Visible to the public A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System

TitleA new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
Publication TypeConference Paper
Year of Publication2019
AuthorsBousselham, Mhidi, Benamar, Nabil, Addaim, Adnane
Conference Name2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)
Keywordscloud computing, Computer architecture, data privacy, Data processing, data servers, Decoy technology, distributed processing, edge computing, Encryption, energy consumption reduction, Fog Computing, Fog Computing and Security, fog computing architecture, fog computing system, Monitoring, power aware computing, Prediction algorithms, privacy, pubcrawl, Resiliency, Scalability, secure vehicular platform, security, security mechanism, Traffic congestion, traffic engineering computing, UBP, user behavior profiling, VANET, VCC, vehicle computing service requests, vehicle storing service requests, vehicular cloud computing, vehicular cloud servers, Vehicular fog computing

Recently Vehicular Cloud Computing (VCC) has become an attractive solution that support vehicle's computing and storing service requests. This computing paradigm insures a reduced energy consumption and low traffic congestion. Additionally, VCC has emerged as a promising technology that provides a virtual platform for processing data using vehicles as infrastructures or centralized data servers. However, vehicles are deployed in open environments where they are vulnerable to various types of attacks. Furthermore, traditional cryptographic algorithms failed in insuring security once their keys compromised. In order to insure a secure vehicular platform, we introduce in this paper a new decoy technology DT and user behavior profiling (UBP) as an alternative solution to overcome data security, privacy and trust in vehicular cloud servers using a fog computing architecture. In the case of a malicious behavior, our mechanism shows a high efficiency by delivering decoy files in such a way making the intruder unable to differentiate between the original and decoy file.

Citation Keybousselham_new_2019