DESIGN AND IMPLEMENTATION OF SECURE MECHANISM FOR VEHICULAR CLOUD COMPUTING BASED ON FOG COMPUTING
Journal: International Journal of Electrical Engineering and Technology (IJEET) (Vol.11, No. 1)Publication Date: 2020-02-28
Authors : Dibyahash Bordoloi;
Page : 204-213
Keywords : Vehicular Cloud Computing; Fog Computing; Security; Privacy; Intelligent Transportation Systems; Data Processing; Data Analysis; Protocols; Blockchain; Performance; Scalability.;
Abstract
This article offers an overview of the literature on safe practises for car cloud computing that is based on fog computing. The phrase "vehicular cloud computing" is frequently used to describe a concept that combines cloud computing and vehicular networks. So that they may carry out a range of computer-based functions and share information, cars may interact with one another and the cloud. However, there are serious issues with data security and accuracy when cloud computing is used to automobiles. The sensitive nature of the data stored in the cloud is the cause of this. Researchers have suggested "computing in the fog" as a solution to these issues. Fog computing is the term for data processing and analysis done at a network's edge. In order to address the issues of assuring security and privacy in fog-based car cloud computing, numerous strategies, tactics, and concepts have been put forth by researchers. These strategies, tactics, and ideas are surveyed in this article. These tactics, approaches, and processes are suggested as potential fixes for the issues the researchers observed. Concerns concerning the preservation of security and privacy in vehicle cloud computing based on fog computing have been addressed in several ways that might be implemented. This evaluation serves three purposes: to (1) identify the major characteristics, advantages, and limits of the recommended secure techniques; to (2) emphasise the areas that want additional investigation; and to (3) highlight the regions that are crucial for future study. You'll be made aware of the areas where you need to conduct further research during this evaluation. The review will also point out aspects of the subject that need deeper research. The most significant findings are summarised in the paper's conclusion, along with their implications for further study. This study establishes the foundation for creating dependable and safe cloud computing ecosystems that might one day be used to autos
Other Latest Articles
- LAPAROSCOPIC APPROACH TO AN EPIPLOIC FOREIGN BODY: A CASE REPORT
- EXTREME LEARNING MACHINE FOR CLASSIFICATION OF PHISHING WEBSITES FEATURES
- AN APPLICATION MACHINE LEARNING AUTOENCODER FOR IMBALANCED DATA CLASSIFICATION
- FACTOR ASSOCIATED WITH STRESS, ANXIETY, AND DEPRESSION AMONG MEDICAL STUDENTS IN TABUK CITY, 2022
- EXPLORING THE USE OF BLOCKCHAIN TECHNOLOGY FOR SECURE DATA MANAGEMENT IN CLOUD COMPUTING ENVIRONMENTS
Last modified: 2023-05-03 20:11:30