scispace - formally typeset
Journal ArticleDOI

A survey on vehicular cloud computing

TLDR
A taxonomy for vehicular cloud is presented in which special attention has been devoted to the extensive applications, cloud formations, key management, inter cloud communication systems, and broad aspects of privacy and security issues, which found that VCC is a technologically feasible and economically viable technological shifting paradigm for converging intelligent vehicular networks towards autonomous traffic, vehicle control and perception systems.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2014-04-01. It has received 711 citations till now. The article focuses on the topics: Vehicular communication systems & Cloud computing security.

read more

Citations
More filters
Journal ArticleDOI

On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration

TL;DR: This paper analyzes the MEC reference architecture and main deployment scenarios, which offer multi-tenancy support for application developers, content providers, and third parties, and elaborates further on open research challenges.
Journal ArticleDOI

A Survey of Autonomous Driving: Common Practices and Emerging Technologies

TL;DR: The technical aspect of automated driving is surveyed, with an overview of available datasets and tools for ADS development and many state-of-the-art algorithms implemented and compared on their own platform in a real-world driving setting.
Journal ArticleDOI

Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures

TL;DR: An interesting relationship among the communication capability, connectivity, and mobility of vehicles is unveiled, and the characteristics about the pattern of parking behavior are found, which benefits from the understanding of utilizing the vehicular resources.
Journal ArticleDOI

A Survey on Platoon-Based Vehicular Cyber-Physical Systems

TL;DR: The fundamental issues in a platoon-based VCPS are discussed, including vehicle platooning/clustering, cooperative adaptive cruise control, platoon- based vehicular communications, etc., all of which are characterized by the tightly coupled relationship between traffic dynamics and VANET behaviors.
Journal ArticleDOI

Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges

TL;DR: This survey starts by providing an overview and fundamental of fog computing architecture, and provides an extensive overview of state-of-the-art network applications and major research aspects to design these networks.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility

TL;DR: This paper defines Cloud computing and provides the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs), and provides insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA) oriented resource allocation.
Book ChapterDOI

A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

TL;DR: In this article, a new signature scheme is proposed together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem and the security of both systems relies on the difficulty of computing discrete logarithms over finite fields.
Related Papers (5)