SlideShare una empresa de Scribd logo
1 de 20
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References




                         Towards Secure Vehicular Clouds

                              Durgesh Kumar Shukla
                                   2010PTSW24
                 M.Tech( Software Engineering -Part Time ) - V Sem



                                 November , 2012
                Department of Computer Science and Engineering
              Motilal Nehru National Institute of Technology Allahabad


Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References




      1    VANET

      2    Cloud computing

      3    Vehicular cloud

      4    Security in Vehicular Cloud

      5    Conclusion

      6    References



Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Smart vehicles

                  Vehicles are becoming more sophisticated
              Powerful on-board computing capabilities
              Tons of on-board of storage
              Significant communication capabilities
              No power limitations

                    Computations capabilities supported by
              Hosts of sensors and actuators
              On-board radar and GPS


Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 VANET

                                Main characteristics
              Deliver timely information to drivers in a cost-effective manner
              Uses vehicles as network nodes
              Vehicles move at will relative to each other but within the
              constraints of the road infrastructure

                                  Communications
              Vehicle-to-Vehicle (V2V) : zero-infrastructure
              Vehicle-to-Infrastructure (V2I): roadside devices


Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Cloud computing

                         A paradigm shift suggested by:
              Low cost high-speed Internet
              Virtualization
              Advances in parallel and distributed databases

                    Basic idea: Why buy when we can rent?
              Exactly what we need
              Exactly when we need it
              No upfront investment
              No maintenance costs

Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Cloud computing


                                  Cloud Services
              Software as a Service (SaaS)
                     Customers rent software hosted by the vendor
              Platform as a Service (PaaS)
                     Customers rent infrastructure and programming tools hosted
                     by the vendor to create their own applications
              Infrastructure as a Service (IaaS)
                     Customers rent processing, storage, networking and other
                     fundamental computing resources for all purposes



Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                              VANET
                                     Cloud computing
                                      Vehicular cloud
                          Security in Vehicular Cloud
                                           Conclusion
                                           References


 Vehicular cloud Motivation




             Parking lot of a typical enterprise on a typical workday
             hundreds/thousands cars go unused for hours on end
             Why rent computational/storage resources elsewhere?
Durgesh KumarWe have them in Software Engineering -Part Time ) - VVehicular Clouds
             Shukla2010PTSW24M.Tech( our own backyard Secure Sem
                                                  Towards
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Vehicular cloud Motivation


              Dedicated Short Range Communications (DSRC)
                     Allocated by US Federal Communications Commission
                     75MHz of spectrum (5.850 to 5.925 GHz)
              Roadside infrastructures
                     Inductive loop detectors
                     Video cameras
                     Acoustic tracking systems
                     Microwave radar sensors
                     Access point




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 VC Vehicular Cloud


              A group of vehicles whose corporate computing, sensing,
              communication and physical resources can be coordinated and
              dynamically allocated to authorized users

              VCs are different from the classic clouds
                     Mobility
                     Autonomy
                     Agility




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 VC Vehicular Cloud




                                  Storage as a Service (SaaS)
              Computers in cars will have multiple terabytes of on-board
              storage
              Data center in mall/airport/parking lot




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 VC Vehicular Cloud




                                 Network as a Service (NaaS)
              Most cars dont have internet connection
              Small relative speed between cars on the same direction:
              traditional MANET




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 VC Vehicular Cloud



                              Cooperation as a Service (CaaS)
              Drivers behind the wheels: suitable for human interaction
              tasks
                     Weather?
                     Road condition?
                     Best restaurant around a specific place?
              Publish/subscribe mechanism




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Application Of VC


                                                  Application
              Traffic management
              Road condition sharing
              Accident alerts at intersections
              Intelligent parking management
              Safety critical applications
              Managed disaster evacuation




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Security in Vehicular Cloud

                          Security Attack and Threats
              Both Users and Attackers are equal
              Attack targets: Confidentiality, Integrity, Availability

      Examples:
              Narrow down the possible areas where the target users
              services are executing by mapping the topology of VC
              Launch multiple experimental accesses
              Request the services on the same VM where the target user is
              on

Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Security in Vehicular Cloud



                                            Possible Solutions
              Safety Messages
              Confidential Messages
              Digital signatures
              Data Isolation and Sanitization
              Location validation




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Security in Vehicular Cloud



                      Security and functional challenges
              Key management
              Trust management
              Location security
              DoS prevention
              Message aggregation and validation




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 Conclusion


              The tradeoffs between security and performance will need to
              be explored
              Time delay management
              With joint efforts and close cooperation among different
              organizations such as law enforcement, government,
              auto-industry and academic can provide solid and feasible
              security and privacy solutions for the vehicular cloud
              computing.



Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 References
      [1]Gongjun Yan, Ding Wen, Stephan Olariu, and Michele C. Weigle
      ”Security Challenges in Vehicular Cloud Computing,” 2012 IEEE
      Transactions On Intelligent Transportation Systems
      [2] Gongjun Yan Indiana Univ., Kokomo, IN, USA Rawat, D.B. ;
      Bista, B.B. ” Towards Secure Vehicular Clouds,” 2012 Sixth
      International Conference on Complex, Intelligent and Software
      Intensive Systems (CISIS).
      [3] M. Abuelela and S. Olariu, ”Taking vanet to the clouds,”
      Proceedings of The 8th Interna- tional Conference on Advances in
      Mobile Computing and Multimedia MoMM 2010, pp. 810, 2010.
      [4] M. Eltoweissy, S. Olariu, and M. Younis, ” Towards
      autonomous vehicular clouds,” in Pro- ceedings of
      AdHocNets2010, Victoria, BC, Canada, August 2010.
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References


 References



      [5] M. Eltoweissy, S. Olariu and M. Younis, ”Towards Vehicular
      Clouds”, Proc. AdHocNets, 2010, Victoria, BC, August 2010.
      [6] Fay Hui: A survey on the characterization of Vehicular Ad Hoc
      Networks routing solu- tions ECS 257 Winter 2005
      [7]T. ElGamal, ”A public key cryptosystem and a signature scheme
      based on discrete loga- rithms,” IEEE Transactions on Information
      Theory, vol. 31, no. 4, pp. 469472, 1985.




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem
Outline
                                                   VANET
                                          Cloud computing
                                           Vehicular cloud
                               Security in Vehicular Cloud
                                                Conclusion
                                                References




                                                 THANK YOU




Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
                                                           Towards Secure Sem

Más contenido relacionado

La actualidad más candente

Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
Improved safety IRP using VANET
Improved safety IRP using VANETImproved safety IRP using VANET
Improved safety IRP using VANETRama Maliya
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
 
Taking VANET to the Clouds
Taking VANET to the CloudsTaking VANET to the Clouds
Taking VANET to the CloudsMichele Weigle
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETAnkit Singh
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
 

La actualidad más candente (20)

Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Improved safety IRP using VANET
Improved safety IRP using VANETImproved safety IRP using VANET
Improved safety IRP using VANET
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
 
Taking VANET to the Clouds
Taking VANET to the CloudsTaking VANET to the Clouds
Taking VANET to the Clouds
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANET
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 
VANET
VANETVANET
VANET
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 

Destacado

Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication Mohamed Zaki
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communicationSangita Das
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
(The porpuse for reading)lectura critica
(The porpuse for reading)lectura critica(The porpuse for reading)lectura critica
(The porpuse for reading)lectura criticaRoman Martinez Castillo
 
(The porpuse for reading)lectura critica
(The porpuse for reading)lectura critica(The porpuse for reading)lectura critica
(The porpuse for reading)lectura criticaRoman Martinez Castillo
 
Gfpi f-019 guia de aprendizaje 01 tda orientar fpi
Gfpi f-019 guia de aprendizaje 01 tda orientar fpiGfpi f-019 guia de aprendizaje 01 tda orientar fpi
Gfpi f-019 guia de aprendizaje 01 tda orientar fpilisbet bravo
 
El emprendedor y el empresario profesional cert
El emprendedor y el empresario profesional certEl emprendedor y el empresario profesional cert
El emprendedor y el empresario profesional certMaestros Online
 
Como hacer un plan de negocios
Como hacer un plan de negociosComo hacer un plan de negocios
Como hacer un plan de negociosXPINNERPablo
 
Evidence: Describing my kitchen. ENGLISH DOT WORKS 2. SENA.
Evidence: Describing my kitchen. ENGLISH DOT WORKS 2. SENA.Evidence: Describing my kitchen. ENGLISH DOT WORKS 2. SENA.
Evidence: Describing my kitchen. ENGLISH DOT WORKS 2. SENA... ..
 
Estrategias competitivas básicas
Estrategias competitivas básicasEstrategias competitivas básicas
Estrategias competitivas básicasLarryJimenez
 
2. describing cities and places. ENGLISH DOT WORKS 2. SENA. semana 4 acitivda...
2. describing cities and places. ENGLISH DOT WORKS 2. SENA. semana 4 acitivda...2. describing cities and places. ENGLISH DOT WORKS 2. SENA. semana 4 acitivda...
2. describing cities and places. ENGLISH DOT WORKS 2. SENA. semana 4 acitivda..... ..
 
3.Evidence: Getting to Bogota.ENGLISH DOT WORKS 2. SENA.semana 4 actividad 3.
3.Evidence: Getting to Bogota.ENGLISH DOT WORKS 2. SENA.semana 4 actividad 3.3.Evidence: Getting to Bogota.ENGLISH DOT WORKS 2. SENA.semana 4 actividad 3.
3.Evidence: Getting to Bogota.ENGLISH DOT WORKS 2. SENA.semana 4 actividad 3... ..
 
Evidence: Going to the restaurant . ENGLISH DOT WORKS 2. SENA.
Evidence: Going to the restaurant . ENGLISH DOT WORKS 2. SENA.Evidence: Going to the restaurant . ENGLISH DOT WORKS 2. SENA.
Evidence: Going to the restaurant . ENGLISH DOT WORKS 2. SENA... ..
 
Evidence: I can’t believe it.ENGLISH DOT WORKS 2. semana 3 actividad 1.SENA.
Evidence: I can’t believe it.ENGLISH DOT WORKS 2. semana 3 actividad 1.SENA.Evidence: I can’t believe it.ENGLISH DOT WORKS 2. semana 3 actividad 1.SENA.
Evidence: I can’t believe it.ENGLISH DOT WORKS 2. semana 3 actividad 1.SENA... ..
 
Evidence: Memorable moments.ENGLISH DOT WORKS 2. SENA. semana 2 actividad 2.
Evidence: Memorable moments.ENGLISH DOT WORKS 2. SENA. semana 2 actividad 2.Evidence: Memorable moments.ENGLISH DOT WORKS 2. SENA. semana 2 actividad 2.
Evidence: Memorable moments.ENGLISH DOT WORKS 2. SENA. semana 2 actividad 2... ..
 
Evidence: Planning my trip. ENGLISH DOT WORKS 2. SENA. semana 4 actividad 1.
Evidence: Planning my trip. ENGLISH DOT WORKS 2. SENA. semana 4 actividad 1.Evidence: Planning my trip. ENGLISH DOT WORKS 2. SENA. semana 4 actividad 1.
Evidence: Planning my trip. ENGLISH DOT WORKS 2. SENA. semana 4 actividad 1... ..
 

Destacado (20)

Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
(The porpuse for reading)lectura critica
(The porpuse for reading)lectura critica(The porpuse for reading)lectura critica
(The porpuse for reading)lectura critica
 
(The porpuse for reading)lectura critica
(The porpuse for reading)lectura critica(The porpuse for reading)lectura critica
(The porpuse for reading)lectura critica
 
Luis felipe cadavid acosta
Luis felipe cadavid acostaLuis felipe cadavid acosta
Luis felipe cadavid acosta
 
Gfpi f-019 guia de aprendizaje 01 tda orientar fpi
Gfpi f-019 guia de aprendizaje 01 tda orientar fpiGfpi f-019 guia de aprendizaje 01 tda orientar fpi
Gfpi f-019 guia de aprendizaje 01 tda orientar fpi
 
Salud
SaludSalud
Salud
 
El emprendedor y el empresario profesional cert
El emprendedor y el empresario profesional certEl emprendedor y el empresario profesional cert
El emprendedor y el empresario profesional cert
 
Como hacer un plan de negocios
Como hacer un plan de negociosComo hacer un plan de negocios
Como hacer un plan de negocios
 
Evidence: Describing my kitchen. ENGLISH DOT WORKS 2. SENA.
Evidence: Describing my kitchen. ENGLISH DOT WORKS 2. SENA.Evidence: Describing my kitchen. ENGLISH DOT WORKS 2. SENA.
Evidence: Describing my kitchen. ENGLISH DOT WORKS 2. SENA.
 
Estrategias competitivas básicas
Estrategias competitivas básicasEstrategias competitivas básicas
Estrategias competitivas básicas
 
Cápsula 1. estudios de mercado
Cápsula 1. estudios de mercadoCápsula 1. estudios de mercado
Cápsula 1. estudios de mercado
 
2. describing cities and places. ENGLISH DOT WORKS 2. SENA. semana 4 acitivda...
2. describing cities and places. ENGLISH DOT WORKS 2. SENA. semana 4 acitivda...2. describing cities and places. ENGLISH DOT WORKS 2. SENA. semana 4 acitivda...
2. describing cities and places. ENGLISH DOT WORKS 2. SENA. semana 4 acitivda...
 
3.Evidence: Getting to Bogota.ENGLISH DOT WORKS 2. SENA.semana 4 actividad 3.
3.Evidence: Getting to Bogota.ENGLISH DOT WORKS 2. SENA.semana 4 actividad 3.3.Evidence: Getting to Bogota.ENGLISH DOT WORKS 2. SENA.semana 4 actividad 3.
3.Evidence: Getting to Bogota.ENGLISH DOT WORKS 2. SENA.semana 4 actividad 3.
 
Evidence: Going to the restaurant . ENGLISH DOT WORKS 2. SENA.
Evidence: Going to the restaurant . ENGLISH DOT WORKS 2. SENA.Evidence: Going to the restaurant . ENGLISH DOT WORKS 2. SENA.
Evidence: Going to the restaurant . ENGLISH DOT WORKS 2. SENA.
 
Evidence: I can’t believe it.ENGLISH DOT WORKS 2. semana 3 actividad 1.SENA.
Evidence: I can’t believe it.ENGLISH DOT WORKS 2. semana 3 actividad 1.SENA.Evidence: I can’t believe it.ENGLISH DOT WORKS 2. semana 3 actividad 1.SENA.
Evidence: I can’t believe it.ENGLISH DOT WORKS 2. semana 3 actividad 1.SENA.
 
Evidence: Memorable moments.ENGLISH DOT WORKS 2. SENA. semana 2 actividad 2.
Evidence: Memorable moments.ENGLISH DOT WORKS 2. SENA. semana 2 actividad 2.Evidence: Memorable moments.ENGLISH DOT WORKS 2. SENA. semana 2 actividad 2.
Evidence: Memorable moments.ENGLISH DOT WORKS 2. SENA. semana 2 actividad 2.
 
Evidence: Planning my trip. ENGLISH DOT WORKS 2. SENA. semana 4 actividad 1.
Evidence: Planning my trip. ENGLISH DOT WORKS 2. SENA. semana 4 actividad 1.Evidence: Planning my trip. ENGLISH DOT WORKS 2. SENA. semana 4 actividad 1.
Evidence: Planning my trip. ENGLISH DOT WORKS 2. SENA. semana 4 actividad 1.
 

Similar a VEHICULAR ADHOC NETKWOK

Towards secure vehicular clouds
Towards secure vehicular cloudsTowards secure vehicular clouds
Towards secure vehicular cloudsdurgeshkumarshukla
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesNiranjana Padmanabhan
 
Cloud computing
Cloud computingCloud computing
Cloud computingsaralaanuj
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC
 
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxcloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxPriyadharshiniMuruge10
 
Fujitsu Cloud Computing Professional Services
Fujitsu Cloud Computing Professional ServicesFujitsu Cloud Computing Professional Services
Fujitsu Cloud Computing Professional ServicesWilliam Ho (何添福)
 
Padmasree Warrior - Enterprise Architecture 2009
Padmasree Warrior - Enterprise Architecture 2009Padmasree Warrior - Enterprise Architecture 2009
Padmasree Warrior - Enterprise Architecture 2009George Gonzalez
 
Future of Computing - Cloud Computing
Future of Computing - Cloud ComputingFuture of Computing - Cloud Computing
Future of Computing - Cloud ComputingAccenture
 
Cloud Computing – Hype or Reality
Cloud Computing – Hype or RealityCloud Computing – Hype or Reality
Cloud Computing – Hype or Realityashwinirath
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation ReportUsman Sait
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaSoftware Guru
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudGovCloud Network
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Cloud computing 2011 call for papers
Cloud computing 2011 call for papersCloud computing 2011 call for papers
Cloud computing 2011 call for paperspsundarau
 
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)vvmenon22
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 

Similar a VEHICULAR ADHOC NETKWOK (20)

Towards secure vehicular clouds
Towards secure vehicular cloudsTowards secure vehicular clouds
Towards secure vehicular clouds
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
 
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxcloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
 
Fujitsu Cloud Computing Professional Services
Fujitsu Cloud Computing Professional ServicesFujitsu Cloud Computing Professional Services
Fujitsu Cloud Computing Professional Services
 
Padmasree Warrior - Enterprise Architecture 2009
Padmasree Warrior - Enterprise Architecture 2009Padmasree Warrior - Enterprise Architecture 2009
Padmasree Warrior - Enterprise Architecture 2009
 
Future of Computing - Cloud Computing
Future of Computing - Cloud ComputingFuture of Computing - Cloud Computing
Future of Computing - Cloud Computing
 
Cloud Computing – Hype or Reality
Cloud Computing – Hype or RealityCloud Computing – Hype or Reality
Cloud Computing – Hype or Reality
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-Cloud
 
Fog computing
Fog computingFog computing
Fog computing
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Cloud computing 2011 call for papers
Cloud computing 2011 call for papersCloud computing 2011 call for papers
Cloud computing 2011 call for papers
 
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

VEHICULAR ADHOC NETKWOK

  • 1. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Towards Secure Vehicular Clouds Durgesh Kumar Shukla 2010PTSW24 M.Tech( Software Engineering -Part Time ) - V Sem November , 2012 Department of Computer Science and Engineering Motilal Nehru National Institute of Technology Allahabad Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 2. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References 1 VANET 2 Cloud computing 3 Vehicular cloud 4 Security in Vehicular Cloud 5 Conclusion 6 References Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 3. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Smart vehicles Vehicles are becoming more sophisticated Powerful on-board computing capabilities Tons of on-board of storage Significant communication capabilities No power limitations Computations capabilities supported by Hosts of sensors and actuators On-board radar and GPS Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 4. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References VANET Main characteristics Deliver timely information to drivers in a cost-effective manner Uses vehicles as network nodes Vehicles move at will relative to each other but within the constraints of the road infrastructure Communications Vehicle-to-Vehicle (V2V) : zero-infrastructure Vehicle-to-Infrastructure (V2I): roadside devices Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 5. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Cloud computing A paradigm shift suggested by: Low cost high-speed Internet Virtualization Advances in parallel and distributed databases Basic idea: Why buy when we can rent? Exactly what we need Exactly when we need it No upfront investment No maintenance costs Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 6. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Cloud computing Cloud Services Software as a Service (SaaS) Customers rent software hosted by the vendor Platform as a Service (PaaS) Customers rent infrastructure and programming tools hosted by the vendor to create their own applications Infrastructure as a Service (IaaS) Customers rent processing, storage, networking and other fundamental computing resources for all purposes Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 7. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Vehicular cloud Motivation Parking lot of a typical enterprise on a typical workday hundreds/thousands cars go unused for hours on end Why rent computational/storage resources elsewhere? Durgesh KumarWe have them in Software Engineering -Part Time ) - VVehicular Clouds Shukla2010PTSW24M.Tech( our own backyard Secure Sem Towards
  • 8. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Vehicular cloud Motivation Dedicated Short Range Communications (DSRC) Allocated by US Federal Communications Commission 75MHz of spectrum (5.850 to 5.925 GHz) Roadside infrastructures Inductive loop detectors Video cameras Acoustic tracking systems Microwave radar sensors Access point Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 9. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References VC Vehicular Cloud A group of vehicles whose corporate computing, sensing, communication and physical resources can be coordinated and dynamically allocated to authorized users VCs are different from the classic clouds Mobility Autonomy Agility Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 10. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References VC Vehicular Cloud Storage as a Service (SaaS) Computers in cars will have multiple terabytes of on-board storage Data center in mall/airport/parking lot Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 11. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References VC Vehicular Cloud Network as a Service (NaaS) Most cars dont have internet connection Small relative speed between cars on the same direction: traditional MANET Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 12. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References VC Vehicular Cloud Cooperation as a Service (CaaS) Drivers behind the wheels: suitable for human interaction tasks Weather? Road condition? Best restaurant around a specific place? Publish/subscribe mechanism Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 13. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Application Of VC Application Traffic management Road condition sharing Accident alerts at intersections Intelligent parking management Safety critical applications Managed disaster evacuation Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 14. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Security in Vehicular Cloud Security Attack and Threats Both Users and Attackers are equal Attack targets: Confidentiality, Integrity, Availability Examples: Narrow down the possible areas where the target users services are executing by mapping the topology of VC Launch multiple experimental accesses Request the services on the same VM where the target user is on Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 15. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Security in Vehicular Cloud Possible Solutions Safety Messages Confidential Messages Digital signatures Data Isolation and Sanitization Location validation Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 16. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Security in Vehicular Cloud Security and functional challenges Key management Trust management Location security DoS prevention Message aggregation and validation Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 17. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References Conclusion The tradeoffs between security and performance will need to be explored Time delay management With joint efforts and close cooperation among different organizations such as law enforcement, government, auto-industry and academic can provide solid and feasible security and privacy solutions for the vehicular cloud computing. Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 18. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References References [1]Gongjun Yan, Ding Wen, Stephan Olariu, and Michele C. Weigle ”Security Challenges in Vehicular Cloud Computing,” 2012 IEEE Transactions On Intelligent Transportation Systems [2] Gongjun Yan Indiana Univ., Kokomo, IN, USA Rawat, D.B. ; Bista, B.B. ” Towards Secure Vehicular Clouds,” 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS). [3] M. Abuelela and S. Olariu, ”Taking vanet to the clouds,” Proceedings of The 8th Interna- tional Conference on Advances in Mobile Computing and Multimedia MoMM 2010, pp. 810, 2010. [4] M. Eltoweissy, S. Olariu, and M. Younis, ” Towards autonomous vehicular clouds,” in Pro- ceedings of AdHocNets2010, Victoria, BC, Canada, August 2010. Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 19. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References References [5] M. Eltoweissy, S. Olariu and M. Younis, ”Towards Vehicular Clouds”, Proc. AdHocNets, 2010, Victoria, BC, August 2010. [6] Fay Hui: A survey on the characterization of Vehicular Ad Hoc Networks routing solu- tions ECS 257 Winter 2005 [7]T. ElGamal, ”A public key cryptosystem and a signature scheme based on discrete loga- rithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469472, 1985. Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem
  • 20. Outline VANET Cloud computing Vehicular cloud Security in Vehicular Cloud Conclusion References THANK YOU Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds Towards Secure Sem