editorial security and privacy challenges in vehicular...

3
Editorial Security and Privacy Challenges in Vehicular Cloud Computing Rongxing Lu, 1 Yogachandran Rahulamathavan, 2 Hui Zhu, 3 Chang Xu, 4 and Miao Wang 5 1 University of New Brunswick, Fredericton, NB, Canada 2 Loughborough University in London, London, UK 3 Xidian University, Xi’an, China 4 Beijing Institute of Technology, Beijing, China 5 McMaster University, Hamilton, ON, Canada Correspondence should be addressed to Rongxing Lu; [email protected] Received 24 November 2016; Accepted 24 November 2016 Copyright © 2016 Rongxing Lu et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. e recent developments and deployments of connected and autonomous vehicular network or the so-called vehicular ad hoc networks (VANETs) offer the promise of significant benefits to the society and environment including robust road safety and intelligent traffic management. When a swarm of vehicles with sophisticated sensing and connectiv- ity capabilities travel together, aggregating the resources such as sensors, sensor results, and onboard computing infras- tructure in vehicles creates a platform equivalent to cloud computing. As a special cloud computing platform, Vehic- ular Cloud Computing (VCC), which seamlessly combines cloud computing and VANETs, has been recently proposed to accelerate the adoption of VANETs. VCC is a mobile computing paradigm, which consists of in-motion vehicles cooperating with each other to achieve a bunch of practical applications, such as collaborative package delivery and information dissemination. Essentially, VCC coordinates the computing, communication, sensing, and storage resources of the vehicles on the road to balance the service requirements and the hardware limitation. Nevertheless, different from the traditional cloud infrastructure, VCC requires sophisticated security and privacy protection mechanisms as the legitimate users and attackers have the same privileges in mobile VCC. erefore, in order to enhance the security and scalability of VCC, a number of crucial issues must be addressed such as trust model, data security, connection fault, and query tracking attacks. In this special issue on security and privacy challenges in VCC, we have invited a few papers that address such issues. e paper “On Preventing Location Attacks for Urban Vehicular Networks” focuses on preventing potential attacks from a perspective of location prediction, which proposes a sophisticated prediction model to predict driver’s next location, analyzes the restriction of the proposed advanced predication model, and presents a schema to decrease the risks of location prediction attacks. Experimental results obtained from the real-world vehicular network data have demonstrated the effectiveness of preventing location attacks in urban vehicular networks. e paper “Conditional Ciphertext-Policy Attribute- Based Encryption Scheme in Vehicular Cloud Comput- ing” presents an expressive and fine-grained conditional ciphertext-policy attribute based encryption (C-CP-ABE) scheme in vehicle cloud computing, which can maintain both data security and system efficiency. Compared with traditional CP-ABE, the scheme brings a trivial amount of storage overhead and a lower amount of computations but can associate one ciphertext with different access trees under different conditions. e paper “A Safety Resource Allocation Mechanism against Connection Fault for Vehicular Cloud Computing” discusses the vehicle connection fault issue and proposes a safety resource allocation mechanism against connection fault in VCC by using a modified workflow with prediction capability. In the mechanism, the connection fault probability model of the moving vehicles is proposed firstly. And then a safety resource allocation algorithm is proposed to realize the safety resource allocation for VCC. Extensive evaluations Hindawi Publishing Corporation Mobile Information Systems Volume 2016, Article ID 6812816, 2 pages http://dx.doi.org/10.1155/2016/6812816

Upload: dotu

Post on 30-Mar-2018

213 views

Category:

Documents


1 download

TRANSCRIPT

EditorialSecurity and Privacy Challenges in Vehicular Cloud Computing

Rongxing Lu,1 Yogachandran Rahulamathavan,2 Hui Zhu,3 Chang Xu,4 and Miao Wang5

1University of New Brunswick, Fredericton, NB, Canada2Loughborough University in London, London, UK3Xidian University, Xi’an, China4Beijing Institute of Technology, Beijing, China5McMaster University, Hamilton, ON, Canada

Correspondence should be addressed to Rongxing Lu; [email protected]

Received 24 November 2016; Accepted 24 November 2016

Copyright © 2016 Rongxing Lu et al. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

The recent developments and deployments of connected andautonomous vehicular network or the so-called vehicularad hoc networks (VANETs) offer the promise of significantbenefits to the society and environment including robustroad safety and intelligent traffic management. When aswarm of vehicles with sophisticated sensing and connectiv-ity capabilities travel together, aggregating the resources suchas sensors, sensor results, and onboard computing infras-tructure in vehicles creates a platform equivalent to cloudcomputing. As a special cloud computing platform, Vehic-ular Cloud Computing (VCC), which seamlessly combinescloud computing and VANETs, has been recently proposedto accelerate the adoption of VANETs. VCC is a mobilecomputing paradigm, which consists of in-motion vehiclescooperating with each other to achieve a bunch of practicalapplications, such as collaborative package delivery andinformation dissemination. Essentially, VCC coordinates thecomputing, communication, sensing, and storage resourcesof the vehicles on the road to balance the service requirementsand the hardware limitation. Nevertheless, different from thetraditional cloud infrastructure, VCC requires sophisticatedsecurity and privacy protectionmechanisms as the legitimateusers and attackers have the same privileges in mobile VCC.Therefore, in order to enhance the security and scalabilityof VCC, a number of crucial issues must be addressed suchas trust model, data security, connection fault, and querytracking attacks. In this special issue on security and privacychallenges in VCC, we have invited a few papers that addresssuch issues.

The paper “On Preventing Location Attacks for UrbanVehicular Networks” focuses on preventing potential attacksfrom a perspective of location prediction, which proposesa sophisticated prediction model to predict driver’s nextlocation, analyzes the restriction of the proposed advancedpredication model, and presents a schema to decrease therisks of location prediction attacks. Experimental resultsobtained from the real-world vehicular network data havedemonstrated the effectiveness of preventing location attacksin urban vehicular networks.

The paper “Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Comput-ing” presents an expressive and fine-grained conditionalciphertext-policy attribute based encryption (C-CP-ABE)scheme in vehicle cloud computing, which can maintainboth data security and system efficiency. Compared withtraditional CP-ABE, the scheme brings a trivial amount ofstorage overhead and a lower amount of computations butcan associate one ciphertext with different access trees underdifferent conditions.

The paper “A Safety Resource Allocation Mechanismagainst Connection Fault for Vehicular Cloud Computing”discusses the vehicle connection fault issue and proposesa safety resource allocation mechanism against connectionfault in VCC by using a modified workflow with predictioncapability. In themechanism, the connection fault probabilitymodel of the moving vehicles is proposed firstly. And thena safety resource allocation algorithm is proposed to realizethe safety resource allocation for VCC. Extensive evaluations

Hindawi Publishing CorporationMobile Information SystemsVolume 2016, Article ID 6812816, 2 pageshttp://dx.doi.org/10.1155/2016/6812816

2 Mobile Information Systems

demonstrate that the proposal can improve both reliabilityand real-time performance of VCC.

The paper “LSOT: A Lightweight Self-Organized TrustModel in VANETs” addresses the trust management inVANETs and proposes a novel lightweight self-organizedtrust model in VANETs. The model combines both trust cer-tificate-based and recommendation-based trust evaluations,and the evaluation in it can be made quickly and reaches anexcellent performance in a lightweight manner.

The paper “A Trust-Based Model for Security Coop-erating in Vehicular Cloud Computing” describes a trust-based model for security cooperating to promote the securecooperation in VCC, in which a double board based trustestimation and correction scheme is proposed to predict thereliability of vehicles and guide the selection of trustworthycooperative vehicles in a more effective manner.

The paper “A Privacy-Preserving Location-Based Systemfor Continuous Spatial Queries” proposes a novel locationcloaking method to resist query tracking attacks. Comparedwith previous location cloaking methods, this proposedmethod can generate minimized cloaked regions while pro-tecting the location and trajectory privacy of the query issuerin VCC.

Rongxing LuYogachandran Rahulamathavan

Hui ZhuChang Xu

Miao Wang

Submit your manuscripts athttp://www.hindawi.com

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttp://www.hindawi.com

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Applied Computational Intelligence and Soft Computing

 Advances in 

Artificial Intelligence

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014