Abstract

Vehicle Cloud Computing is a technology is the combination of different networks such as mobile ad hoc networks, wireless sensor networks, vehicular ad hoc networks, and cloud computing to provide better services for automatic cars such as controlling car movements and handling navigation system to provide reliable and shorter routes, which also ensures safety. Security and privacy are the two major challenges for all wireless or wired networks that allow users to share the same set of resources. The architecture of VCC can be classified into three layers: networks, the wireless communication channel and cloud computing. The first part is responsible for collecting the information and events from the environment. Then, this information is transferred to the cloud by using the wireless communication channel as a wireless access point. Therefore, the security of vehicular networks depends on providing the security of these three layers: Security of the network layer, Security of the transmission layer and Security of the cloud computing. In this paper, the security and privacy of VC are classified in three subsets such as security threats, security requirements, and security challenges. The security threats include various security issues that threaten the security of VC. There are some requirements that should be met to provide a secure environment in the VC. In the last group, some security challenges of VC and the applicable solutions to overcome these challenges are surveyed.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.