skip to main content
10.1145/2345396.2345422acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacciciConference Proceedingsconference-collections
research-article

V2C: a secure vehicle to cloud framework for virtualized and on-demand service provisioning

Published: 03 August 2012 Publication History

Abstract

Cloud computing has revolutionized the IT industry by enabling a virtualized resource provisioning model for organizations. The Network-as-a-Service (NaaS) provisioning model enables new ways of providing virtually isolated and on-demand networking capabilities in existing cloud provisioning models, resulting in best-effort performance, scalable data throughput, reduced latency, and reduced configuration complexity. In this paper we propose V2C, an elastic Vehicle-to-Cloud infrastructure that integrates NaaS into the automotive ecosystem and enables provisioning of vehicle-based services for automobile users. However, V2C introduces various security challenges and the main objective of this paper is to propose a secure provisioning model to address them.

References

[1]
Lee Badger, Robert Patt-corner, and Jeff Voas. DRAFT Cloud Computing Synopsis and Recommendations of the National Institute of Standards and Technology. NIST Special Publication, 117:84, 2011.
[2]
Peter Mell and Timothy Grance. The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology. NIST Special Publication, 145(6):7, 2011.
[3]
S. Tanimoto, M. Hiramoto, M. Iwashita, H. Sato, and A. Kanai. Risk management on the security problem in cloud computing. In Computers, Networks, Systems and Industrial Engineering (CNSI), 2011 First ACIS/JNU International Conference on, pages 147--152, may 2011.
[4]
M. Kantarcioglu, A. Bensoussan, and SingRu Hoe. Impact of security risks on cloud computing adoption. In Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, pages 670--674, sept. 2011.
[5]
Thomas Edwall. Scalable & Adaptive Internet Solutions (SAIL). Technical report, European Commission's 7th Framework Program, 2011.
[6]
Paul Murray. D-5.2 (D-D.1) Cloud Network Architecture Description. Technical report, European Commission's 7th Framework Program, 2011.
[7]
K Kaplan. Intel's Smart WiMAX Car - Mobility "Innovision" for Centrino 2, July 2008.
[8]
J. Mosyagin. Using 4G wireless technology in the car. In Transparent Optical Networks (ICTON), 2010 12th International Conference on, pages 1--4, July 2010.
[9]
Weidong Xiang, Yue Huang, and S Majhi. The Design of a Wireless Access for Vehicular Environment (WAVE) prototype for Intelligent Transportation System (ITS) and Vehicular Infrastructure Integration (VII). In Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th, pages 1--2, Sept. 2008.
[10]
J. Miller. Fastest path analysis in a Vehicle-to-Infrastructure intelligent transportation system architecture. In Intelligent Vehicles Symposium, 2009 IEEE, pages 1125--1130, June 2009.
[11]
M. Torrent-Moreno, J. Mittag, P. Santi, and H Hartenstein. Vehicle-to-Vehicle Communication: Fair Transmit Power Control for Safety-Critical Information. Vehicular Technology, IEEE Transactions on, 58(7):3684--3703, Sept. 2009.
[12]
Daiheng Ni. Determining traffic-flow characteristics by definition for application in ITS. Intelligent Transportation Systems, IEEE Transactions on, 8(2):181--187, June 2007.
[13]
N. Seddigh, B. Nandy, R. Makkar, and J. F. Beaumont. Security advances and challenges in 4G wireless networks. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on, pages 62--71, Aug. 2010.
[14]
Yu-Hunag Chu, Yao-Ting Chen, Yu-Chieh Chou, and Min-Chi Tseng. A simplified cloud computing network architecture using future internet technologies. In Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific, pages 1--4, Sept. 2011.
[15]
Volker Fusenig and Ayush Sharma. Security Architecture for Cloud Networking. In International Conference on Computing, Networking and Communication (ICNC), Maui, Hawaii, USA, 30th Jan. - 2nd Feb. 2012.
[16]
Peter Schoo, Volker Fusenig, Victor Souza, Marcio Melo, Paul Murray, Herve Debar, Houssem Medhioub, and Djamal Zeghlache. Challenges for Cloud Networking Security. In MONAMI, pages 298--313, 2010.
[17]
Björn Bjurling, Rebecca Steinert, and Daniel Gillblad. Translation of probabilistic QoS in hierarchical and decentralized settings. In APNOMS, pages 1--8, 2011.
[18]
P. Vijayakumar, S. Bose, A. Kannan, and S Siva Subramanian. A Secure Key Distribution Protocol for Multicast Communication. In Communications in Computer and Information Science, volume 140, pages 249--257. Springer, 2011.
[19]
Yating Hsu and D. Lee. Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization. In Network Protocols (ICNP), 2010 18th IEEE International Conference on, pages 164--173, oct. 2010.
[20]
Wang Bin, Huang He Yuan, Liu Xiao Xi, and Xu Jing Min. Open Identity Management Framework for SaaS Ecosystem. In e-Business Engineering, 2009. ICEBE '09. IEEE International Conference on, pages 512--517, Oct. 2009.
[21]
A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G Trouessin. Organization Based Access Control. In 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03), June 2003.
[22]
J Qian. ACLA: A framework for Access Control List (ACL) Analysis and Optimization. In Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century, pages 4, Deventer, The Netherlands, The Netherlands, 2001. Kluwer, B. V.
[23]
D. Clark and D Wilson. A Comparison of Commercial and Military Computer Security Policies. In IEEE symposium on security and privacy, pages 184--194, 1987.
[24]
Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, and Ira S. Moskowitz. A Strategy for an MLS Workflow Management System. In In Proceedings of the 18th IFIP Working Conference on Database Security, 1999.
[25]
Konstantin Knorr. Multilevel Security and Information Flow in Petri Net Workflows. Technical report, In Proceedings of the 9th International Conference on Telecommunication Systems - Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems, 2001.
[26]
Bill Parducci, Hal Lockhart, and Erik Rissanen. XACML v3.0 Privacy Policy Profile Version 1.0. Policy, pages 1--11, August 2010.
[27]
Joseph Berechman and Genevieve Giuliano. Economies of scale in bus transit: A review of concepts and evidence. Transportation, 12:313--332, 1985. 10.1007/BF00165470.
[28]
Amir Roshan Zamir and Mubarak Shah. Accurate Image Localization Based on Google Maps Street View. In Proceedings of the European Conference on Computer Vision (ECCV), 2010.
[29]
Christopher C Miller. A Beast in the Field: The Google Maps Mashup as GIS/2. Cartographica The International Journal for Geographic Information and Geovisualization, 41(3):187--199, 2006.
[30]
T. Levä, J. Gonçalves, and R. J. Ferreira. Description of project wide scenarios and use cases. Technical Report FP7-ICT-2009-5-257448-SAIL/D2.1, European Commission's 7th Framework Program, http://www.sail-project.eu/wp-content/uploads/2011/09/SAIL_DA1_v1_2_final.pdf, 2009.
[31]
IEEE Standard for Measurement of Video Jitter and Wander. IEEE Std 1521--2003, pages c1--14, 14 2009.
[32]
Zong Da Chen, H. T. Kung, and Dario Vlah. Ad hoc relay wireless networks over moving vehicles on highways. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, MobiHoc '01, pages 247--250, New York, NY, USA, 2001. ACM.
[33]
Thomas Edwall. Description of project wide scenarios and use cases. Technical report, European Commission's 7th Framework Program, 2011.
[34]
B Schmidt-Wesche, Brian Snitzer, Gerd Breiter, Gerhard Widmayer, Jim Whitmore, Julissa Villareal, Michael Behrendt, R Caponigro, R Chang, S Pappe, and Et Al. IBM Cloud Computing & Common Cloud Management Platform Reference Architecture (CC & CCMP RA) 1.0, 2010.
[35]
J I A Xiaojing. Google Cloud Computing Platform Technology Architecture and the Impact of Its Cost. 2010 Second World Congress on Software Engineering, (70801067): 17--20, 2010.
[36]
Eucalyptus Systems. Eucalyptus Systems Eucalyptus Open-Source Cloud Computing Infrastructure - An Overview Eucalyptus Systems An Overview. Technology, 180:012051, August 2009.

Cited By

View all
  • (2023)Analysis of a Runtime Data Sharing Architecture over LTE for a Heterogeneous CAV FleetProceedings of Cyber-Physical Systems and Internet of Things Week 202310.1145/3576914.3587712(164-169)Online publication date: 9-May-2023
  • (2023)ADS-Lead: Lifelong Anomaly Detection in Autonomous Driving SystemsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2021.312290624:1(1039-1051)Online publication date: Jan-2023
  • (2023)Application of Internet of Things (IoT) in the Automotive IndustryIntegration of Mechanical and Manufacturing Engineering with IoT10.1002/9781119865391.ch4(115-139)Online publication date: 8-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and Informatics
August 2012
1307 pages
ISBN:9781450311960
DOI:10.1145/2345396
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ISCA: International Society for Computers and Their Applications
  • RPS: Research Publishing Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 August 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cloud networking
  2. next-generation networks
  3. security architecture
  4. vehicular networks

Qualifiers

  • Research-article

Funding Sources

Conference

ICACCI '12
Sponsor:
  • ISCA
  • RPS

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Analysis of a Runtime Data Sharing Architecture over LTE for a Heterogeneous CAV FleetProceedings of Cyber-Physical Systems and Internet of Things Week 202310.1145/3576914.3587712(164-169)Online publication date: 9-May-2023
  • (2023)ADS-Lead: Lifelong Anomaly Detection in Autonomous Driving SystemsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2021.312290624:1(1039-1051)Online publication date: Jan-2023
  • (2023)Application of Internet of Things (IoT) in the Automotive IndustryIntegration of Mechanical and Manufacturing Engineering with IoT10.1002/9781119865391.ch4(115-139)Online publication date: 8-Feb-2023
  • (2022)Distributed Data-Sharing Consensus in Cooperative Perception of Autonomous Vehicles2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS54860.2022.00119(1212-1222)Online publication date: Jul-2022
  • (2022)A Comprehensive Survey on Vehicular Networking: Communications, Applications, Challenges, and Upcoming Research DirectionsIEEE Access10.1109/ACCESS.2022.319865610(86127-86180)Online publication date: 2022
  • (2022)Ensemble Machine Learning Approach to Detect Various Attacks in a Distributed Network of VehiclesComputational Intelligence in Data Mining10.1007/978-981-16-9447-9_32(407-418)Online publication date: 7-May-2022
  • (2021)Spectrum sensing challenges & their solutions in cognitive radio based vehicular networksInternational Journal of Communication Systems10.1002/dac.474834:7Online publication date: 3-Feb-2021
  • (2020)Edge-Facilitated Augmented Vision in Vehicle-to-Everything NetworksIEEE Transactions on Vehicular Technology10.1109/TVT.2020.301512769:10(12187-12201)Online publication date: Oct-2020
  • (2020)Architectural Design Alternatives Based on Cloud/Edge/Fog Computing for Connected VehiclesIEEE Communications Surveys & Tutorials10.1109/COMST.2020.302085422:4(2349-2377)Online publication date: Dec-2021
  • (2020)Intelligent Application Protection Mechanism for Transportation in V2C EnvironmentIEEE Access10.1109/ACCESS.2020.29912738(86777-86787)Online publication date: 2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media