Abstract
The expected advanced network explorations and the growing demand for mobile data sharing and transferring have driven numerous novel applications in Cyber-Physical Systems (CPSs), such as Intelligent Transportation Systems (ITSs). However, current ITS implementations are restricted by the conflicts between security and communication efficiency. Focusing on this issue, this article proposes a Security-Aware Efficient Data Sharing and Transferring (SA-EAST) model, which is designed for securing cloud-based ITS implementations. In applying this approach, we aim to obtain secure real-time multimedia data sharing and transferring. Our experimental evaluation has shown that our proposed model provides an effective performance in securing communications for ITS.
- H. Abbas, G. Fainekos, S. Sankaranarayanan, F. Ivančić, and A. Gupta. 2013. Probabilistic temporal logic falsification of cyber-physical systems. ACM Transactions on Embedded Computing Systems 12, 2s, 95.Google Scholar
Digital Library
- H. Abou-zeid, H. Hassanein, and S. Valentin. 2014. Energy-efficient adaptive video transmission: Exploiting rate predictions in wireless networks. IEEE Transactions on Vehicular Technology 63, 5, 2013--2026. Google Scholar
Cross Ref
- I. Akyildiz, P. Wang, and S. Lin. 2015. SoftAir: A software defined networking architecture for 5G wireless systems. Computer Networks 85, 1--18. Google Scholar
Digital Library
- S. Bae and A. Kwasinski. 2012. Spatial and temporal model of electric vehicle charging demand. IEEE Transactions on Smart Grid 3, 1, 394--403. Google Scholar
Cross Ref
- R. Balani, L. Wanner, and M. Srivastava. 2014. Distributed programming framework for fast iterative optimization in networked cyber-physical systems. ACM Transactions on Embedded Computing Systems 13, 2s, 66.Google Scholar
Digital Library
- M. Batistatos, G. Tsoulos, and G. Athanasiadou. 2012. Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges. Journal of Network and Computer Applications 35, 3, 1140--1150. Google Scholar
Digital Library
- M. Boban, T. Vinhoza, M. Ferreira, J. Barros, and O. Tonguz. 2011. Impact of vehicles as obstacles in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications 29, 1, 15--28. Google Scholar
Digital Library
- G. Calandriello, P. Papadimitratos, J. Hubaux, and A. Lioy. 2011. On the performance of secure vehicular communication systems. IEEE Transactions on Dependable and Secure Computing 8, 6, 898--912. Google Scholar
Digital Library
- F. Carpi, N. Kastelein, M. Talcott, and C. Pappone. 2011. Magnetically controllable gastrointestinal steering of video capsules. IEEE Transactions on Biomedical Engineering 58, 2, 231--234. Google Scholar
Cross Ref
- K. Chan, T. Dillon, J. Singh, and E. Chang. 2012. Neural-network-based models for short-term traffic flow forecasting using a hybrid exponential smoothing and Levenberg--Marquardt algorithm. IEEE Transactions on Intelligent Transportation Systems 13, 2, 644--654. Google Scholar
Digital Library
- S. Cicalo and V. Tralli. 2014. Distortion-fair cross-layer resource allocation for scalable video transmission in OFDMA wireless networks. IEEE Transactions on Multimedia 16, 3, 848--863. Google Scholar
Digital Library
- L. Dai, Z. Wang, and Z. Yang. 2013. Compressive sensing based time domain synchronous OFDM transmission for vehicular communications. IEEE Journal on Selected Areas in Communications 31, 9, 460--469. Google Scholar
Cross Ref
- A. Dua, N. Bulusu, W. Feng, and W. Hu. 2014. Combating software and Sybil attacks to data integrity in crowd-sourced embedded systems. ACM Transactions on Embedded Computing Systems 13, 5s, 154.Google Scholar
Digital Library
- K. Gai and S. Li. 2012. Towards cloud computing: A literature review on cloud computing and its development trends. In IEEE 4th International Conference on Multimedia Information Networking and Security. IEEE, Nanjing, China, 142--146. Google Scholar
Digital Library
- K. Gai, L. Qiu, H. Zhao, and M. Qiu. 2016a. Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing. IEEE Transactions on Cloud Computing PP, 99, 1. Google Scholar
Cross Ref
- K. Gai, M. Qiu, L. Tao, and Y. Zhu. 2015. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks PP, 99, 1--10.Google Scholar
- K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong. 2016b. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications 59, 46--54. Google Scholar
Digital Library
- C. Gebotys and B. White. 2015. A sliding window phase-only correlation method for side-channel alignment in a smartphone. ACM Transactions on Embedded Computing Systems 14, 4, 80.Google Scholar
Digital Library
- X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. Deng. 2011. A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems 22, 8, 1390--1397. Google Scholar
Digital Library
- A. Jafari, S. Al-Khayatt, and A. Dogman. 2012. Performance evaluation of IEEE 802.11 p for vehicular communication networks. In 8th International Symposium on Communication Systems, Networks 8 Digital Signal Processing. IEEE, Poznan, Poland, 1--5.Google Scholar
- R. Jain and S. Paul. 2013. Network virtualization and software defined networking for cloud computing: A survey. IEEE Communications Magazine 51, 11, 24--31. Google Scholar
Cross Ref
- G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, and T. Weil. 2011. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys 8 Tutorials 13, 4, 584--616.Google Scholar
- K. Lakshmanan, D. De Niz, R. Rajkumar, and G. Moreno. 2012. Overload provisioning in mixed-criticality cyber-physical systems. ACM Transactions on Embedded Computing Systems 11, 4, 83.Google Scholar
Digital Library
- J. Li, M. Qiu, Z. Ming, G. Quan, X. Qin, and Z. Gu. 2012. Online optimization for scheduling preemptable tasks on IaaS cloud systems. Journal of Parallel and Distributed Computing 72, 5, 666--677. Google Scholar
Digital Library
- J. Li, M. Qiu, J. Niu, L. Yang, Y. Zhu, and Z. Ming. 2013. Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads. ACM Transactions on Embedded Computing System 12, 2, 24.Google Scholar
Digital Library
- A. Malik, Z. Salcic, C. Chong, and S. Javed. 2012. System-level approach to the design of a smart distributed surveillance system using systemj. ACM Transactions on Embedded Computing Systems 11, 4, 77.Google Scholar
Digital Library
- M. Ortega-Vazquez, F. Bouffard, and V. Silva. 2013. Electric vehicle aggregator/system operator coordination for charging scheduling and services procurement. IEEE Transactions on Power Systems 28, 2, 1806--1815. Google Scholar
Cross Ref
- A. Pande, P. Mohapatra, and J. Zambreno. 2013. Securing multimedia content using joint compression and encryption. IEEE MultiMedia 20, 4, 50--61. Google Scholar
Cross Ref
- L. Pang, X. Li, J. Chai, and Y. Liu. 2014. A high performance video frame extractor for omni media monitoring system. In IEEE 12th International Conference on Signal Processing. IEEE, Hangzhou, China, 399--402. Google Scholar
Cross Ref
- P. Pereira, A. Casaca, J. Rodrigues, V. Soares, J. Triay, and C. Cervelló-Pastor. 2012. From delay-tolerant networks to vehicular delay-tolerant networks. IEEE Communications Surveys 8 Tutorials 14, 4, 1166--1182.Google Scholar
- M. Qiu, Z. Chen, Z. Ming, X. Qin, and J. Niu. 2014. Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Systems Journal PP 99, 1--10. Google Scholar
Cross Ref
- M. Qiu, W. Gao, M. Chen, J. Niu, and L. Zhang. 2011. Energy efficient security algorithm for power grid wide area monitoring system. IEEE Transactions on Smart Grid 2, 4, 715--723. Google Scholar
Cross Ref
- M. Qiu and E. Sha. 2009. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Transactions on Design Automation of Electronic System 14, 2, 25.Google Scholar
Digital Library
- M. Qiu, M. Zhong, J. Li, K. Gai, and Z. Zong. 2015. Phase-change memory optimization for green cloud with genetic algorithm. IEEE Transactions on Computers 64, 12, 3528--3540. Google Scholar
Digital Library
- H. Sedjelmaci, S. Senouci, and M. Abu-Rgheff. 2014. An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks. IEEE Internet of Things Journal 1, 6, 570--577. Google Scholar
Cross Ref
- D. Serpanos and A. Voyiatzis. 2013. Security challenges in embedded systems. ACM Transactions on Embedded Computing Systems 12, 1s, 66.Google Scholar
Digital Library
- W. Song and W. Zhuang. 2012. Performance analysis of probabilistic multipath transmission of video streaming traffic over multi-radio wireless devices. IEEE Transactions on Wireless Communications 11, 4, 1554--1564. Google Scholar
Cross Ref
- Q. Tang, S. Gupta, and G. Varsamopoulos. 2012. A unified methodology for scheduling in distributed cyber-physical systems. ACM Transactions on Embedded Computing Systems 11, S2, 57.Google Scholar
Digital Library
- B. Wang, Y. Zheng, W. Lou, and Y. Hou. 2015. DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks 81, 308--319. Google Scholar
Digital Library
- L. Wang, A. Syed, G. Yin, A. Pandya, and H. Zhang. 2012b. Coordinated vehicle platoon control: Weighted and constrained consensus and communication network topologies. In IEEE 51st Annual Conference on Decision and Control. IEEE, Maui, HI, 4057--4062.Google Scholar
- M. Wang, R. Hong, G. Li, Z. Zha, S. Yan, and T. Chua. 2012a. Event driven web video summarization by tag localization and key-shot identification. IEEE Transactions on Multimedia 14, 4, 975--985. Google Scholar
Digital Library
- Y. Wang, Y. Xiang, J. Zhang, W. Zhou, G. Wei, and L. T. Yang. 2014. Internet traffic classification using constrained clustering. IEEE Transactions on Parallel and Distributed Systems 25, 11, 2932--2943. Google Scholar
Cross Ref
- C. Wu, H. Mohsenian-Rad, and Jianwei J. Huang. 2012. Vehicle-to-aggregator interaction game. IEEE Transactions on Smart Grid 3, 1, 434--442.Google Scholar
Cross Ref
- Y. Xiang, K. Li, and W. Zhou. 2011. Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Transactions on Information Forensics and Security 6, 2, 426--437. Google Scholar
Digital Library
Index Terms
SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing
Recommendations
Artificial intelligence in Internet of things
Functioning of the Internet is persistently transforming from the Internet of computers (IoC) to the ‘Internet of things (IoT)’. Furthermore, massively interconnected systems, also known as cyber‐physical systems (CPSs), are emerging from the assimilation ...
Study on Model-designing & Architecture of IOT-based Intelligent Transportation System
ICETCE '12: Proceedings of the 2012 Second International Conference on Electric Technology and Civil EngineeringAs an integral part in the industry chain of IOT, intelligent transportation has the characteristics which is highly used in the application market, maturely technological and greatly supported by government, therefore, the introduction of Internet of ...
Low complexity cybersecurity architecture for the development of ITS in smart cities
The application of an intelligent transportation system (ITS) within smart cities is an emerging technology that requires access to a network, and might be exposed to cyberattacks, which may affect the privacy of users and drivers. One of the most ...






Comments