Survey on VANET and Various Applications of Internet of Things

Survey on VANET and Various Applications of Internet of Things

Nithiavathy R. (Arjun College of Technology, Coimbatore, India), Udayakumar E. (Kalaignarkarunanidhi Institute of Technology, Coimbatore, India) and Srihari K. (Department of CSE, SNS College of Engineering, India)
Copyright: © 2021 |Pages: 15
DOI: 10.4018/978-1-7998-2764-1.ch004
OnDemand PDF Download:
No Current Special Offers


The user of the cloud storage can store an enormous amount of the data without any worries of the local maintenances of hardware and software. The user outsources the data and takes security control in order to maintain the reliability of the data. The data deposited in the cloud server is under frequent audit to the user to check the correctness of the service provider using wireless networks. The user can service a third-party checker to do the security audit on behalf of them for managing time constraints. The confidentiality of the data outsourced is preserved as of the third-party checker also. The system should be more efficient build for securing the data from various vulnerabilities. The proposed audit mechanism satisfies the user by providing integrity of the data stored simultaneously effectively and efficiently using VANET.
Chapter Preview


The greater profits of the cloud computing is immense for a large user of the internet and information technology enterprises. The objective of the paper is application of VANET in big data, IoT and cloud. The scarcity of the resources is eradicated as cloud computing can employ any hardware or software without maintaining locally. They can pay as the uses for resources that they use for the time. The cloud computing prime service is provided for low cost, flexible to access the data. There is security issues when the data are outsourced remotely are exposed to internal and external threats. The verification process should be more simple and effective as the retrieving data, performing many operations to verify the data integrity. Beside many users access the same cloud loading provided by the common service provider in a frame setting using wireless networks. It is vital to enable public checking services for the data storage in each cloud. Either the user can audit the storage system with enhanced techniques or hire a resource person like TPA (third-party auditors) without violating security measures.

The data leak to the TPA may lead to new security vulnerabilities, so the TPA has only authorization to verify the data with resources given not aware of the data stored in cloud security. To overcome these issue the proposed techniques uses IoT based homomorphic properties along with the public key is employed where the TPA could not hold a local copy using VANET.

The remote servers stores the data from various location, Schwarz and Miller et al.(2006) model verifies the data in distributed servers for correctness by employing erasure code.

The public auditing using the PDP(Provable data Possession) model is explained in the Atenieseet al.(2007) for data files which resides in the un-trusted storage server where cloud service provider itself vulnerable.

Spot checking and error correction codes are used in this PoR(Proof of Retrievability) model in Juels et al. (2007) for ensuring the retrievability and data storage on the remote archives .

The online storage is maintained by the TPA by encryption using symmetric key hash function is proposed by the Shah et al.(2008).the TPA verifies only with the decryption key which as previously committed.

The design by Shacham and Waters et al. (2008) is improvised PoR model with BLS signature along with the security proof, public audit using homomorphic authenticator for integrity check.The erasure –correcting code on the remote stored data is extended POR model for distributed data assurance and availability is proposed byBowers et al.(2008).The verification is not limited which also satisfies the remote data control is described in Sebeet al.(2008).The trade-off between running time of the technique and local storage is preset for the user.The replicas are stored across the servers which are distributed across the geographical locations. The extension of the PDP is described in Curtmola et al.(2009) to handle the multiple replicas without encoding each copy of it.The data dynamics which enable provable data control based on the skip list is explained by Erway et al.(2009).the protocols requires linear combination for blocks and does not maintain privacy of the data outsourced. Both public audit and data dynamics are combined by Wang et al.(2011) with BLS,HLA along with MHT, but it does not meet the necessities privacy preserving in cloud computing.

Complete Chapter List

Search this Book: