A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
Title | A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Bousselham, Mhidi, Benamar, Nabil, Addaim, Adnane |
Conference Name | 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS) |
Keywords | cloud computing, Computer architecture, data privacy, Data processing, data servers, Decoy technology, distributed processing, edge computing, Encryption, energy consumption reduction, Fog Computing, Fog Computing and Security, fog computing architecture, fog computing system, Monitoring, power aware computing, Prediction algorithms, privacy, pubcrawl, Resiliency, Scalability, secure vehicular platform, security, security mechanism, Traffic congestion, traffic engineering computing, UBP, user behavior profiling, VANET, VCC, vehicle computing service requests, vehicle storing service requests, vehicular cloud computing, vehicular cloud servers, Vehicular fog computing |
Abstract | Recently Vehicular Cloud Computing (VCC) has become an attractive solution that support vehicle's computing and storing service requests. This computing paradigm insures a reduced energy consumption and low traffic congestion. Additionally, VCC has emerged as a promising technology that provides a virtual platform for processing data using vehicles as infrastructures or centralized data servers. However, vehicles are deployed in open environments where they are vulnerable to various types of attacks. Furthermore, traditional cryptographic algorithms failed in insuring security once their keys compromised. In order to insure a secure vehicular platform, we introduce in this paper a new decoy technology DT and user behavior profiling (UBP) as an alternative solution to overcome data security, privacy and trust in vehicular cloud servers using a fog computing architecture. In the case of a malicious behavior, our mechanism shows a high efficiency by delivering decoy files in such a way making the intruder unable to differentiate between the original and decoy file. |
DOI | 10.1109/WITS.2019.8723723 |
Citation Key | bousselham_new_2019 |
- UBP
- privacy
- pubcrawl
- Resiliency
- Scalability
- secure vehicular platform
- security mechanism
- Traffic congestion
- traffic engineering computing
- Prediction algorithms
- user behavior profiling
- VANET
- VCC
- vehicle computing service requests
- vehicle storing service requests
- vehicular cloud computing
- vehicular cloud servers
- Vehicular fog computing
- edge computing
- security
- Cloud Computing
- computer architecture
- data privacy
- Data processing
- data servers
- Decoy technology
- distributed processing
- Fog computing
- encryption
- energy consumption reduction
- Fog Computing and Security
- fog computing architecture
- fog computing system
- Monitoring
- power aware computing