skip to main content
research-article
Public Access

SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing

Published:02 January 2017Publication History
Skip Abstract Section

Abstract

The expected advanced network explorations and the growing demand for mobile data sharing and transferring have driven numerous novel applications in Cyber-Physical Systems (CPSs), such as Intelligent Transportation Systems (ITSs). However, current ITS implementations are restricted by the conflicts between security and communication efficiency. Focusing on this issue, this article proposes a Security-Aware Efficient Data Sharing and Transferring (SA-EAST) model, which is designed for securing cloud-based ITS implementations. In applying this approach, we aim to obtain secure real-time multimedia data sharing and transferring. Our experimental evaluation has shown that our proposed model provides an effective performance in securing communications for ITS.

References

  1. H. Abbas, G. Fainekos, S. Sankaranarayanan, F. Ivančić, and A. Gupta. 2013. Probabilistic temporal logic falsification of cyber-physical systems. ACM Transactions on Embedded Computing Systems 12, 2s, 95.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. Abou-zeid, H. Hassanein, and S. Valentin. 2014. Energy-efficient adaptive video transmission: Exploiting rate predictions in wireless networks. IEEE Transactions on Vehicular Technology 63, 5, 2013--2026. Google ScholarGoogle ScholarCross RefCross Ref
  3. I. Akyildiz, P. Wang, and S. Lin. 2015. SoftAir: A software defined networking architecture for 5G wireless systems. Computer Networks 85, 1--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Bae and A. Kwasinski. 2012. Spatial and temporal model of electric vehicle charging demand. IEEE Transactions on Smart Grid 3, 1, 394--403. Google ScholarGoogle ScholarCross RefCross Ref
  5. R. Balani, L. Wanner, and M. Srivastava. 2014. Distributed programming framework for fast iterative optimization in networked cyber-physical systems. ACM Transactions on Embedded Computing Systems 13, 2s, 66.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Batistatos, G. Tsoulos, and G. Athanasiadou. 2012. Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges. Journal of Network and Computer Applications 35, 3, 1140--1150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Boban, T. Vinhoza, M. Ferreira, J. Barros, and O. Tonguz. 2011. Impact of vehicles as obstacles in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications 29, 1, 15--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Calandriello, P. Papadimitratos, J. Hubaux, and A. Lioy. 2011. On the performance of secure vehicular communication systems. IEEE Transactions on Dependable and Secure Computing 8, 6, 898--912. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. F. Carpi, N. Kastelein, M. Talcott, and C. Pappone. 2011. Magnetically controllable gastrointestinal steering of video capsules. IEEE Transactions on Biomedical Engineering 58, 2, 231--234. Google ScholarGoogle ScholarCross RefCross Ref
  10. K. Chan, T. Dillon, J. Singh, and E. Chang. 2012. Neural-network-based models for short-term traffic flow forecasting using a hybrid exponential smoothing and Levenberg--Marquardt algorithm. IEEE Transactions on Intelligent Transportation Systems 13, 2, 644--654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Cicalo and V. Tralli. 2014. Distortion-fair cross-layer resource allocation for scalable video transmission in OFDMA wireless networks. IEEE Transactions on Multimedia 16, 3, 848--863. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Dai, Z. Wang, and Z. Yang. 2013. Compressive sensing based time domain synchronous OFDM transmission for vehicular communications. IEEE Journal on Selected Areas in Communications 31, 9, 460--469. Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Dua, N. Bulusu, W. Feng, and W. Hu. 2014. Combating software and Sybil attacks to data integrity in crowd-sourced embedded systems. ACM Transactions on Embedded Computing Systems 13, 5s, 154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Gai and S. Li. 2012. Towards cloud computing: A literature review on cloud computing and its development trends. In IEEE 4th International Conference on Multimedia Information Networking and Security. IEEE, Nanjing, China, 142--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. Gai, L. Qiu, H. Zhao, and M. Qiu. 2016a. Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing. IEEE Transactions on Cloud Computing PP, 99, 1. Google ScholarGoogle ScholarCross RefCross Ref
  16. K. Gai, M. Qiu, L. Tao, and Y. Zhu. 2015. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks PP, 99, 1--10.Google ScholarGoogle Scholar
  17. K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong. 2016b. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications 59, 46--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Gebotys and B. White. 2015. A sliding window phase-only correlation method for side-channel alignment in a smartphone. ACM Transactions on Embedded Computing Systems 14, 4, 80.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. Deng. 2011. A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems 22, 8, 1390--1397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Jafari, S. Al-Khayatt, and A. Dogman. 2012. Performance evaluation of IEEE 802.11 p for vehicular communication networks. In 8th International Symposium on Communication Systems, Networks 8 Digital Signal Processing. IEEE, Poznan, Poland, 1--5.Google ScholarGoogle Scholar
  21. R. Jain and S. Paul. 2013. Network virtualization and software defined networking for cloud computing: A survey. IEEE Communications Magazine 51, 11, 24--31. Google ScholarGoogle ScholarCross RefCross Ref
  22. G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, and T. Weil. 2011. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys 8 Tutorials 13, 4, 584--616.Google ScholarGoogle Scholar
  23. K. Lakshmanan, D. De Niz, R. Rajkumar, and G. Moreno. 2012. Overload provisioning in mixed-criticality cyber-physical systems. ACM Transactions on Embedded Computing Systems 11, 4, 83.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Li, M. Qiu, Z. Ming, G. Quan, X. Qin, and Z. Gu. 2012. Online optimization for scheduling preemptable tasks on IaaS cloud systems. Journal of Parallel and Distributed Computing 72, 5, 666--677. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Li, M. Qiu, J. Niu, L. Yang, Y. Zhu, and Z. Ming. 2013. Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads. ACM Transactions on Embedded Computing System 12, 2, 24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Malik, Z. Salcic, C. Chong, and S. Javed. 2012. System-level approach to the design of a smart distributed surveillance system using systemj. ACM Transactions on Embedded Computing Systems 11, 4, 77.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. Ortega-Vazquez, F. Bouffard, and V. Silva. 2013. Electric vehicle aggregator/system operator coordination for charging scheduling and services procurement. IEEE Transactions on Power Systems 28, 2, 1806--1815. Google ScholarGoogle ScholarCross RefCross Ref
  28. A. Pande, P. Mohapatra, and J. Zambreno. 2013. Securing multimedia content using joint compression and encryption. IEEE MultiMedia 20, 4, 50--61. Google ScholarGoogle ScholarCross RefCross Ref
  29. L. Pang, X. Li, J. Chai, and Y. Liu. 2014. A high performance video frame extractor for omni media monitoring system. In IEEE 12th International Conference on Signal Processing. IEEE, Hangzhou, China, 399--402. Google ScholarGoogle ScholarCross RefCross Ref
  30. P. Pereira, A. Casaca, J. Rodrigues, V. Soares, J. Triay, and C. Cervelló-Pastor. 2012. From delay-tolerant networks to vehicular delay-tolerant networks. IEEE Communications Surveys 8 Tutorials 14, 4, 1166--1182.Google ScholarGoogle Scholar
  31. M. Qiu, Z. Chen, Z. Ming, X. Qin, and J. Niu. 2014. Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Systems Journal PP 99, 1--10. Google ScholarGoogle ScholarCross RefCross Ref
  32. M. Qiu, W. Gao, M. Chen, J. Niu, and L. Zhang. 2011. Energy efficient security algorithm for power grid wide area monitoring system. IEEE Transactions on Smart Grid 2, 4, 715--723. Google ScholarGoogle ScholarCross RefCross Ref
  33. M. Qiu and E. Sha. 2009. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Transactions on Design Automation of Electronic System 14, 2, 25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Qiu, M. Zhong, J. Li, K. Gai, and Z. Zong. 2015. Phase-change memory optimization for green cloud with genetic algorithm. IEEE Transactions on Computers 64, 12, 3528--3540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. H. Sedjelmaci, S. Senouci, and M. Abu-Rgheff. 2014. An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks. IEEE Internet of Things Journal 1, 6, 570--577. Google ScholarGoogle ScholarCross RefCross Ref
  36. D. Serpanos and A. Voyiatzis. 2013. Security challenges in embedded systems. ACM Transactions on Embedded Computing Systems 12, 1s, 66.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. W. Song and W. Zhuang. 2012. Performance analysis of probabilistic multipath transmission of video streaming traffic over multi-radio wireless devices. IEEE Transactions on Wireless Communications 11, 4, 1554--1564. Google ScholarGoogle ScholarCross RefCross Ref
  38. Q. Tang, S. Gupta, and G. Varsamopoulos. 2012. A unified methodology for scheduling in distributed cyber-physical systems. ACM Transactions on Embedded Computing Systems 11, S2, 57.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. B. Wang, Y. Zheng, W. Lou, and Y. Hou. 2015. DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks 81, 308--319. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. L. Wang, A. Syed, G. Yin, A. Pandya, and H. Zhang. 2012b. Coordinated vehicle platoon control: Weighted and constrained consensus and communication network topologies. In IEEE 51st Annual Conference on Decision and Control. IEEE, Maui, HI, 4057--4062.Google ScholarGoogle Scholar
  41. M. Wang, R. Hong, G. Li, Z. Zha, S. Yan, and T. Chua. 2012a. Event driven web video summarization by tag localization and key-shot identification. IEEE Transactions on Multimedia 14, 4, 975--985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Y. Wang, Y. Xiang, J. Zhang, W. Zhou, G. Wei, and L. T. Yang. 2014. Internet traffic classification using constrained clustering. IEEE Transactions on Parallel and Distributed Systems 25, 11, 2932--2943. Google ScholarGoogle ScholarCross RefCross Ref
  43. C. Wu, H. Mohsenian-Rad, and Jianwei J. Huang. 2012. Vehicle-to-aggregator interaction game. IEEE Transactions on Smart Grid 3, 1, 434--442.Google ScholarGoogle ScholarCross RefCross Ref
  44. Y. Xiang, K. Li, and W. Zhou. 2011. Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Transactions on Information Forensics and Security 6, 2, 426--437. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!