“…To develop better trust models for cloud-supported CV applications, edge computing can be used. In [65], the authors introduce a decoy technology (DT) and user behavior profiling (UBP) to solve trust issues in cloud servers using edge computing architecture. The edge computing-based UBP system ensures the trust relationship with the CVs in the cloud, as an intruder can be detected based on its behavior profile [65].…”
Section: ) Existing Studies Addressing the Challenge And Current Gapmentioning
In an internet-of-things (IoT) environment, cloud computing is emerging as a technologically feasible and economically viable solution for supporting real-time and nonreal-time connected vehicle (CV) applications due to its unlimited storage, enormous computing capabilities, and cost advantage, i.e., cloud computing costs less than owning such systems. However, maintaining cybersecurity is a major challenge in cloud-supported CV applications as it requires CVs and various transportation or non-transportation services to exchange data with the cloud via multiple wired and wireless communication networks, such as long-term evolution (LTE) and Wi-Fi. In this paper, we review the cybersecurity requirements of cloud-supported CV applications, such as confidentiality, integrity, availability, authentication, accountability, and privacy. Our review also identifies the associated cybersecurity challenges that might impact cloudsupported CV applications and corresponding solutions to these challenges. In addition, we present future research opportunities to prevent and mitigate cybersecurity issues in cloud computing for CV-related applications.
“…To develop better trust models for cloud-supported CV applications, edge computing can be used. In [65], the authors introduce a decoy technology (DT) and user behavior profiling (UBP) to solve trust issues in cloud servers using edge computing architecture. The edge computing-based UBP system ensures the trust relationship with the CVs in the cloud, as an intruder can be detected based on its behavior profile [65].…”
Section: ) Existing Studies Addressing the Challenge And Current Gapmentioning
In an internet-of-things (IoT) environment, cloud computing is emerging as a technologically feasible and economically viable solution for supporting real-time and nonreal-time connected vehicle (CV) applications due to its unlimited storage, enormous computing capabilities, and cost advantage, i.e., cloud computing costs less than owning such systems. However, maintaining cybersecurity is a major challenge in cloud-supported CV applications as it requires CVs and various transportation or non-transportation services to exchange data with the cloud via multiple wired and wireless communication networks, such as long-term evolution (LTE) and Wi-Fi. In this paper, we review the cybersecurity requirements of cloud-supported CV applications, such as confidentiality, integrity, availability, authentication, accountability, and privacy. Our review also identifies the associated cybersecurity challenges that might impact cloudsupported CV applications and corresponding solutions to these challenges. In addition, we present future research opportunities to prevent and mitigate cybersecurity issues in cloud computing for CV-related applications.
“…The following examples present the use of VANETs, IoV, VCC, and VFC and their security benefit. M. Bousselham et al [120] and S. K. Erskine and K. M. Elleithy [121] suggest how to use fog computing to enhance VCC and VANETs security, respectively. In R. Hussain and H. Oh [122], cooperation-as-aservice and VANET Clouds are used for security in the VANETs themselves.…”
This document is made available in accordance with publisher policies and may differ from the published version or from the version of record. If you wish to cite this item you are advised to consult the publisher's version. Please see the URL above for details on accessing the published version.
“…Fog nodes do not have to come and go since each content of the HTTP request for redirects, style sheets, scripts, and images, and we can get through, execute and combine them at once using FC with the help of the web. Besides, users can be identified based on different cookies or MAC addresses, user tracking requests, and determine local network conditions and cache files [97].…”
Internet of Things (IoT) is proliferating in our real world, and it is a promising technology that serves a very comfortable service to the users. IoT's underlying technology is to connect to central Cloud Computing (CC), which is a huge data center collecting the generated data by IoT devices, and it is located in different areas on demand. However, cloud computing lacks data transmission because of the infrastructure and limitations of networks which enormously decrease its performance. Therefore, a new paradigm has been founded to act as a middleware between the Cloud and IoT, termed Fog Computing (FC) Technology. Considering Fog as a cloud extension that provides computing service at the edge of the network, Fog Computing placement enables this technology to deal with numerous data locally. In this study, we surveyed Fog computing with in-depth analysis and covered the latest studies to address and overcome the existing challenges in FC. We reviewed fog computing technology conceptually and defined it based on the existing studies in the literature, together with its architecture, applications, advantages, and open issues with optimization methods being performed to obtain the optimal services. INDEX TERMS Fog Computing Applications, Fog Computing Concept, Fog Computing Open Issues, Cloud computing, Internet of Things (IoT).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.