Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems

Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Data Security in Cloud Computing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Transportation Cyber-Physical Systems (TCPS) strive to achieve the seamless interoperability of a rich set of sensors embedded in vehicles, roadside units, and other infrastructure with computing platforms ranging from smartphones to cloud servers, through a variety of communication mechanisms. A successful TCPS will provide smart and scalable solutions to some of the major problems urban societies facing today including high fatalities in road crashes, time and emission costs of traffic congestion, and efficient allocation of parking spaces. However, the practicality of such a TCPS is challenged by (1) stakeholders with different and often conflicting security and privacy requirements, (2) the demands of real-time data intensive computing and communication, and (3) a high level of heterogeneity in the types of technologies deployed. Transportation Cloud Computing, which is the integration of Cloud Computing with TCPS, is a promising solution to the challenges listed above for a scalable implementation. This chapter presents the security, trust, and privacy issues posed by integrating cloud computing with TCPS as in the first challenge above. We will survey the state of the art with respect to countermeasures which are capable ofproviding improved security and privacy for cloud computing in TCPS. More specifically, we will first discuss the unique challenges and the current state of the art in TCPS as well as the integration of cloud computing techniques into a TCPS application scenario. Next, we will present a comprehensive literature review on attack surface and strategies for cloud computing in TCPS. To address these attacks, we will describe various techniques to enhance security, trust, and privacy to help better safeguard cloud computing paradigms for TCPS.

Chapter Contents:

  • Abstract
  • 8.1 Introduction
  • 8.2 Transportation CPS
  • 8.2.1 Vehicular and transportation networks
  • 8.2.2 Vehicle-to-everything communication
  • 8.2.2.1 Vehicle-to-Vehicle (V2V) Communication
  • 8.2.2.2 Vehicle-to-Infrastructure (V2I) Communication
  • 8.2.2.3 Vehicle-to-Grid (V2G) Communication
  • 8.2.2.4 Vehicle-to-Pedestrian (V2P) Communication
  • 8.2.3 Intra-vehicle Communication
  • 8.2.3.1 Controller Area Network Bus
  • 8.2.3.2 Local Interconnect Network
  • 8.2.3.3 Flexray
  • 8.2.3.4 Media-Oriented Systems Transport
  • 8.3 Transportation cloud computing
  • 8.3.1 Transportation cloud computing service taxonomy
  • 8.3.1.1 Network-as-a-Service (NaaS)
  • 8.3.1.2 Sensing-as-a-Service (S2aaS)
  • 8.3.1.3 Computation-as-a-Service (CaaS)
  • 8.3.1.4 Storage-as-a-Service (StaaS)
  • 8.4 TCPS attack surfaces
  • 8.4.1 Modern intra-vehicle data networks and the cloud
  • 8.4.2 Attack surfaces of future cloud-based V2X transportation networks
  • 8.5 TCPS security mechanisms
  • 8.5.1 Trust management for TCPS
  • 8.5.1.1 Basic Principles of Trust Management
  • 8.5.1.2 Trust Management forWireless Networks
  • 8.5.1.3 Trust Management for Transportation CPS
  • 8.5.2 Privacy for TCPS
  • 8.6 Conclusion
  • References

Inspec keywords: mobile computing; cloud computing; cyber-physical systems; transportation; trusted computing; security of data; traffic engineering computing; open systems; smart phones; data privacy; road vehicles

Other keywords: road crashes; cloud computing privacy; vehicle sensors; TCPS; interoperability; cloud computing security; transportation cloud computing; transportation cyber-physical systems; cloud servers; traffic congestion; parking space allocation; cloud computing trust; roadside units; smartphones

Subjects: Internet software; Traffic engineering computing; Data security; Mobile, ubiquitous and pervasive computing

Preview this chapter:
Zoom in
Zoomout

Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse007e/PBSE007E_ch8-1.gif /docserver/preview/fulltext/books/sc/pbse007e/PBSE007E_ch8-2.gif

Related content

content/books/10.1049/pbse007e_ch8
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address