2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS) 2019
DOI: 10.1109/wits.2019.8723723
|View full text |Cite
|
Sign up to set email alerts
|

A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…To develop better trust models for cloud-supported CV applications, edge computing can be used. In [65], the authors introduce a decoy technology (DT) and user behavior profiling (UBP) to solve trust issues in cloud servers using edge computing architecture. The edge computing-based UBP system ensures the trust relationship with the CVs in the cloud, as an intruder can be detected based on its behavior profile [65].…”
Section: ) Existing Studies Addressing the Challenge And Current Gapmentioning
confidence: 99%
“…To develop better trust models for cloud-supported CV applications, edge computing can be used. In [65], the authors introduce a decoy technology (DT) and user behavior profiling (UBP) to solve trust issues in cloud servers using edge computing architecture. The edge computing-based UBP system ensures the trust relationship with the CVs in the cloud, as an intruder can be detected based on its behavior profile [65].…”
Section: ) Existing Studies Addressing the Challenge And Current Gapmentioning
confidence: 99%
“…The following examples present the use of VANETs, IoV, VCC, and VFC and their security benefit. M. Bousselham et al [120] and S. K. Erskine and K. M. Elleithy [121] suggest how to use fog computing to enhance VCC and VANETs security, respectively. In R. Hussain and H. Oh [122], cooperation-as-aservice and VANET Clouds are used for security in the VANETs themselves.…”
Section: Security Issuesmentioning
confidence: 99%
“…Fog nodes do not have to come and go since each content of the HTTP request for redirects, style sheets, scripts, and images, and we can get through, execute and combine them at once using FC with the help of the web. Besides, users can be identified based on different cookies or MAC addresses, user tracking requests, and determine local network conditions and cache files [97].…”
Section: Web Optimizationmentioning
confidence: 99%