A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle Applications

被引:26
作者
Salek, M. Sabbir [1 ]
Khan, Sakib Mahmud [1 ]
Rahman, Mizanur [2 ]
Deng, Hsien-Wen [3 ]
Islam, Mhafuzul [1 ]
Khan, Zadid [1 ]
Chowdhury, Mahsrur [1 ]
Shue, Mitch [3 ]
机构
[1] Clemson Univ, Glenn Dept Civil Engn, Clemson, SC 29634 USA
[2] Univ Alabama, Dept Civil Construct & Environm Engn, Tuscaloosa, AL 35487 USA
[3] Clemson Univ, Sch Comp, Clemson, SC 29634 USA
关键词
Cloud computing; Computer security; Computer architecture; Internet of Things; Transportation; Computer crime; Real-time systems; connected vehicle (CV); cybersecurity; Internet of Things (IoT); VANET SECURITY CHALLENGES; PRIVACY CHALLENGES; BLOCKCHAIN; KEY; AUTHENTICATION; SCHEME; COMMUNICATION; ARCHITECTURE; MANAGEMENT; FRAMEWORK;
D O I
10.1109/JIOT.2022.3152477
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an Internet of Things (IoT) environment, cloud computing is emerging as a technologically feasible and economically viable solution for supporting real-time and non-real-time connected vehicle (CV) applications due to its unlimited storage, enormous computing capabilities, and cost advantage, i.e., cloud computing costs less than owning such systems. However, maintaining cybersecurity is a major challenge in cloud-supported CV applications as it requires CVs and various transportation or non-transportation services to exchange data with the cloud via multiple wired and wireless communication networks. In this article, we review the cybersecurity requirements of cloud-supported CV applications, such as confidentiality, integrity, availability, authentication, accountability, and privacy. Our review also identifies the associated cybersecurity challenges that might impact cloud-supported CV applications and corresponding solutions to these challenges. In addition, we present future research opportunities to prevent and mitigate cybersecurity issues in cloud computing for CV-related applications.
引用
收藏
页码:8250 / 8268
页数:19
相关论文
共 143 条
[1]  
Agarwal Yash, 2018, International Journal of Transportation Science and Technology, V7, P60, DOI 10.1016/j.ijtst.2017.12.001
[2]   Vehicular Cloud Networks: Architecture, Applications and Security Issues [J].
Ahmad, Farhan ;
Kazim, Muhammad ;
Adnane, Asma ;
Awad, Abir .
2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, :571-576
[3]   Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection [J].
Aladwan, Mohammad ;
Awaysheh, Feras ;
Cabaleiro, Jose ;
Pena, Tomas ;
Alabool, Hamzeh ;
Alazab, Mamoun .
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, :814-820
[4]  
Amarasinghe M, 2015, 2015 FIFTEENTH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER), P243, DOI 10.1109/ICTER.2015.7377695
[5]  
[Anonymous], 2013, NOTORIOUS 9 CLOUD CO
[6]  
[Anonymous], 2011, GOOGLES SELF DRIVING
[7]  
[Anonymous], 2009, Tech. Rep.
[8]  
[Anonymous], DESIGNING CONNECTED
[9]  
[Anonymous], 2017, SEC GUID CRIT AR FOC
[10]  
[Anonymous], 2011, International Journal of Computational Engineering Management