deployment techniques used in the infrastructure of
the cloud computing. Cloud based security refers to
the services present in the cloud environment. The
focus of this research paper relies on the sub-domain
of cloud based security.
• Vehicular Cloud Computing
Vehicular cloud computing represent an extension of
the cloud computing paradigm describing: “a group
of largely autonomous vehicles whose corporate
computing, sensing, communication and physical
resources can be coordinated and dynamically
allocated to authorized users”[ Md Whaiduzzaman].
A shorter definition redesigns the concept of a
vehicle in the cloud computing context, describing it
as driver’s dependent entities, service providers and
communication tools. The differences between cloud
computing and vehicular cloud computing are
The main challenges of both of the paradigms are
establishing a reliable trust context for each vehicle
involved in the communication, but also to trust the
information provided by those entities. This is why
the trust management concept is required when
discussing about the security and privacy concerns
of the vehicular cloud computing.
• Trust Management
Similar to the cloud computing, the trust concept has
multiple definitions, because it can be seen from
different perspectives: customer’s and cloud
vendor’s point of views. Trust is “the subjective
probability by which an individual, expects that
another individual, performs a given action on which
its welfare depends”[Talal H]. Trust represents
“more than the authorized nature of security
relations between human societies, from a stable and
healthy operation to a large extent thanks to the trust
relationship between the individuals, groups and
organizations.”[ R. K. L. Ko, P. Jagadpramana]
Marsh was one of the first researchers of the
computational trust. In the trust model that he
proposed as a direct interaction between agents, he
divided trust in three categories [Marsh S.]:
• Basic Trust - based on experiences from the
past
• General Trust - the trust that an agent has in
other agent
• Situational Trust - the amount of trust that an
agent has in other agent in a specific situation
The bidirectional relationship between two
agents can be described at any moment by using the
degree of trust represented by the three categories.
Trust management represents the trust analysis
between agents using trust metrics that rely on
reputation, deception, persuasion and the optimal
decisions taken according to the trust level found.
The trust management techniques can be classified
in four main categories: policy, recommendation,
reputation, prediction. For each category, specific
trust models can be created. A trust model can be
described by a set of rules that reflect the
relationship between the cloud provider and
customer.
4 METHODOLOGY
4.1 Building the Trust Models
The trust models will be created as sets of rules
established by the cloud provider or end-cloud user
using a Rule Based Engine (for example the
Business Rule Engine from WSO2). The set of rules
will reflect a specific policy or recommendation.
The trust models will be used later on at the
authentication and geographical location
identification phases. The geo-location can be also
used as a second authentication factor.
From the authentication perspective, we would
like to try to focus on personal gadget (owned
device) usage as an authentication method in order
to gain access to the infortaiment (the entertainment
unit from the vehicle) data. If the owner of the car is
not recognized, the current driver should have
limited access to the information presented on the
infotaiment unit. The recognition will be done using
the sensors of the owned device which will
interpretate the user behaviour in the vehicle. On the
other side, geo-location can be used to confirm that
the driver behaviour.
Geo-location is a concept used in “information
systems security cycles to extrapolate the
geographical location of a subject (person or
system)”. There are several Location-Based Service
(LBS) applications on different platforms that
currently challenge the user’s trust levels and
privacy. The LBS application use the geolocation
data to obtain other information for the user. Usually
are installed on personal devices and help in
researching for specific points of interest (eg.
restaurants, museums, etc). The main difference
between Geolocation Services and Location-Based
Services is that the first ones don’t require an
accurate user address and the primary objective is to
protect the user’s privacy.
For the Geolocation model, the GPS data will be
collected using driver’s gadgets and the infotaiment
unit. After establishing a set of rules for each cloud
provider, a trust score will be associated considering