Cloud Computing in VANETs: Architecture & Challenges
Cloud Computing in VANETs: Architecture & Challenges
To cite this article: Ahmed Aliyu, Abdul Hanan Abdullah, Omprakash Kaiwartya, Yue Cao,
Mohammed Joda Usman, Sushil Kumar, D. K. Lobiyal & Ram Shringar Raw (2017): Cloud
Computing in VANETs: Architecture, Taxonomy, and Challenges, IETE Technical Review, DOI:
10.1080/02564602.2017.1342572
Article views: 86
ABSTRACT KEYWORDS
Cloud computing in VANETs (CC-V) has been investigated into two major themes of research Architecture; Cloud
including vehicular cloud computing (VCC) and vehicle using cloud (VuC). VCC is the realization of computing; Taxonomy;
autonomous cloud among vehicles to share their abundant resources. VuC is the efficient usage Vehicle using cloud;
of conventional cloud by on-road vehicles via a reliable Internet connection. Recently, a number of Vehicular ad hoc networks;
Vehicular cloud
advancements have been made to address the issues and challenges in VCC and VuC. This paper
qualitatively reviews CC-V with the emphasis on layered architecture, network component,
taxonomy, and future challenges. Specifically, a four-layered architecture for CC-V is proposed
including perception, coordination, artificial intelligence and smart application layers. Three
network components of CC-V, namely, vehicle, connection, and computation are explored with
their cooperative roles. A taxonomy for CC-V is presented considering major themes of research in
the area including design of architecture, data dissemination, security, and applications. Related
literature on each theme is critically investigated with comparative assessment of recent advances.
Finally, some open research challenges are identified as future issues. The challenges are the
outcome of the critical and qualitative assessment of the literature on CC-V.
In terms of protocol perspective, physical layer part of considered. The protocols include IEEE 1609.6 of
the protocols including IEEE 802.11p (PHY-802.11p) of WAVE, COaaS, STaaS, picture as a service (PICaaS),
WAVE [15], 802.11a/b/g of WLAN [16], Wi-Max [17], infrastructure as a service (INaaS), CaaS, NaaS, and gate-
and 4G/LTE [18] are considered. This is due to the con- way as a service (GaaS). The design of protocols for BDA
sideration of heterogeneous in-vehicle devices contain- and VCC is an open research theme in CC-V due to the
ing different types of sensors. growing volume of traffic data.
vehicles. This component is closely related to the percep- considered in CC-V. The network devices are utilized to
tion layer of the proposed architecture. This is due to establish reliable communication between vehicles and
different types of sensors for monitoring speed, direc- cloud. In the case of VuC, the connection is either a
tion, and position which are considered to be attached to direct communication between vehicles and cloud infra-
the vehicles. The second component, namely, connec- structure, or a multi-hop communication using road
tion includes network or communication devices of the side units (RSUs) with vehicles. In the case of VCC, con-
heterogeneous networks. A heterogeneous network nection is mostly direct communication between a vehi-
including VANETs, Wi-Fi, and 4G/LTE is primarily cle and vehicular cloud infrastructure. The connection
considered. This component is closely related with the also defines services level agreement (SLA) between a
coordination layer of the proposed architecture. The last vehicular client and cloud infrastructure. It is due to the
component named computation refers to the computing fact that SLA represents the level of Quality of Service
and storage devices, responsible for the efficient process- (QoS) of an application based on the architecture of
ing of big traffic data, and inferring intelligent decisions. CC-V. Therefore, connection determines delivery and
This last component is closely related to the artificial acceptances of the services.
intelligence layer of the proposed layered architecture.
This is due to the related functionalities of the layer. The
3.3 Computation
relationship among these network components is poten-
tial due to the collective operation requirement for the The computation refers to the computing and storage
services offered by the architecture. The vehicle-to-con- devices where big traffic data are processed and intelli-
nection relationship determines the efficiency of delivery gent decisions are inferred. The computation is broadly
and acceptance of the services provided. The connection divided into three models including computation pro-
and computation determine the quality of information vider, computation consumer, and hybrid. In computa-
of the services. Each element and their role in CC-V are tion provider model, the vehicles are required to register
defined below. with service provider for availing their vehicular resour-
ces to cloud computing architecture using SLA. In com-
putation consumer model, vehicles need to register for
3.1 Vehicle
utilizing the cloud computing services as their own
The vehicles have several in-built technologies and resources. In the case of hybrid model, vehicles need to
resources, which are underutilized in traditional vehicular register for both as a provider and as a consumer. The
communication architecture. The technologies and provider model would generate revenue by improving
resources include telematics wire devices (TWDs), GPS, resources utilization. The consumer model would
sensors, dedicated short-range communication (DSRC), enhance computing capability of vehicles by utilizing
actuators, computer, and smartphones. The utilization of cloud infrastructure. The hybrid model would be more
these resources can be improved through a cooperative complex due to the need for maintaining provider or
collaborative network architecture. The underutilization consumer state for each vehicle.
of the resources motivates the concept of CC-V. This is
due to the fact that the vehicles do not have some of the
4. CLOUD COMPUTING IN VANETs
challenges of mobile devices in MCC, such as lower com-
puting capability, smaller memory size, and battery life. In this section, CC-V is qualitatively reviewed on the
The resources of vehicles can be shared under the frame- basis of a taxonomy depicted in Figure 3. Cloud comput-
work of VCC at many places while travelling. It includes ing is an emerging research theme in VANETs. It is
parking lot, garage, and traffic light. In case of extensive evolving due to the growing need of higher computing
computing need for longer duration, vehicle’s in-built capability at vehicles to expand the various commercial
technologies can be utilized for establishing durable con- services currently available in the Internet to VANETs.
nection to a conventional cloud. The communication is CC-V has four major issues, namely, design of architec-
known as VuC. For both the cases, VCC and VuC, ture, data dissemination, security, and applications. Each
vehicles equipped with modern communication technolo- issue has been investigated in several directions which are
gies are one of the most important constituents. qualitatively and critically reviewed in following sections.
MVCC [25] GCCM [28] M-EVMVC [30] TIaaS [45] ICDI [47] PVCM[49]
VNVC [26] VMIA [29] VCN [31] TCBI [46] VCC-SSF [48]
TVC [27]
Data Dissemination Privacy Preservation
CPAS [50]
DPK-LSV [51]
Distributed Clustering Non-Distributed Clustering PASS [52]
DMCNF [32] RSAP [38]
COHORT [33] ClouDiV [39] Applications
OC-DSG [34] GaaS [40]
CARD [35] PORP [41]
RADD [36] IP6-VCN [42] Safety Efficiency Infotainment
LTE-A [37] RAR-MCV [43]
SMDP [44] EDRS [56] SIAV [60] CITS [63]
WATVSA [57] SCST [61] MSCVN [64]
AEB-ACD [58] RTCV [62]
CVSSs [59]
is based on three parameters including technique, archi- layered architecture. It is a routing scheme that uses pro-
tecture, and implementation. The technique is defined active and shortest path methods. An algorithm based
using conceptual model, complete framework, and algo- on one-hop neighborhood follow strategy has been sug-
rithm. The architecture is defined using VuC, VCC, and gested. The algorithm considers three factors for choos-
HVC. The summary and comparative assessment attests ing a follow vehicle including relative mobility, current
that M-EVMVC [30] has more viable architecture than number of follows, and history of cluster. In proactive
other proposed architectures when related to the pro- clustering scheme, high signalling load overhead might
posed CC-V-layered architecture, CC-V elements, better occur due to the frequent update of its follow informa-
algorithm with complexity analysis, and implementation tion, and dynamic change of node’s state. In this work,
proof with a wide range of performance metrics quality of network (QoN) at each node has not been
considered during the selection of follow node. The
aforementioned elements of CC-V is the constituent of
4.2 Data Dissemination the DMCNF, but has not been defined in this study.
In CC-V, clustering is the preferred option for data dis-
semination among vehicles. This is due to the higher A cluster-based vehicular cloud system with learning-
possibility of cloud-based resource sharing while dissem- based resource management (COHORT) has been pre-
inating data in case of clustering. In this section, related sented. COHORT deals the challenges faced during
literature on designing clustering schemes for transmit- deployment of new applications and advancement of
ting data in CC-V is critically explored and compara- ITS services [33]. An example of cluster-based VCC sys-
tively assessed. tem and case scenario for resource management issue is
depicted in Figure 8. A VCC system, q-learning tech-
nique, and queuing strategies have been discussed. VCC
4.2.1 Distributed Clustering system has been designed to conform to clustering pro-
A distributed multi-hop clustering algorithm based on cedures. It then further presents the resource limitation
neighborhood follow (DMCNF) has been presented to difficulties, by grouping vehicles and cooperatively
enhance robustness in clustering algorithms [32]. The
DMCNF basically focuses on how the vehicular cloud
nodes communicate among each other to improve effi-
ciency. Hence, its functional suitability is in coordination
and artificial intelligence layer of the proposed CC-V-
providing the resources to the needy vehicles. In essence, game. These players are used for taking adaptive deci-
the clustering structure technique has made flexible sions with regard to effective and reliable data forward-
using fuzzy logic in the cluster head (CH) selection pro- ing. Each player monitors the moves of the other players
cess. Frequent broadcasting and updating of routing in the game for reliable data forwarding. Additionally,
table information might cause high signalling loads on security issues have not been considered. The implemen-
the network. Security challenges with respect to the clus- tation environment has not been discussed.
ter-based architecture have not been considered.
COHORT can be best related to artificial intelligence In [36], a replication-aware data dissemination (RADD)
and smart applications layer of the CC-V-layered archi- is presented for VANETs using location prediction to
tecture considered in terms of functions and its address the challenges of disconnection due to high
protocols. node mobility. The new replication-aware scheme has
been suggested to estimate the location of nodes. An
COHORT resource management issues. Case 1: vehicle algorithm for position estimation, accessing, and routing
requester sends a request to the CH. Four helpers’ messages from remote vehicles to the destination has
vehicles are available and the CH should select one of been developed. The bloom filters are used for searching
them. Case 2: Four requester vehicles have different suitable vehicles for replica assignment. It makes search-
requests and the CH should set up a priority queue to ing faster and improves the total performance of RADD.
allocate limited resources to them, with only one helper. Additionally, radio frequency identification (RFID) tags
are employed on the vehicles and RSUs serve as RFID
Kumar et al. [34] has suggested an optimized clustering reader to gather data from these tags. The tags data serve
for data forwarding using stochastic coalition game in as location information for short-range communication
VCPS (OC-DSG) to address the issue of lesser contact in case of global positioning system failure. The RADD
time for vehicles with access points. A stochastic coali- is closely related to the coordination and perception
tion game for an optimized clustering and an algorithm layer of the CC-V-layered architecture because it deals
for data dissemination in VCPS environment have been with connectivity of vehicular nodes. The security issues
developed. Stochastic coalition game is employed as a of RADD have not been explored.
selection strategy in VCPS. The vehicles are represented
as players in the coalition game. A vehicle accesses a Enabling cooperative relaying in VANETs cloud over
fixed number of resources from the cloud. Learning LTE-A networks has addressed connectivity and device
automata techniques are utilized in vehicles to gather heterogeneity issues in highly populated urban area [37].
and process information from the surrounding based on A cooperative vehicular relaying transmission scheme
pre-stated policies. The optimization clustering scheme has been designed. The scheme contributes towards the
is typically related to coordination layer of the CC-V- formation of an advanced heterogeneous telecommuni-
layered architecture, since it deals with communication cation network. It provides increased networking capa-
between clustered node and RSUs. However, the authors bilities for heavily populated urban areas. This scheme
have claimed, through the evaluation of some perfor- made use of vehicles equipped with low-elevation anten-
mance metrics, that the scheme outperformed the exist- nas and short- and medium-range wireless communica-
ing state-of-the-art schemes. Implementation of the CC- tion technologies. The authors claimed that reasonable
V-layered architecture will enhance performance of the diversity gains and minimized error rate were achiev-
clustering techniques employed. able. Furthermore, there is a significant reduction in the
required transmitting energy when compared to the
A Bayesian coalition game for contention-aware reliable existing transmission scheme, and also improvement in
data (CARD) forwarding in vehicular mobile cloud distance area coverage. Despite enhancing connectivity
addresses the issue of performance degradation due to and heterogeneity, low density and rural environment
the unicast sender-based data forwarding [35]. The for VANETs setting have not been considered. The
problem of reliable data forwarding is formulated as investigations can be considered very close to the func-
Bayesian coalition game using an adaptive learning tions considered under coordination and perception
automata concept. An adaptive learning automata-based layer of the CC-V-layered architecture for cooperative
contention aware data forwarding algorithms for critical relaying transmission in VANETs cloud.
applications in the vehicular mobile cloud has been
developed. The approach is based on coordination and 4.2.2 Non-Distributed Clustering
artificial intelligence layer of the proposed CC-V-layered A data dissemination model for cloud-enabled VANETs
architecture. The vehicles represent the players in the using in-vehicular resource system based on road side
10 A. ALIYU ET AL.: CLOUD COMPUTING IN VANETS: ARCHITECTURE, TAXONOMY, AND CHALLENGES
IPv6-based VCN (IP6-VCN) has been suggested in [42]. implementation of the concept have not been consid-
The flooding techniques adopted in most of the recent ered. The findings can be closely related under the func-
studies tend to increase the cost of content acquisition tions of coordination and artificial intelligence layer of
due to the content-centric approach for dissemination in the proposed CC-V-layered architecture. The basic ele-
VCC. The vehicular cloud domain system, VCN, and ments of the RAR-MCV have not been adequately
performance evaluation have been discussed. VCN explored. However, our proposed CC-V elements can be
includes addressing structure, vehicular cloud construc- applicable in this study.
tion, vehicular cloud management, and content acquisi-
tion. The addressing structure creates the relationship Zheng et al. [44] proposed a semi-Markov decision pro-
between IP and content data for effective routing. The cess (SMDP)-based resource allocation in VCC system in
vehicular cloud domain system effectively minimizes the order to address underutilization of vehicular resource.
cost of content acquisition. However, in this scheme, The SMDP is closely suitable in relation to the aforemen-
communication between vehicle-to-infrastructure (V2I) tioned CC-V-layered architecture in terms of artificial
has not been considered for assisting the content sharing intelligence and perception layer. A computation resource
and acquisition. The IP-VCN can be related to the afore- allocation scheme has been presented. Furthermore, the
mentioned functions of coordination layer of the CC-V- resource allocation problem has been formulated as an
layered architecture. infinite horizon problem for SMDP. SMDP defines state
space, action space, reward model, and transition proba-
In [43], a Reliable Adaptive Resource Management for bility distribution of the VCC system. In order to develop
cognitive Cloud Vehicular networks (RAR-MCV) has optimal scheme, iteration algorithm has been used to
been suggested to address limited computing capability define the action taken under a specific state. In addition,
and energy of smartphones in car in order to utilize the resource allocation and decision-making schemes, and a
available V2I Wi-Fi connections for traffic data offload- reward system were developed. Authors claimed that rea-
ing [43]. An optimal joint controller and related sup- sonable performance gain has been achieved by the
porting access protocol have been discussed. The SMDP-based scheme within the permissible complexity.
protocol has been claimed to be adaptive, scalable, and However, effects of tolerance parameter to the optimal
distributive. The developed optimal controller dynami- scheme have not been investigated.
cally manages the access time windows at the serving
RSUs. It also manages the access rates and traffic flows 4.2.3 Comparative Discussion on Data Dissemination
at the served VCC system in a distributed and scalable The above reviewed literature on data dissemination in
way. Its implementation complexity is fully independent CC-V focusing on clustering approach is summarized in
from the number of serving RSUs and served VCC sys- Table 3. The summary considers the parameters includ-
tem. Nevertheless, optimized routing management and ing contribution, type of architecture, technique,
Table 4: A comparative assessment on data dissemination identity of each other, is privacy in CC-V. The identifica-
Techniques Architectures tion of uncooperative neighbour vehicle is intrusion
Protocol CM CF AL VuC VCC HVC IM
detections. The verification of neighbour vehicle base on
DMCNF [32] @ @ @
COHORT [33] @ @ @ @ some reputation is authentication in CC-V. All these
OC-DSG [34] @ @ @ @ major CC-V security issues can be improved on, if the
CARD [35] @ @ @ @
RADD [36] @ @ @
CC-V-layered architecture is critically analyzed and
LTE-A [37] @ @ @ @ incorporated with the security model. Security chal-
RSAP [38] @ @ @ @ lenges of smart applications are basically authentication
ClouDiV [39] @ @ @
GaaS [40] @ @ @ @ issues including automatic safety, information manage-
PORP [41] @ @ @ ment, and services authentication. For artificial intelli-
IP6-VCN [42] @ @ @
RAR-MCV [43] @ @ @ @ @ gence, the major issues with security is in intrusion
SMDP [44] @ @ @ detection of servers and data centres or vehicles which
CM, conceptual model; CF, complete framework; AL, algorithm; IM, imple- form cloud when a computing request from external cli-
mentation. @ = Yes.
ent is being sent to the machines. Coordination layer
can be used as a channel for intrusion and bridging of
implementation, and remarks. The contribution repre- authentication process. Hence, intrusion detection and
sents the progressive impact of the articles on the design authentication issues can be tackled effectively at this
of data dissemination technique for CC-V. layer. The perception layer constitutes in-vehicle devices
and the vehicle nodes, and, thus, the major challenge in
The architecture determines the category from the three this layer is privacy and intrusion detection. With imple-
types including VuC, VCC, and HVC. The technique mentation of the CC-V-layered architecture, a more
defines the approach followed for addressing the raised secured CC-V can be achieved.
issue. The implementation shows simulation tools and
performance metric. The critical remarks have also been
made. A comparative study is also presented in Table 4. 4.3.1 Privacy
The comparative study is based on three parameters Hussain et al. [45] suggested a secure and privacy-aware
including technique, architecture, and implementation. traffic information as a service (TIaaS) for VNVC to
The technique is defined using conceptual model, com- address the vehicle user privacy issue. The privacy issue
plete framework, and algorithm. The architecture is is one of the major concerns why many vehicle users do
defined using VuC, VCC, and HVC. The summary and not want to take part in the information sharing among
comparative study of data dissemination techniques sug- vehicles. Hence, a privacy-aware TIaaS has been dis-
gest that RAR-MVC [43] is a more feasible and better cussed. The network model of TIaaS is shown in
data dissemination technique. RAR-MCV considered Figure 11. The privacy issues cause lower usage of
Markovian random walk as its mathematical modelling VANETs infrastructure including communication, com-
technique which effectively optimizes routing objectives. putation, and on-board storage. A revocation mecha-
The performance evaluation is widely explored with a nism, TIaaS thin-client concept for vehicles, and
range of metrics and environments. Both the distributive efficient mobility vectors framework have been designed.
and non-distributive clustering can be efficiently
enhanced based on coordination, artificial intelligence,
Cloud Level
and perception layer of our proposed CC-V-layered
architecture. The coordination layer will handle cluster- CCP CKB
ing and connectivity issues. The artificial intelligence
Authenticator CDM
layer will handle vehicle clustering in order to perform
cloud computing operations. The perception layer is
linked with the in-vehicular devices and vehicular node Communication Level Wired
itself.
Road Side Unit (RSU), Base Station
(BS), and Access Point (AP)
The major challenges of security in CC-V include pri- Vehicles with Terminal Gateway
vacy, intrusion detection, and authentication. The com- Vehicles connect to RSUs
munication with neighbour vehicles using location,
speed, and direction information, without unfolding the Figure 11: The TIaaS network model
A. ALIYU ET AL.: CLOUD COMPUTING IN VANETS: ARCHITECTURE, TAXONOMY, AND CHALLENGES 13
Transportation Manager
has been performed to accomplish the session key’s Table 6: A comparative assessment on security
backward secrecy. The authors claimed about the effec- Techniques Architectures
Protocol CM CF EN VuC VCC HVC IM
tiveness and efficiency of the scheme in relation to fast
TIaaS [45] @ @
key update ratio and low key update delay. A pseudony- TCBI [46] @
mous authentication scheme with strong (PASS) privacy ICDI [47] @ @ @
VCC-SSF [48] @ @
preservation for vehicular communications has been PVCM [49] @ @
suggested to enhance privacy preservation in vehicle CPAS [50] @ @ @ @
communication [52]. PASS has applied pseudonymous DPK-LSV [51] @ @ @ @
PASS [52] @ @ @ @
authentication in preserving vehicles’ privacy. It also CM, conceptual model; CF, complete framework; EN, encryption; IM,
supports RSU-aided distributed certificate services that implementation. @ = Yes.
allow the vehicles to update the information on road. It
has been claimed that PASS outperformed previous
schemes in relation to certificate updating overhead and defined using the model for security, complete frame-
revocation cost. However, only highway scenario was work, and security algorithm. The architecture is defined
considered during implementation. From the findings, it using VuC, VCC, and HVC. The summary and compar-
demonstrates that PASS is very close to the functions ative investigation of the security techniques affirms that
considered under coordination and perception layer of ICDI [47] provides better security and privacy preserva-
the CC-V-layered architecture. In DPK-LSV privacy- tion in CC-V environments. The distributed security
preserving scheme, the functions of coordination and model is presented in ICDI. All the major CC-V security
perception layer of the CC-V-layered architecture are challenges including privacy, intrusion detection,
suitable layers that can enhance authentication of the authentication, and privacy-preserving authentication
system. can be efficiently enhanced based on smart applications,
coordination, artificial intelligence, and perception layer
of our proposed CC-V-layered architecture. Authentica-
4.3.4 Comparative Discussion on Security tion and intrusion detection will be best implemented
The aforementioned literature review on security in CC- on smart applications layer to attain reliability and effi-
V is summarized in Table 5. The summary is based on ciency. Intrusion detection, authentication, and privacy-
the parameters including contribution, type of architec- preserving authentication are more applicable to coordi-
ture, security technique, implementation, and remarks nation layer. For the artificial intelligence layer, intrusion
as security holes. The contribution points out the level of detection and privacy-preserving authentication are
security enhancement provided by the articles in CC-V. applicable. The perception layer is linked with in-vehicu-
The architecture determines the applicability of the secu- lar devices and vehicular nodes, and is thus applicable to
rity technique in the categories including VuC, VCC, the privacy and privacy-preserving authentication in
and HVC. The technique tells the novel method used for relation to CC-V-layered architecture.
providing security. The implementation shows experi-
mental tools and metric for security attestation. The crit-
ical remarks in terms of security holes have also been
4.4 Applications
identified. A comparative investigation is also presented
in Table 6. The comparative investigation is based on CC-V applications are much more essential for realiza-
three parameters including security technique, architec- tion of operational and effective VANET communica-
ture, and implementation. The security technique is tion based on cloud computing [53]. CC-V applications
Applications in
CC-V C2C C2I C2X Public Interface
Safety Efficiency Infotainment Transport
Smartphone
Emergency call Real time traffic information Wi-Fi in vehicle Authorities Interface
Wrong-way warning Locating parking space Music downloading
Lane change warning Speeding evidence Online streaming
Automatic breaking Navigation area extension SMS using car’s display
Overtaking warning Multi-modal transportation Online radio IP, Transport
Automatic speed control Traffic sign recognition Advertisements
Infrastructures and Administrators
Interface
Figure 16: The applications of CC-V Gateways
Optimization
applications include control loss warning, emergency
Modeling
Analysis
electronic brake lights, blind spot/lane change warning,
etc. V2I communication applications include oversize Knowledge Decision
vehicle warning, railroad crossing warning, curve speed Base Making
warning, etc. Vehicle-to-pedestrian (V2P) communica-
tion includes transit pedestrian indication. Some other
applications in these categories are listed in Figure 16. Cloud Infrastructure as a Service (IaaS) Layer
multiple access called vehicle MAC (VeMAC), latest cel- nodes affect VANETs communication. The channel
lular network standards, and IEEE 802.11p standard. In occupancy or busy ratio can be used as feedback mea-
addition, performance of VeMAC protocol has been sure that quantifies the success of information broad-
compared with that of IEEE 802.11p standard, through casted. Consequently, these outcomes are used to
simulation considering both urban and highway scenar- develop feedback control system for transmission range
ios. It considers traffic problems caused by emergency adaptation. The findings can be closely related to the
parking of vehicles in highway scenarios. Authors functions and its protocols considered under smart
claimed that VeMAC has better potentials compared application and coordination layer of the CC-V-layered
with IEEE 802.11p in terms of broadcasting of safety architecture. The major constituent elements of CVSSs
messages in VANETs. The functions and its protocols related to the CC-V elements are including DSRC net-
under smart applications and c-ordination layer of the work and vehicular node. However, effects of some
CC-V-layered architecture are suitable for implementa- parameters such as contention window size on informa-
tion of the WATVSA applications system. The funda- tion dissemination rate have not been derived.
mental components of the application system including
WAVE technology and vehicular node are related to the
4.4.2 Efficiency
proposed CC-V elements. However, the optimal values
A secured incentive-based architecture for vehicular
of VeMAC parameters such as number of time slots per
(SIAV) cloud has been suggested to address the issues of
frame and slot duration are not considered.
underutilization of computational, communication, and
storage capabilities of vehicles because of non-participa-
Segata and Renato [58] presented an automatic emer-
tion in vehicular cloud [60]. A summary of SIAV is
gency braking with realistic analysis of car dynamics
shown in Figure 18. Two design architecture approaches
(AEB-ACD) and network performance as one of the
including system model and secure token reward system
important applications for VANETs safety. The simula-
have been developed for encouraging the vehicles to par-
tion and analysis of driver behaviour awareness have
ticipate in computation and sharing of information.
been conducted. Emergency braking application has
Major components of system model include service pro-
been simulated by embedding mobility, cars’ dynamic,
vider manager, reward token system, revocation author-
and driver behaviour models in to the network simula-
ity, trusted authority, RSUs, and on-board units. Secure
tor. Furthermore, a simpler message aggregation mecha-
token reward system has three major phases, namely,
nism has been presented to enhance message re-
searching resources, requesting reward tokens, and using
propagation during peak load. The complete system per-
the token for cloud services. The efficiency of the system
mits capturing the interactions of the communications
model has not been evaluated. Efficiency applications
with vehicle’s automated break mechanism and driver’s
can be optimally achieved by considering functions
behaviour.
under smart applications and artificial intelligence of the
CC-V-layered architecture. The proposed CC-V
The system yields detailed information on the communi-
cation level during experimentation as claimed by
authors. However, there is a need for refinement of com-
munication channel model and development of the SIAV
vehicular dynamics models. The car dynamics and net-
work analysis can be linked to the CC-V elements and
archive better performance. It represents the basic com- System Model Secure Token Reward
ponents of AEB-ACD including road side infrastructure, System
vehicle node, and cloud computation.
Service Provider Searching Resources
In [59], an analysis of information dissemination in Management(SPM) Requesting Reward
VANETs with application has been presented. The anal- Reward Token Tokens
System(RTS) Using Tokens for Cloud
ysis considers cooperative vehicle safety systems
Revocation Authority Services
(CVSSs) to demonstrate functionalities and viability of (RA)
the systems. Thus, analysis of the effects of different Trusted Authority (TA)
communication ranges and rates has been conducted. RoadSide Unit (RSU)
The novel models that measure network performance in On-board Units (OBUs)
terms of their ability to broadcast tracking information
are presented. The study demonstrates that hidden Figure 18: The system model and secure token reward system
18 A. ALIYU ET AL.: CLOUD COMPUTING IN VANETS: ARCHITECTURE, TAXONOMY, AND CHALLENGES
SaaS Client 2
Service API, Interface Agent and
Environmental Monitoring
Transportation Monitoring
Service Agent Wifi
Application Layer
Support Layer
PaaS
Perceptual Layer
Resource Management, Network
Network Layer
Management, Load Balancing,
Real Time Scheduling and End-
to-End Performance Evaluation
IaaS
Identity unit, Security Audit,
Access Control, SLA, Storage
Security and Policy Management
Client 1
and safety. Thus, multimedia services in cloud-based Table 8: A comparative assessment on applications
vehicular networks (MSCVNs) have been employed to Techniques Architectures
Protocol CM CF AL VuC VCC HVC IM
integrate cloud computing and storage with vehicles, in
EDRS [56] @ @ @
order to increase the accessibility to multimedia services WATVSA [57] @ x x
[64]. Different systems including LTE system for net- AEB-ACD [58] @ @ @ @ @
CVSSs [59] @ @ @ @
work access, and multimedia cloud computing system, SIAV [60] @ @ @
have been suggested. Three-layered cloud-based vehicu- SCST [61] @ @ @
lar network model, which includes cluster layer, physical RTCV [62] @ @ @
CITS [63] @ @
layer, and perception layer, has also been presented. A MSCVN [64] @ @ @
dynamic road monitoring system has been discussed. In CM, conceptual model; CF, complete framework; AL, algorithm; IM, imple-
video up-linking scenario, the MSCVN performs closer mentation. @ = Yes.
need to be addressed for realizing CC-V. These research (5) Standardization and interoperability. The vehicles
issues are discussed below: have heterogeneous devices, such as sensors, GPS,
and smartphones. How to make the varied devices
(1) Architecture design. Due to the fact that CC-V is to work together efficiently is highly required for
still a new area of research, there is no generalized data gathering. Standardization is also required for
standard architecture for this new idea. Although these on-board devices, by looking into compati-
many initial architectures for CC-V have been sug- bility, quality, and implementation of guidelines,
gested, yet standard architectures with implemen- interoperability, and repeatability of on-board
tation details are unavailable [25–31]. Therefore, vehicle equipment and software.
the issue needs thorough exploration. (6) Security and privacy. Security and privacy are also
(2) Data dissemination. Efficient data dissemination in the major challenges in CC-V, because the partici-
CC-V is a challenging issue, due to the high pating users are always mindful of their privacy
dynamicity of vehicles in changing their positions. and whereabouts at any given time. Also, since
The design and how to transmit data in CC-V vehicles rely on information from the cloud or
need to be critically addressed. Even though some other vehicle for their navigations, this might cause
work has been done in [32–44] by suggesting solu- serious havoc; if there is information distortion by
tions to handle various type of data dissemination an intruder, it can lead to waste of time, fuel, or
issues using clustering, data-centric, and other even loss of life. Several authors [45–52] have
routing approaches, yet many issues have not cov- made attempt to see how these issues including
ered, such as location verification, data dissemina- intrusion detection, authentication, and location
tion, and video-centric routing. The conventional privacy could be handled. But the reality is that,
VANETs routing [65–67] may not be suitable in extensive security-related research work need to be
the case of CC-V due to the connectivity chal- done considering security, privacy, authentication,
lenges in mobility. and their efficiency in CC-V.
(3) Data offloading. The complex unrefined data need (7) Delay in cloud--client communication. It is one of
to be offloaded to conventional cloud or to vehicu- the fundamental issues in any cloud-based service
lar cloud for processing. After processing, this due to the dynamic network environment and the
refined data is accessed by vehicles and other consideration of cloud infrastructure in high
related organizations. However, the issue of how mobile vehicular environment. The sparse distri-
to offload unrefined data and access the refined bution of vehicles and the dynamic nature of den-
data in a high-mobility vehicular scenario is sity of vehicles in the network environment are
required to be looked into. Data aggregation and unavoidable. CC-V requires real-time communica-
computation are also required since vehicles use tion decision in safety applications, which is quite
sensors and other on-board devices for collecting challenging considering the delay issue in network
information relating to vehicle, environment, and access [70–73].
traffic. Hence, the issue of data aggregation and (8) Autonomous driving. It is one aspect of ITS which
computation are attached clearly, both at vehicle requires artificial intelligence, learning capabilities
and cloud level. The data need to be aggregated and storage, for making computational decision
and refined for users. on possible route for achieving fast and safe navi-
(4) Application design and deployment. Some potential gation [74,75]. Cloud computing needs to be
VANETs applications are yet to be designed or applied for computation of intelligent data and,
deployed at vehicles for efficient usage, such as pic- subsequently, for analysis, which should be
ture and video coverage as a service (PVCaaS) in accessed by autonomous vehicle.
CC-V. PVCaaS is a service whereby vehicles on (9) Learning-based data storage. It is another aspect of
the road take pictures and video covering of their ITS which is required in order to achieve distrib-
surroundings. The picture and video are automati- uted ITS. It needs some initial storage of informa-
cally offloaded to the cloud for storage and analy- tion in VANETs without any provision for device
sis. This service is useful for road safety and setup [76,77]. The device setup could be RSU or
security organization. Some of the recent works by external access point. Hence, there is need for a
[56–64] tackle some application designs for incen- robust strengthening learning-based, dynamic,
tive-based disaster management, highway traffic and adaptive data storage techniques for VANETs
control [68,69], and multimedia applications. in order to achieve distributive ITS.
A. ALIYU ET AL.: CLOUD COMPUTING IN VANETS: ARCHITECTURE, TAXONOMY, AND CHALLENGES 21
6. CONCLUSION REFERENCES
We have reviewed related work and put forth a frame- 1. A. K. A. Abdalla and A. S. K. Pathan. (2014). “On protect-
work in vehicular communication for CC-V. The frame- ing data storage in mobile cloud computing paradigm,”
work suffices from the merging of cloud computing, IETE Tech. Rev. 31 (1), pp. 82–91.
pervasive sensing, improved network mobility, and in- 2. W. Wu He, G. Yan and L. D. Xu. (2014). “Developing
build vehicle resources. The large volume of underutil- vehicular data cloud services in the IoT environment,”
ized on-board vehicle resources, such as computing IEEE Trans. Ind. Inf. 10 (2), pp. 1587–1595.
power, Internet, and storage, could be utilized by various
clients Internet, in relation to the conventional cloud 3. J. M. De Fuentes, L. Gonzalez-Manzano, A. I. Gonzalez-
Tablas and J. Blasco. (2014). “Security models in vehicular
resources. Numerous of these resources can provide sup-
ad-hoc networks: A survey,” IETE Tech. Rev. 31 (1), pp.
port for handling traffic incident. CC-V can generate 47–64.
income, and enhance security and safety. CC-V can also
help minimize the losses in different types of emergency 4. H. Zhang, Q. Zhang and X. Du. (2015). “Toward vehicle-
incidences including fire outbreak, flood, or accidents. assisted cloud computing for smartphones,” IEEE Trans.
Veh. Technol. 64 (12), pp. 5610–5618.
In this work, layered architecture for the CC-V is pre- 5. S. Olariu, T. Hristov and G. Yan, “The next paradigm
sented. Three elements of CC-V including vehicle, com- shift: From vehicular networks to vehicular clouds,” in
putation, and connection are identified, and their Cutting Edge Directions. Mobile Ad Hoc Networking, 2nd
relations are discussed in the aspect of CC-V. Several ed., New Jersey: John Wiley & Sons, 2013, pp. 645–700.
application scenarios, security and privacy, and forma-
6. M. Gerla, “Vehicular cloud computing,” in IEEE the 11th
tion of CC-V have been identified and discussed.
Annual Mediterranean. Ad Hoc Networking Workshop
We present a taxonomy for CC-V and explored related (Med-Hoc-Net), 2012, pp. 152–155.
literature based on the taxonomy. We have also identi-
fied open research issues and challenges with regard 7. J. K. Lee, Y. S. Jeong and J. H. Park. (2015). “s-ITSF: A ser-
to CC-V. vice based intelligent transportation system framework for
smart accident management,” Hum. Cent. Comput. Inf.
Sci. 5 (1), p. 1.
However, a number of issues are still not been thor-
oughly explored by researchers, which include data dis- 8. K. S. Nesamani, L. Chu, M. G. McNally and R.
semination to cloud, data offloading, data-centric Jayakrishnan. (2007). “Estimation of vehicular emissions
routing, intermittent connection, VCN, VANETs appli- by capturing traffic variations,” Atmos. Environ. 41 (14),
cation and deployment, security, and privacy-aware data pp. 2996–3008.
sharing. In conclusion, CC-V could not be fully imple-
9. A. Ghose, P. Biswas, C. Bhaumik, M. Sharma, A. Pal and
mented, except if governments and automobile indus- A. Jha, “Road condition monitoring and alert application:
tries would come together to utilize the benefit of Using in-vehicle smartphone as Internet-connected sen-
the framework of CC-V. Thus, CC-V could be the next sor,” in IEEE International Conference, Pervasive Comput-
paradigm shift that offers feasible and technologically ing and Communications Workshops (PERCOM
viable and smart solutions for traffic issues with eco- Workshops), 2012, pp. 489–491.
nomical gains. 10. N. N. Qadri, M. Fleury, M. Altaf and M. Ghanbari. (2010).
“Multi-source video streaming in a wireless vehicular ad
hoc network,” IET Commun. 4 (11), pp. 1300–1311.
FUNDING
11. M. Hemalatha, S. Nanthini, D. Dhivya and A. Vaishnavi.
The research is supported by Ministry of Higher Education “Intelligent parking system using vehicular data cloud
Malaysia (MOE) and conducted in collaboration with services,” in IEEE International Conference, Innovations
Research Management Center (RMC) at University Teknologi in Information Embedded and Communication Systems
Malaysia (UTM) [VOT number Q.J130000.2528.14H81]. The (ICIIECS), 2015, pp. 1–5.
research is also supported in part by the Jawaharlal Nehru
University, New Delhi, India, under grant UPE-II. 12. F. Dressler, P. Handle and C. Sommer, “Towards a vehic-
ular cloud-using parked vehicles as a temporary network
and storage infrastructure,” in ACM International Work-
ORCID shop. Proceedings of the 2014 on Wireless and Mobile
Technologies for Smart Cities, 2014, pp. 11–18.
Omprakash Kaiwartya http://orcid.org/0000-0001-9669-
8244 13. R. Hussain and H. Oh. (2014). “Cooperation-aware
Sushil Kumar http://orcid.org/0000-0001-9113-2890 VANET clouds: Providing secure cloud services to
22 A. ALIYU ET AL.: CLOUD COMPUTING IN VANETS: ARCHITECTURE, TAXONOMY, AND CHALLENGES
vehicular ad hoc networks,” J. Inf. Process. Syst. 10 (1), pp. 26. R. Hussain, Z. Rezaeifar, and H. Oh. (2015). “A paradigm
103–118. shift from vehicular ad hoc networks to VANET-based
clouds,” Wireless Pers. Commun. 83 (2), pp. 1131–1158.
14. M. Whaiduzzaman, M. Sookhak, A. Gani and R. Buyya.
(2014). “A survey on vehicular cloud computing,” J. Net- 27. S. Olariu, I. Khalil and M. Abuelela. (2011). “Taking
work Comput. Appl. 40, pp. 325–344. VANET to the clouds,” Int. J. Pervasive Comp. Comm.
7 (1), pp. 7–21.
15. IEEE 802.11p Published Standard. (2010). Amendment 6:
Wireless Access in Vehicular Environments (WAVE). 28. S. Bitam, A. Mellouk and S. Zeadally. (2015). “VANET-
Available: http://standards.ieee.org/getieee802/download/ cloud: A generic cloud computing model for vehicular ad
802.11p-2010.pdf hoc networks,” IEEE Wireless Commun. 22 (1), pp. 96–
102.
16. IEEE Working Group for Wireless Standard. IEEE
802.11TM Wireless Local Area Networks. Available: 29. H. Yan, J. Wan, Y. Wang, Z. Wang and Z. Song, Vehicular
http://www.ieee802.org/11/ Cyber-Physical Systems with Mobile Cloud Computing
Support. Cloud Computing. Springer International Pub-
17. IEEE 802.16 based Standards. WiMax forum-technology. lishing, 2013, pp. 27–35.
Available: http://www.wimaxforum.org/
30. H. Yao, C. Bai, D. Zeng, Q. Liang and Y. Fan. (2015).
18. C. Cox, An Introduction to LTE: LTE, LTE-Advanced, SAE “Migrate or not? Exploring virtual machine migration in
and 4G Mobile Communications. 1st ed., New Jersey: John roadside cloudlet based vehicular cloud,” Concurrency
Wiley & Sons, 2012. Comput. Pract. Experience 27 (18), pp. 5780–5792.
19. U.S. Department of Transportation. (2013). IEEE 1609 - 31. E. Lee, E. K. Lee, M. Gerla and S. Y. Oh. (2014). “Vehicu-
Family of standards for Wireless Access in Vehicular lar cloud networking: Architecture and design principles,”
Environments (WAVE). Available: https://www.stand IEEE Commun. Mag. 52 (2), pp. 148–155.
ards.its.dot.gov/Factsheets/Factsheet/80
32. Y. Chen, M. Fang, S. Shi, W. Guo and X. Zheng. (2015).
20. B. Richard and B. Roberto. (2009). “European ITS commu- “Distributed multi-hop clustering algorithm for VANETs
nication architecture: Overall framework-proof of concept based on neighborhood follow,” EURASIP J. Wireless
implementation,” Deliverable. 31, COMeSafety Project. Commun. Netw. 2015 (1), pp. 98–110.
21. R. Khan, S. U. Khan, R. Zaheer and S. Khan, “Future inter- 33. H. R. Arkian, R. E. Atani, A. Diyanat and A. Pourkhalili.
net: The internet of things architecture, possible applica- (2015). “A cluster-based vehicular cloud architecture with
tions and key challenges,” in Proceedings of the learning-based resource management,” J. Supercomput.
International Conference on Frontiers of Information Tech- 71 (4), pp. 1401–1426.
nology (FIT), IEEE, Islamabad, Pakistan, 2012, pp. 257–260.
34. N. Kumar, R. S. Bali, R. Iqbal, N. Chilamkurti and S. Rho.
22. Z. Yang, Y. Peng, Y. Yue, X. Wang, Y. Yang and W. Liu, (2015). “Optimized clustering for data dissemination
“Study and application on the architecture and key tech- using stochastic coalition game in vehicular cyber-physi-
nologies for IOT,” in Proceedings of the International cal systems,” J. Supercomput. 71 (9), pp. 3258–3287.
Conference on Multimedia Technology (ICMT), IEEE,
Hangzhou, China, 2011, pp. 747–751. 35. M. Ikeda, T. Honda and L. Barolli. (2015). “Performance
of optimized link state routing protocol for video stream-
23. O. Brickley, M. Koubek, S. Rea and D. Pesch, “A network ing application in vehicular ad hoc networks cloud com-
centric simulation environment for CALM-based cooper- puting,” Concurrency Comput. Pract. Experience 27 (8),
ative vehicular systems,” in Proceedings of the Interna- pp. 2054–2063.
tional ICST Conference on Simulation Tools and
Techniques ICST, Brussels, Belgium, 2010, pp. 70–75. 36. N. Kumar, J. J. Rodrigues, J. Lloret and A. Dua. (2015).
“Replication-aware data dissemination for vehicular ad
24. R. Baldessari, B B€odekker, M. Deegener, A. Festag, hoc networks using location determination,” Mobile
W. Franz, C. C. Kellum, T. Kosch, A. Kovacs, M. Lenardi, Netw. Appl. 20 (2), pp. 251–267.
C. Menig and T. Peichl. (2007). Car-2-car communication
consortium-manifesto. Available: https://www.car-2-car. 37. M. F. Feteiha and H. S. Hassanein. (2015). “Enabling
org/index.php?id=31 cooperative relaying VANET clouds over LTE-A net-
works,” IEEE Trans. Veh. Technol. 64 (4), pp. 1468–
25. R. Hussain, J. Son, H. Eun, S. Kim and H. Oh, “Rethinking 1479.
vehicular communications: Merging VANET with cloud
computing,” in IEEE 4th International Conference, Cloud 38. M. U. Farooq, M. Pasha and K. U. R. Khan, “A data dis-
Computing Technology and Science (CloudCom), 2012, pp. semination model for cloud enabled VANETs using in-
606–609. vehicular resources,” in IEEE International Conference.
A. ALIYU ET AL.: CLOUD COMPUTING IN VANETS: ARCHITECTURE, TAXONOMY, AND CHALLENGES 23
Computing for Sustainable Global Development (INDIA- based services in VANETs,” IEEE Trans. Intell. Transport.
Com), 2014, pp. 458–462. Syst. 13 (1), pp. 127–139.
39. S. Bitam and A. Mellouk, Cloud Computing-Based Mes- 52. Y. Sun, R. Lu, X. Lin, X. Shen and J. Su. (2010). “An effi-
sage Dissemination Protocol for Vehicular Ad Hoc Net- cient pseudonymous authentication scheme with strong
works. Wired/Wireless Internet Communications. privacy preservation for vehicular communications,” IEEE
Springer International Publishing, 2015, pp. 32–45. Trans. Veh. Technol. 59 (7), pp. 3589–3603.
40. Y. W. Lin, J. M. Shen and H. C. Weng. (2013). “Cloud- 53. D.V. Duren, S. Cadzow, J. Petit, W. Whyte and R. Rausch,
supported seamless Internet access in intelligent transpor- “Connected Vehicle Pilot Deployment Program Phase 2,”
tation systems,” Wireless Pers. Commun. 72 (4), pp. 2081– Technical Report No. FHWA-JPO-17-453, Department
2106. of Transportation, USA, 2016.
41. M. Ikeda, T. Honda and L. Barolli. (2015). “Performance 54. J. Yin, T. ElBatt, G. Yeung, B. Ryu, S. Habermas, H.
of optimized link state routing protocol for video stream- Krishnan and T. Talty, “Performance evaluation of safety
ing application in vehicular ad hoc networks cloud com- applications over DSRC vehicular ad hoc networks,” in
puting,” Concurrency Comput. Pract. Experience 27 (8), Proceedings of the 1st ACM international workshop on
pp. 2054–2063. Vehicular ad HOC Networks, ACM, Oct. 2004.
42. X. Wang. (2015). “IPv6-based vehicular cloud network- 55. H. Hartenstein, VANET: Vehicular Applications and Inter-
ing,” IEEE Commun. Lett. 19 (6), pp. 933–936. Networking Technologies. Vol. 1. Kenneth Laberteaux, Ed.
Chichester: Wiley, Jan. 2010.
43. N. Cordeschi, D. Amendola and E. Baccarelli. (2015).
“Reliable adaptive resource management for cognitive 56. Z. Alazawi, S. Altowaijri, R. Mehmood and M. B. Abdlja-
cloud vehicular networks,” IEEE Trans. Veh. Technol. 64 bar, “Intelligent disaster management system based on
(6), pp. 2528–2537. cloud-enabled vehicular networks,” in IEEE 11th Interna-
tional Conference, ITS Telecommunications (ITST), Aug.
44. K. Zheng, H. Meng, P. Chatzimisios, L. Lei and X. Shen. 2011, pp. 361–368.
(2015). “An SMDP-based resource allocation in vehicular
cloud computing systems,” IEEE Trans. Ind. Electron. 62 57. H. A. Omar, Hassan, L. Ning and Z. Weihua. (2016).
(12), pp. 7920–7928. “Wireless access technologies for vehicular network safety
applications,” IEEE Netw. 30 (4), pp. 22–26.
45. R. Hussain, Z. Rezaeifar, Y. H. Lee and H. Oh. (2015).
“Secure and privacy-aware traffic information as a service 58. M. Segata and L. C. Renato. (2013). “Automatic emer-
in VANET-based clouds,” Pervasive Mob. Comput. 24, pp. gency braking: Realistic analysis of car dynamics and net-
194—209. work performance,” IEEE Trans. Veh. Technol. 62 (9), pp.
4150–4161.
46. J. Jun Zhou, X. Dong, Z. Cao and A. V. Vasilakos. (2015).
“Secure and privacy preserving protocol for cloud-based 59. Y. P. Fallah, C. L. Huang, R. Sengupta and H. Krishnan.
vehicular DTNs,” IEEE Trans. Inform. Forensic Secur. 10 (2011). “Analysis of information dissemination in vehicu-
(6), pp. 1299–1314. lar ad-hoc networks with application to cooperative vehi-
cle safety systems,” IEEE Trans. Veh. Technol. 60 (1), pp.
47. N. Kumar, J. P. Singh, R. S. Bali, S. Misra and S. Ullah. 233–247.
(2015). “An intelligent clustering scheme for distributed
intrusion detection in vehicular cloud computing,” Clus- 60. K. Lim, I. M. Abumuhfouz, and D. Manivannan, Secure
ter. Comput. 18 (3), pp. 1263–1283. Incentive-Based Architecture for Vehicular Cloud. Athens:
Ad-hoc, Mobile, and Wireless Networks. Springer Inter-
48. W. M. Kang, J. D. Lee, Y.-S. Jeong and J. H. Park. (2015). national Publishing, Jun. 2015, pp. 361–374.
“VCC-SSF: Service-oriented security framework for vehic-
ular cloud computing,” Sustainability 7 (2), pp. 2028– 61. D. Singh, M. Singh, I. Singh and H. J. Lee, “Secure and
2044. reliable cloud networks for smart transportation services,”
in IEEE 17th International Conference, Advanced Commu-
49. I. M. Abumuhfouz and K. Lim. (2015). “Protecting vehic- nication Technology (ICACT), Jul. 2015, pp. 358–362.
ular cloud against malicious nodes using zone authori-
ties,” IEEE SoutheastCon., pp. 1–2. 62. J. Wang, J. Cho, S. Lee and T. Ma, “Real time services for
future cloud computing enabled vehicle networks,” in
50. K. A. Shim. (2012). “An efficient conditional privacy-pre- IEEE International Conference, Wireless Communications
serving authentication scheme for vehicular sensor net- and Signal Processing (WCSP), Nov. 2011, pp. 1–5.
works,” IEEE Trans. Veh. Technol. 61 (4), pp. 1874–1883.
63. K. Ashokkumar, B. Sam and R. Arshadprabhu. (2015).
51. R. Lu, X. Lin, X. Liang and X. Shen. (2012). “A dynamic “Cloud based intelligent transport system,” Procedia Com-
privacy-preserving key management scheme for location- put. Sci. 50, pp. 58–63.
24 A. ALIYU ET AL.: CLOUD COMPUTING IN VANETS: ARCHITECTURE, TAXONOMY, AND CHALLENGES
64. M. K. Jiau, S. C. Huang, J. N. Hwang and A. V. Vasilakos. 71. A. Mehmood, H. Song and J. loret. (2014). “Multi-agent
(2015). “Multimedia services in cloud-based vehicular net- based framework for secure and reliable communication
works,” IEEE Intell. Transport. Syst. Mag. 7 (3), 62–79. among open clouds,” Netw. Protocols Algorithms 6 (4), pp.
60–76.
65. O. Kaiwartya, S. Kumar, D. K. Lobiyal, A. H. Abdullah
and A. N. Hassan. (2014). “Performance improvement in 72. K. Shafiee and C. L. Leung. (2011). “Connectivity-aware
geographic routing for vehicular ad hoc networks,” Sen- minimum-delay geographic routing with vehicle tracking
sors 14 (12), pp. 22342–22371. in VANETs,” Ad Hoc Netw. 9 (2), pp. 131–141.
66. W. Ren. (2015). “uLeepp: An ultra-lightweight energy- 73. J. Li and C. Chunxiao, “Delay-aware transmission
efficient and privacy-protected scheme for pervasive and range control for VANETs,” in Global Telecommunica-
mobile WBSN-cloud communications,” Adhoc Sensor tions Conference (GLOBECOM 2010), 2010 IEEE, 2010,
Wireless Netw. 27, pp. 173–195. pp. 1–6.
67. C. Wu, S. Ohzahata, Y. Ji and T. Kato. (2016). “How to 74. M. Gerla, E. K. Lee, G. Pau and U. Lee, “Internet of
utilize inter flow network coding in VANETs: A backbone vehicles: From intelligent grid to autonomous cars and
based approach,” IEEE Trans. Intell. Transport. Syst. vehicular clouds,” in Internet of Things (WF-IoT), 2014
17 (8), pp. 2223–2237. IEEE World Forum on. IEEE, Mar. 2014, pp. 241–246.
68. O. Kaiwartya and S. Kumar. (2015). “Guaranteed geocast 75. A. Briones, R. de Pozuelo, J. Navarro and A. Zaballos.
routing protocol for vehicular adhoc networks in highway (2016). “Resource allocation on a hybrid cloud for smart
traffic environment,” Wireless Pers. Commun. 83 (4), grids,” Netw. Protocols Algorithms 8 (1), pp. 7–25.
pp. 2657–2682.
76. C. Wu, T. Yoshinaga, Y. Ji, T. Murase and Y. Zhang,
69. R. Chang and C. Chuang. (2014). “A service-oriented “Reinforcement learning based data storage scheme in
cloud computing network management architecture for vehicular ad hoc networks,” Proceedings of IEEE ICC,
wireless sensor networks,” Ad-hoc Sensor Wireless Netw. 2016, pp. 1–6.
22 (1–2), pp. 65–90.
77. C. Yang, J. Ma and J. Ren. (2015). “Provable ownership of
70. Y. Liu, J. Niu, J. Ma, L. Shu, T. Hara and W. Wang. (2013). encrypted files in de-duplication cloud storage,” Ad Hoc
“The insights of message delivery delay in VANETs with a Sensor Wireless Netw. 26 (1–4), pp. 43–72.
bidirectional traffic model,” J. Netw. Comput. Appl. 36 (5),
pp. 1287–1294.
A. ALIYU ET AL.: CLOUD COMPUTING IN VANETS: ARCHITECTURE, TAXONOMY, AND CHALLENGES 25
Authors
Ahmed Aliyu is a PhD candidate in Fac- Mohammed Joda Usman is a PhD can-
ulty of Computing at Universiti of Tech- didate in Faculty of Computing at Uni-
nologi Malaysia. He received Master’s in versiti of Technologi Malaysia. He
Computer Science and Technology received Master’s in Computer Science
degree in July 2014 from LUT, China. and Technology degree in July 2014
His main research areas are VANETs from LUT, China. His main research
and cloud computing. areas are Cloud Computing, Wireless
Sensor Network, and Artificial
E-mail: ahmedaliyu8513@gmail.com Intelligence.
E-mail: yue.cao@northumbria.ac.uk