehicular network applications are latency and location sensitive, fog is more suitable than the cloud because of the capability of performing calculations with low latency, location awareness, and the support of mobility. Architecture, security, and privacy models of vehicular fog are not well defined and widely accepted yet as it is in its early stage. In this paper, we have analyzed existing studies on vehicular fog to determine the requirements and issues related to the architecture, security, and privacy of vehicular fog computing. We have also identified and highlighted the open research problems in this promising area.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Security and Privacy Management in a Fog-to-Cloud Environment
    Salis, Antonio
    Jensen, Jens
    Bulla, Roberto
    Mancini, Glauco
    Cocco, Paolo
    EURO-PAR 2019: PARALLEL PROCESSING WORKSHOPS, 2020, 11997 : 99 - 111
  • [42] Security and Privacy Issues in Cloud Computing
    UbaidullahBokhari, Mohammad
    MakkiShallal, Qahtan
    Tamandani, Yahya Kord
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 896 - 900
  • [43] Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments
    Sun, Dawei
    Chang, Guiran
    Sun, Lina
    Wang, Xingwei
    CEIS 2011, 2011, 15
  • [44] Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues
    Kang Kai
    Wang Cong
    Luo Tao
    The Journal of China Universities of Posts and Telecommunications, 2016, 23 (02) : 56 - 65
  • [45] Fog computing: from architecture to edge computing and big data processing
    Singh, Simar Preet
    Nayyar, Anand
    Kumar, Rajesh
    Sharma, Anju
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (04) : 2070 - 2105
  • [46] Deploying Fog-to-Cloud Towards a Security Architecture for Critical Infrastructure Scenarios
    Kahvazadeh, Sarang
    Masip-Bruin, Xavi
    Marcer, Pau
    Marin-Tordera, Eva
    COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 35 - 48
  • [47] Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Lu, Rongxing
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (05) : 4692 - 4705
  • [48] A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things
    Alwarafy, Abdulmalik
    Al-Thelaya, Khaled A.
    Abdallah, Mohamed
    Schneider, Jens
    Hamdi, Mounir
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4004 - 4022
  • [49] Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    IEEE ACCESS, 2021, 9 (09): : 18706 - 18721
  • [50] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859