Towards Secure Vehicular Clouds

The past decade has witnessed a growing interest in vehicular networking and its panoply of potential applications among vehicles. Olariu and his co-workers [1, 2, 3] have put forth the vision of a new type of cloud, Vehicular Cloud Computing (VCC). It is clear that the VCC concept raise exceptional security and privacy challenges. It is also clear that if the VCC concept is to see a wide adoption and to have a significant societal impact, security and privacy issues need to be addressed. In this paper we are interested to analyze the security challenges and potential privacy threats in VCC. We address some major design issues that will affect the future implementation of VCC and provide a set of security and privacy-protecting protocols. To the best of our knowledge, this is the first paper that deals with security problems in VCC. But we state that few VCC security issues are fundamentally new. Many of the security challenges have received attentions in related fields such as cloud computing and VANETs. On the other hand, we address relatively unique security challenges resulted by features of VCC, e.g. the challenges of authentication of high-mobility vehicles and the complexity of trust relationships among multi-players caused by intermittent short-range communication.

[1]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[2]  Xiqin Wang,et al.  Growing Artificial Transportation Systems: A Rule-Based Iterative Design Process , 2011, IEEE Transactions on Intelligent Transportation Systems.

[3]  Craig Valli,et al.  The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues , 2012, ArXiv.

[4]  Stephan Olariu,et al.  Towards autonomous vehicular clouds , 2011, EAI Endorsed Trans. Mob. Commun. Appl..

[5]  Stephan Olariu,et al.  Taking VANET to the clouds , 2010, Int. J. Pervasive Comput. Commun..

[6]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[7]  Common Attack Pattern Enumeration and Classification — CAPEC TM A Community Knowledge Resource for Building Secure Software , 2013 .

[8]  John A. Blackley,et al.  Information Security Fundamentals , 2003 .

[9]  Darrell M. West,et al.  Privacy and Security in Cloud Computing , 2010 .

[10]  F. John Krautheim,et al.  Private Virtual Infrastructure for Cloud Computing , 2009, HotCloud.

[11]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[12]  Fei-Yue Wang,et al.  Parallel Control and Management for Intelligent Transportation Systems: Concepts, Architectures, and Applications , 2010, IEEE Transactions on Intelligent Transportation Systems.

[13]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .