2013
DOI: 10.1109/tits.2012.2211870
|View full text |Cite
|
Sign up to set email alerts
|

Security challenges in vehicular cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
104
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 229 publications
(104 citation statements)
references
References 21 publications
0
104
0
Order By: Relevance
“…Security/data privacy: Security and privacy are well-known and currently unsolved challenges in the cloud arena, and remain as such also in F2C. Deploying fogs in fact exacerbates these issues, as already pointed out in [7] and also in [8] for vehicular clouds, mainly because of the inherent uncontrolled and out-of-surveillance operation mode for some edge devices. In the proposed F2C scenario, and just like in fog computing, security is envisioned as a key issue.…”
Section: Seamless-transparent Managementmentioning
confidence: 99%
“…Security/data privacy: Security and privacy are well-known and currently unsolved challenges in the cloud arena, and remain as such also in F2C. Deploying fogs in fact exacerbates these issues, as already pointed out in [7] and also in [8] for vehicular clouds, mainly because of the inherent uncontrolled and out-of-surveillance operation mode for some edge devices. In the proposed F2C scenario, and just like in fog computing, security is envisioned as a key issue.…”
Section: Seamless-transparent Managementmentioning
confidence: 99%
“…Yan et al [21] excellently envisaged the safety issues of an innovative outlook of the VANETs, which included taking VANETs to clouds. At first, they brought in the safety and confidentiality issues which VC computing networks habitually encountered, in addition to successfully tackling the probable safety solutions.…”
Section: Related Workmentioning
confidence: 99%
“…Obviously, security and privacy issues need to be addressed if the VC concept is to be widely adopted. Conventional networks attempt to prevent attackers from entering a system [10].…”
Section: Introductionmentioning
confidence: 99%