Provisioning delay effect of partaking a Trusted Third Party in a vehicular cloud

Vehicular cloud computing has appeared as a viable mobile cloud computing solution of vehicle communications. Among several challenges in such environment, provisioning delay can be counted as a crucial challenge to be addressed. In this paper, we propose a framework of partaking a Trusted Third Party (TTP) in a vehicular cloud. This framework can aid in pinpoint of such problem and to address such challenge in a vehicular cloud based on user's experience. Thus, provisioning delay is obtained via other mobile nodes and re-formulated by a weighted combination of these delays. We evaluate our proposal via simulations, and numerical results has been presented.

[1]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[2]  Mario Gerla,et al.  Vehicular Cloud Computing , 2012, 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[3]  Bharat K. Bhargava,et al.  Protection of Identity Information in Cloud Computing without Trusted Third Party , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[4]  Sangjin Kim,et al.  Rethinking Vehicular Communications: Merging VANET with cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[5]  Gongjun Yan,et al.  Towards Secure Vehicular Clouds , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.

[6]  Shaolei Ren,et al.  Dynamic Scheduling and Pricing in Wireless Cloud Computing , 2014, IEEE Transactions on Mobile Computing.

[7]  Jianfeng Yang,et al.  Cloud Computing Research and Security Issues , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[8]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[9]  Theodore Tryfonas,et al.  Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps , 2013, HCI.

[10]  Madjid Merabti,et al.  Secure Cloud Computing for Critical Infrastructure: A Survey , 2012 .

[11]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[12]  Di Liu,et al.  A Research on Cloud Computing Security , 2013, 2013 International Conference on Information Technology and Applications.

[13]  H. Glickenstein,et al.  Transportation systems , 2006, IEEE Vehicular Technology Magazine.

[14]  Andy Crackau,et al.  B. Cloud Computing , 2014 .

[15]  Gongjun Yan,et al.  Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.

[16]  Rajkumar Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..