ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DESIGN AND IMPLEMENTATION OF SECURE MECHANISM FOR VEHICULAR CLOUD COMPUTING BASED ON FOG COMPUTING

Journal: International Journal of Electrical Engineering and Technology (IJEET) (Vol.11, No. 1)

Publication Date:

Authors : ;

Page : 204-213

Keywords : Vehicular Cloud Computing; Fog Computing; Security; Privacy; Intelligent Transportation Systems; Data Processing; Data Analysis; Protocols; Blockchain; Performance; Scalability.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This article offers an overview of the literature on safe practises for car cloud computing that is based on fog computing. The phrase "vehicular cloud computing" is frequently used to describe a concept that combines cloud computing and vehicular networks. So that they may carry out a range of computer-based functions and share information, cars may interact with one another and the cloud. However, there are serious issues with data security and accuracy when cloud computing is used to automobiles. The sensitive nature of the data stored in the cloud is the cause of this. Researchers have suggested "computing in the fog" as a solution to these issues. Fog computing is the term for data processing and analysis done at a network's edge. In order to address the issues of assuring security and privacy in fog-based car cloud computing, numerous strategies, tactics, and concepts have been put forth by researchers. These strategies, tactics, and ideas are surveyed in this article. These tactics, approaches, and processes are suggested as potential fixes for the issues the researchers observed. Concerns concerning the preservation of security and privacy in vehicle cloud computing based on fog computing have been addressed in several ways that might be implemented. This evaluation serves three purposes: to (1) identify the major characteristics, advantages, and limits of the recommended secure techniques; to (2) emphasise the areas that want additional investigation; and to (3) highlight the regions that are crucial for future study. You'll be made aware of the areas where you need to conduct further research during this evaluation. The review will also point out aspects of the subject that need deeper research. The most significant findings are summarised in the paper's conclusion, along with their implications for further study. This study establishes the foundation for creating dependable and safe cloud computing ecosystems that might one day be used to autos

Last modified: 2023-05-03 20:11:30