1 Introduction

Until fairly recently, it was a foreseen dream to connect the fleet of consumer vehicles on the road in a way where vehicles can talk to each other and exchange information. The basic idea of vehicular ad hoc network (VANET) is to take the widely adopted and inexpensive wireless local area network (WLAN) technology, with a few tweaks, and install it on vehicles for cooperative communication. However if it was so simple just to migrate the existing technology from simple WLAN to vehicles, research community including academia and consortia would never produce remarkable results after gigantic amount of brainstorming [1]. Nevertheless, despite the remarkable research results achieved in VANET, security and privacy issues have been the root cause of, at least in part, keeping the stakeholders at the bay from investing in VANET deployment. The complete deployment of VANET is still rapidly ahead and its success and adaptation in end-users (drivers), consumers, and governments will depend on viable security solutions, quality of services, and consumers’ satisfaction [25]. One of the many goals of VANET is to support traffic safety and make the driving experience more safe, comfortable, and infotainment-rich. In VANET, vehicles and road-side units (RSUs), i.e., network nodes, will be equipped with on-board computation and communication modules to enable fruitful communication among them. Abstractly, there are two kinds of communication paradigms in VANET called vehicle-to-vehicle (V2) and vehicle-to-infrastructure (V2I) communication paradigms [6, 7]. V2 communication paradigm is also called ‘Zero Infrastructure’ because the communication pattern is fully ad hoc and no additional infrastructure is needed. On the other hand, V2I communication paradigm demands static and/or mobile road-side infrastructure installed beforehand. These communication paradigms offer a rich set of tools to drivers and administrators of transportation system to avoid environmental hazards, for instance black ice on the pavement, highway turbulence, and approaching ambulance, to name a few.

According to statistics from US Department of Transportation (DoT) in 2008, a staggering amount of roughly \( \$ 75\;{\text{billion}} \) are lost in worker productivity and around \( 8.4\;{\text{billion}} \) gallons of fuel is wasted [8]. Let alone, half of all congestion events occurred because of highway incidents rather than because of rush hours which is a common perception [9]. Looking at these statistics, the need for new infrastructure such as VANET is essential. Apart from the fact that these statistics could be driving force for VANET deployment, the community of researchers and academia anticipate that the surge in VANET technology is poised to have a huge societal impact. A number of vehicle manufacturers, government agencies, and standardization agencies around the globe have already spawn their research resources to VANET. The examples include Networks-on-Wheels, Car-2-Car Communication Consortium, the Vehicle Safety Communication Consortium, Honda’s Advanced Safety Vehicle Program, and many more [10].

US Federal Communication Commission (FCC) has allocated a rich \( 75 \;{\text{MHz}} \) of spectrum (5.850–5.925 GHz band) for the exclusive use of Dedicated Short Range Communication (DSRC) also known as WAVE 802.11p [11]. It has been pointed out that the allocated bandwidth exceeds far more than the requirements for VANET safety applications [12]. Therefore the surplus bandwidth opened the doors for new opportunities for investors, developers, and automobile industry, to enrich VANET services for the consumers. In other words, plethora of applications can be developed for VANET by utilizing the excess bandwidth, ranging from traffic safety to all kinds of infotainment systems on the wheels [12].

Cloud computing has changed the computation and communication mindset by decoupling computational assets from physical infrastructure thereby enabling virtualization [13]. The main motive of the cloud computing is to make sure the availability of “exactly what you need and when you need”. Since with the advancements in technology, internet is high-speed and has low cost than before, it would be better if it is utilized for more than just browsing. Another reason is that the advancements in parallel and distributed computing compel the application developers and industry to utilize the internet. Cloud computing is very appealing to the business startups with low upfront and virtually no maintenance cost. This computing paradigm offers new opportunities for developers and infrastructure providers at par. Until very recently, having virtually unlimited resources at very low affordable cost was just a dream, but cloud computing made it reality and there are many players in the market providing cloud services like Amazon, Microsoft, and Google.

Recently Olariu et al. [14] envisioned the idea of vehicular clouds by taking traditional VANET to the clouds [12]. The driving force behind their idea of vehicular clouds is that in the near future, huge vehicular fleets on our roadways, streets and parking lots will be recognized as abundant and under-utilized computational and communication resources. These resources could be used elsewhere that could earn a comparable revenue as well. The cloud computing environment fits to the scenario where the excess of the resources can be rented out. Though Olariu et al. [14] for the first time proposed the idea of vehicular clouds, they did not discuss the potential structural and architectural framework for vehicular clouds.

1.1 Our Contributions

In this paper we put forth the architectural taxonomy of future VANET clouds based on the services provided by the technology. We also propose the potential architectural frameworks for different types of cloud scenarios in VANET. It is to be noted that this work is the extended version of a poster that appeared in IEEE CloudCom 2012 [15] where we, for the first time proposed the signatory VANET-based cloud architectures. Additionally, here we also discuss the unique challenges from architectural, security, and privacy standpoint in VANET clouds. We believe that the proposed framework will cover the existing resource-rich cloud infrastructure and VANET, and enable VANET to merge with cloud computing paradigm. Moreover to argue on the feasibility of the proposed architectures, we also outline a novel traffic information dissemination mechanism through cloud infrastructure in VANET as a use-case of our proposed framework. The proposed traffic information dissemination through cloud leverages the preestablished VANET architecture where every vehicle shares its frequent mobility information with neighbor vehicles as well as with the cloud infrastructure through gateways. The cloud on the other hand, after processing the received coarse-grained information from the vehicles through gateways, constructs fine-grained traffic information and shares it with the vehicles on the road in the form of small segments based on the current near-future location of the subscriber vehicles. The structure of the rest of the paper is organized as follows. Section 2 summarizes the state of the art regarding VANET, cloud computing, and vehicular clouds. We provide the readers with a bird’s view of VANET and cloud services as a baseline for our proposed architecture in Sect. 3. Section 4 presents our proposed VANET clouds architectures. In Sect. 5, we discuss our proposed use-case for the VANET-based clouds framework. Section 6 outlines the research, security, and privacy challenges in VANET clouds following by concluding remarks and future directions in Sect. 7.

2 Related Work

In this section we discuss the state of the art regarding VANET and its successor VANET clouds from design, applications, security and privacy standpoint. To have a better understanding of the previous work carried out, we divide this section into three sub-sections. In first and second subsections we outline the research carried out in the field of standalone VANET and cloud computing, respectively. In the last sub-section we outline the state of the art regarding vehicular clouds.

2.1 VANET

Hartenstein and Laberteaux [16] carried out an extensive survey on VANET covering infrastructural aspects. Besides, implementation, performance, and research challenges have been discussed in [7]. Moreover, design and architectural issues are outlined in great detail by Papadimitratos et al. in [17]. The full deployment of VANET is still underway, since its success and adaptation in end-users (drivers), consumers, and governments is bounded by tangible and viable security solutions. Due to security and privacy challenges, the momentum of advancements in VANET has been impeded. Nevertheless, enormous research has been carried out to deal with security and privacy issues in VANET [25]. The problem in hand is to secure the operations of VANET by designing protocol suits that will mitigate the attacks and thwart deviations from the implemented protocol to a possible extent. The standalone security requirements for VANET are authentication, message integrity, message confidentiality, non-frameability, non-repudiation, user and location privacy, and conditional anonymity [2]. It is worth noting that the set of requirements may vary depending upon the types of messages. For instance, in Cooperative Awareness Applications (CAA), where cooperative awareness information is exchanged among the vehicles in the vicinity, there is no reason to encrypt the information.Footnote 1 Privacy issues in VANET have been discussed in detail in [4] and many privacy preserving schemes have been proposed [18, 19].

The services offered by VANET are not limited to collision warning, non-safety applications such as traffic congestion and routing information, but also include value-added services such as high-speed tolling, mobile infotainment, internet-on-the-road, movies-on-demand, and IPTV [20]. Nonetheless the ephemeral nature of VANET and mobility concerns pose many challenges for the research community.

2.2 Cloud Computing

Cloud computing is considered to be a business model rather than a technology. In [21], the authors carried out a state of the art survey answering the question whether cloud computing will stay or is it one of the hyped subjects that inevitably will be forgotten in the next couple of years. Most of the techno-market players such as Google, Amazon, and Microsoft are accelerating their pace in cloud computing by providing services to their users. Due to the motive of cloud computing, it seems very attractive to the end-user for variety of reasons. For instance the end-users do not need to worry about the shortage and management of resources [13]. Nevertheless, as to the other networks, security and privacy is a nightmare to cloud computing as well. Zhou et al. [22] carried out a brief survey about security and privacy issues in cloud computing covering the very aspects of security such as availability, confidentiality, data integrity, control, and audit. Besides, they also discussed the privacy issues in detail including legal issues and multi-location issues. Zeng and Cavoukian [23] proposed cloud computing architecture from privacy standpoint and they embedded the privacy into design by following ‘privacy by design’ approach. Storage security is another hot issue in cloud computing these days. Bessani et al. [24] proposed a scheme to remedy the storage security problem in cloud computing through the encryption, encoding, and replication of the data on diverse clouds which led them to a cloud-of-clouds. Cachin et al. [25] surveyed well-known cryptographic tools for providing integrity and consistency for data stored in clouds, and discussed recent research in cryptography and distributed computing addressing the aforementioned problems.

2.3 Combination of VANET and Cloud Computing

Fairly recently, Olariu and his colleagues envisioned combining VANET with cloud computing [12, 14]. They proposed Autonomous Vehicular Clouds (AVC) offering potential applications to VANET users. The authors also briefly discussed research challenges in the vehicular clouds. Abuelela et al. [12] suggested to take conventional VANETs to the cloud and envisioned that in future, the under-utilized VANET resources could be utilized by combining VANET with cloud computing [14]. Taking a step ahead, Bernstein et al. [26] proposed a Platform as a Service (PaaS) model for mobile vehicular domain with possible potential applications. Yan et al. [27, 28] outlined the security and privacy challenges in vehicular clouds. They discussed the challenges resulted by the features of vehicular clouds, e.g. authentication of highly mobile vehicles and the complexity of trust relationships among multi-players caused by intermittent short range communication.

Nonetheless, the infant vehicular clouds still needs rigorous research insights to make it to the deployment phase. One of the main advantages of VANET-based clouds is that, no additional infrastructure is needed for deployment since the infrastructure is already there. Olariu et al. did not propose any solid framework for vehicular clouds. They carried their work mostly from applications standpoint. Recently Yu et al. [29] addressed the resource management issue in VANET by integrating it with cloud computing. They divided the VANET-based clouds into vehicular cloud and road-side cloud. Yu et al. mainly focused on the Virtual Machine (VM) migration issue, which we think might not be needed if the architecture is re-considered. Moreover, RSU deployment is already a daunting challenge in VANET, leaving the RSU cloud questionable. They also cover a specific range of applications under the umbrella of VANET-based clouds whereas we aim to abstract that limitation. Another recent work has been done by Whaiduzzaman et al. [30] where they surveyed the emergent vehicular clouds. They covered the previous works carried out regarding vehicular cloudsFootnote 2 and emphasized on the applications that are offered by this business model/technology.

Our contribution is different from the aforementioned authors. We put forth a solid taxonomy of the VANET clouds based on the types of applications and modes of communication. Moreover we define different architectural frameworks for VANET cloud based on the vehicular-based cloud computing taxonomy. The basic idea of our proposed scheme can be found in the poster version [15], whereas here we extend the preliminary version to a more elaborated version with technical depth. It is, to the best of our knowledge, first approach to take the vision of Olariu and his co-workers, a step further towards VANET based cloud computing. For the ease of understanding, we outline a novel use-case of our architectural framework where private cloud infrastructure provides the subscriber vehicles with fine-grained traffic information as a result of cooperation from the vehicles to the cloud infrastructure in the form of frequent mobility information. More precisely vehicles share their coarse-grained mobility information with neighbors and with cloud infrastructure. The cloud after processing the coarse-grained information, constructs fine-grained traffic information of the road segments and disseminates the fine-grained traffic information to the subscriber vehicles based on their locations.

3 VANET and Cloud Computing: A Bird’s View

In this section we outline the bird’s view of standalone VANET and cloud computing technologies which will serve as baseline for our proposed scheme.

3.1 VANET Architecture, Framework, and Services

VANET leverages vehicles as mobile nodes moving on the road and stationary RSUs installed on the road side and/or hot spots (for instance in an intersection of a cross-road). The main players in VANET are management entities, certification authorities, revocation authorities, and end users (vehicular nodes). Keeping in mind the advancements in vehicular technology, it is sepculated that in the near future, high-end and middle-end vehicles will be equipped with rich set of computational, communication, and storage resources. VANET employs architecture-less communication among the vehicular nodes and infrastructure-based communication between vehicles and RSUs. The results from these communications are fed to safety and non-safety applications. For instance, CAA leverages scheduled beacon messages that contain speed, location, heading, and lane information of the originating node. CCA uses this information from the vehicles in the vicinity to construct traffic view ahead of the vehicle. Besides, important decisions have to be made depending upon the information from these beacons. Apart from beacons, critical warning messages are of paramount importance in VANET that enable the drivers to make timely decision in critical scenarios such as an accident on the freeway or traffic jam in rush hours. These timely warning messages can enable VANET applications to suggest alternate routes for the driver. Cooperative Adaptive Cruise Control (CACC) is another important application of VANET which mainly emphasizes on maneuver control while driving [31]. From applications point of view, several industry and governments consortiums are striving to identify different kinds of VANET safety applications (and related technologies) that will provide the greatest safety benefits. These organizations include Crash Avoidance Metrics Partnership (CAMP) [32] which is the joint collaboration of vehicle companies like BMW, DaimlerChysler, Ford, GM, Honda, Nissan, Toyota, and Volkswagen. Another such organization is Car2Car Communication Consortium (C3).

3.2 Cloud Services

Needless to say that cloud computing is becoming a well-known buzzword for the last decade. Generally cloud computing refers to both services accessed via, and delivered through, the vast universe of internet in a seemless manner, and the hardware and system software in remote datacenters that provide those services. The beauty of virtualization in cloud computing is attracting large businesses to migrate to cloud environments. Nevertheless this migration is not yet abrupt and still large corporations are testing the waters with small projects. The main concern of these corporations is the control over cloud. As far as the motivation for migration is concerned, it is important to realize that most of the issues are essentially old problems in new settings. For instance offshore outsourcing must guarantee certain security primitives such as data integrity, data security, and privacy etc. Chow et al. [33] believe that integrity of the cloud infrastructure is ensured through the use of trusted computing.

Cloud computing is also known as ‘utility computing’ which is based on ‘pay-as-you-go’ service [13]. The scenario can be easily compared with our daily life, where we use gas and electricity in our homes as much as we need and at the end of the month we pay for exactly what we have used, neither more nor less. Cloud computing environment offers rich amount of resources ranging from offshore storage to offshore infrastructure. Examples are Amazon S3, Google Drive, and Microsoft SkyDrive. Besides storage, clouds also offer computation resources, such as Amazon Elastic Compute Cloud (EC2), which can significantly reduce the cost of maintaining resources locally. Besides, online collaboration tools, such as Google Apps or versioning repositories for source code make it easy to develop applications online without purchasing licenses for different softwares. Along with the enterprises, home users can also take advantage of cloud computing, if the services are available at reasonable prices. The use of new sophisticated handheld devices is drastically increasing day by day. But still these devices are lacking far behind the traditional computers in computational power. Nevertheless, notebook computers are now transforming to tablets or a light netbook, which can take advantage of cloud services for intensive computations. In the near future, cloud services will be widely used by the enterprises and individuals, using hybrid computing and communication devices. Thus it is required to provide cloud service to the individuals, at a very low cost which will boost up competition among cloud vendors and will result in reducing infrastructure costs for them [34, 35].

The core of the cloud services is comprised of three basic delivery models in the form of layers. The top layer is known as Software as a Service (SaaS). This layer delivers applications to consumers (either individual or enterprise) in a multitenant fashion. Usually the consumers use thin clients to access those services through internet. The principle benefit to consumer is that, he/she does not have to pay the upfront cost for hardware or software licensing. The by far best example of this service suit is the Google Docs which is equivalent to Microsoft Office. Google provides the aforementioned service to its consumers for free.

Platform as a Service (PaaS) is the second type of service in the layered stack which refers to delivering the development environment as a service to the consumers instead of installing development tools/softwares on host computers. This makes the consumers capable of doing their development remotely by using only the services provided by the service provider. Normally this kind of service works well at enterprise level and the best example is Google App Engine.

At the bottom of the layered stack, cloud computing provides Infrastructure as a Service (IaaS). Instead of application or environment, in this paradigm, physical resources are delivered to consumers as a service. These resources include servers, connections, and related tools necessary to build an application environment from the scratch. Consumers have virtually unlimited resources according to their budget. They can rent processing, storage, networks, and other fundamental computing resources on which the consumer then deploy and run arbitrary cloud application softwares and system softwares. Amazon is providing such services on rent through its elastic computing called EC2.

In the next section, we briefly discuss our proposed VANET clouds architectural framework.

4 Proposed VANET Clouds Architecture

Thanks to advancements in vehicular technologies by virtue of which today’s high-end vehicles are capable of hosting substantial on-board computation, storage, sensing, and communication capabilities. These vehicles in combined fashion can serve as a huge farm of computers on the move. These aforementioned attributes make vehicles on the road not just moving machines as a mean of transportation, but also ideal candidates for the next paradigm shift from traditional VANET to VANET clouds so that their resources can be utilized in better way. Olariu et al. [14] for the first time, coined the term Autonomous Vehicular Clouds (AVC) as, “A group of largely autonomous vehicles whose corporate computing, sensing, communication, and physical resources can be coordinated and dynamically allocated to authorized users”.

We take a step forward to broaden the idea of VANET clouds by first defining a communication paradigm for VANET clouds and then put forth the potential cloud services from VANET standpoint.

4.1 Communication Paradigm in VANET Clouds

Figure 1 shows the communication paradigm for VANET clouds. There are three layers of communications in VANET clouds at three different levels incorporating different entities. The bottom level is communication at car level. Vehicles in standalone VANET have Global Positioning System (GSP) to obtain accurate location information, radar, sensors, and actuators. Communication among these aforementioned entities will take place at car level to form a networked environment in order to feed the data from aforementioned entities to the processing modules. For instance the data from these modules would be used to construct cooperative awareness messages or alarm messages otherwise. The second level of communication is inter-car level where vehicles communicate with each other at On-Board Unit (OBU) level. This communication can be either V2 or V2I by using IEEE 802.11p (WAVE) standard. Note that communication in the lower 2 levels of Fig. 1 is inherited from conventional VANET. The top most level enables vehicles to communicate at cloud level where vehicles or RSUs may serve as gateways. The nomination of vehicle or RSU as gateway will depend upon the underlying framework of VANET cloud.

Fig. 1
figure 1

Communication paradigm of VANET clouds

4.2 Service Architecture in VANET-Based Clouds

As illustrated in Fig. 2, VANET clouds are suitable for IaaS and SaaS only, whereas PaaS does not seem to be logically appropriate for VANET environment. At IaaS level, the potential services provided by VANET clouds can be Network as a Service (NaaS) where a vehicular node moving on the road can be leveraged as a WiFi access point gateway to the internet. Logically while moving on the road, on highways in particular, the vehicles tend to move at relatively same speed and in normal cases, the neighborhood does not change abruptly. Nevertheless, connection time is an important factor for using NaaS service. The vehicles can rent their resources provided that the users intending to use the services, are willing to pay. At SaaS level, real-time VANET information can be shared with the subscribed users. Additionally, infotainment services and P2P applications are also suitable to be used as SaaS. An extra-ordinary benefit of VANET application as SaaS is that, the vehicles that do not have VANET capabilities, can still subscribe to VANET information in a virtualized fashion and they will be charged for what they subscribed for. The fact that drivers may not need VANET functionalities all the times will save them the resources.

Fig. 2
figure 2

Service architecture in VANET clouds [32]

4.3 Comparison Between Conventional and VANET Clouds

Figure 3 depicts the comparison between conventional clouds and VANET clouds. It is worth noting that each level in conventional cloud has its counterpart in the VANET scenario. For instance, the infrastructure, platform, and applications are obvious in both environments but at client’s level in conventional clouds, the VANET counterparts may be vehicles themselves or general users, depending upon the service structure.

Fig. 3
figure 3

Conventional clouds versus VANET clouds

4.4 VANET Clouds Taxonomy

Figure 4 illustrates the brief taxonomy of VANET clouds. We divide VANET clouds into three major architectures namely vehicular clouds (VC), vehicles using clouds (VuC), and hybrid vehicular clouds (HVC). VC is further divided into two scenarios from movement standpoint. Static clouds refer to the stationary vehicles providing cloud services (renting out storage or processing resources). For instance a virtual super computer formed by the collaboration of vehicles parked in a big organization or enterprise’s parking lot [12, 36]. In case of static VANET clouds, the infrastructure (communication, storage, and process) can be rented out to make revenue as well. IaaS and data storages services are feasible for such arrangements. On the other hand, dynamic clouds are formed on demand in ad hoc manner. VuC connects the VANET to traditional clouds where VANET users can use cloud services on the move such as infotainment, traffic information, and CAA to name a few. In HVC, vehicular clouds interact with traditional cloud for services exchange. The vehicles and RSUs serve as gateways on the VANET part thereby communicating with the gateways of the traditional clouds. Each section is further elaborated in the following sub-sections.

Fig. 4
figure 4

Taxonomy of VANET clouds

4.4.1 Vehicular Clouds (VC)

The main players in VC include VANET infrastructure itself, gateways, and brokers as shown in Fig. 5.

Fig. 5
figure 5

Vehicular clouds (VC) [15]

Note that the vehicular nodes serve as service providers in this paradigm. As depicted in Fig. 4, VC can be divided into two classes namely static VC and dynamic VC. The lifetime of static VCs is longer than dynamic VC. However, both of them serve different classes of applications, for instance static VCs are more suitable for long-term services such as Storage as a Service (STaaS), IaaS, and Datacenter in the parking lot [36], whereas dynamic VCs are suitable for disposable clouds. Generic VC is formed in the following manner.

First, the vehicles in the vicinity initiate a protocol to select broker(s) among them and identify the boundaries of the cloud following by electing an Authorized Entity (AE) among the brokers to ask for authorization for cloud formation. After brokers and AE are elected, then AE invites the vehicular nodes in the premises of the cloud boundary to take part in cloud. Interested vehicles will reply with an acknowledgement. If the number of interested vehicles is above certain threshold, then AE asks higher authorities about permission to form a cloud and provide the potential resources. Upon getting permission, the participants of the cloud pool their resources to form a resource rich virtual environment. AE sends the schedule plan to higher authorities and gets implementation authorization. Note that the job in hand can be handed over to the cloud by higher authorities in exchange of some incentives for the participants. AE dissolves the cloud after the job is done. It is worth noting that this strategy is different, at least in part, from that of Olariu et al.’s [14] scheme. It is better practice to first look for the volunteers before asking authorities for permission. It will save the bandwidth and communication if the number of volunteers for dynamic cloud formation is not enough and also when it is not possible to form a cloud.

One of the most appropriate examples of dynamic clouds is dynamic traffic lights scheduling [12, 14]. Consider a national sports event in a huge stadium watched by thousands of viewers. When the event is over, everybody wants to go out first and it will create catastrophic traffic jams in the vicinity of the stadium. The usual traffic lights would not be a suitable option to fade away the traffic jam. The better solution would be to re-schedule the scheduled traffic lights in a real-time. In worst case, it would include not only traffic lights in the stadium vicinity, but also the effect of changing one traffic light would affect many others thereby demanding re-scheduling the traffic lights on a large scale. In the aforementioned scenario, AE sends the traffic signals re-scheduling plan to the municipality and hence the traffic jams issues can be resolved in a timely manner.

Another promising application of dynamic VCs is Video on Demand (VoD) service on the road provided through the public transport buses in the vicinity. Resources rich public transport buses pool their shared storage resources to offer MoD service to the vehicles in the urban vicinity. Public transport buses are assumed to be equipped with both DSRC and 3/4G communication capabilities and the possible gateways to VANET and cloud infrastructure [37]. Besides, real-time navigation service can be provided with the help of cloud formed by the buses and other vehicles, to the subscribers. These cloud players will examine the current traffic conditions and make the navigation decisions accordingly.

4.4.2 Vehicles Using Clouds (VuC)

Figure 6 depicts the architecture of VuC where VANET uses cloud services on the move. VANET collaborates with cloud infrastructure and provides cloud with meaningful data that could be used in decision making. The virtualization layer is provided by the gateways. RSUs serve as gateway to the clouds. Moreover, vehicular nodes with 3/4G internet connection might also serve as gateway to cloud infrastructure in remote areas where vehicles have no direct connection with RSUs. High speed wired backbone channel is assumed to be present between static gateways and the cloud servers. Without loss of generality, VuC could be leveraged to provide VANET with CAA, real-time traffic information, and infotainment. However in this paper we emphasize only on traffic information. We consider fine-grained traffic information dissemination through clouds as a use-case in this paper [38]. Vehicles cooperate with cloud and provide cloud with coarse-grained whereabouts information that includes vehicle’s current position, speed, and heading information. Whereas cloud after processing the coarse-grained information, constructs the fine-grained traffic information and disseminates it to the vehicles on the road based on their current and near-future locations.

Fig. 6
figure 6

Vehicles using clouds (VuC) [15]

Many applications of this category have already been outlined in [14] and [30]. Other promising applications of VuC include remote configuration and car performance checking, big traffic data analysis, smart location-based advertisements, and vehicles witnesses.

  1. A.

    Remote Configuration and Car Performance Checking

By using cloud technology, a car can be monitored and debugged remotely. This technology has already been implemented by a well-known automobile company Hyundai [39], where they monitor their cars right from assembly line. The performance of the car is remotely checked by constantly receiving data from the car and is used to provide quality of services to the customers. Nevertheless user and location privacy are serious concerns for such approach.

  1. B.

    Big traffic data analysis

Vehicles produce large amount of traffic data, for instance beacon messages produce data on the scale of milliseconds, that is valuable for the services provided by VANET. Data storage and processing would require large amount of storage and computation resources respectively. This data could be used for a variety of purposes ranging from traffic information to entertainment.

  1. C.

    Smart location-based advertisements

With the advent of smart vehicles, billboards on the road-sides are likely to be replaced by in-car advertisement system, where drivers can get the ads of their interest based on their choice. As aforesaid, the whereabouts data, the driving pattern, and the location queries from the drivers would enable the decision making servers in the cloud to advertise the events and/or locations to the people in a smart way based on their interests.

  1. D.

    Vehicle Witnesses

Recently, Hussain et al. [40] proposed Vehicles Witnesses as a Service (VWaaS) that leverages cloud infrastructure to save the original forensics in case of any incident on the road. Vehicles upon sensing an event, or getting instruction from authorities, take pictures of the site of interest, and send it to the cloud. Cloud infrastructure saves these pictures as forensic evidence and later on provides the forensics to law enforcement agencies, judiciary, and/or insurance agencies.

4.4.3 Hybrid Vehicular Clouds (Inter-vehicle Clouds)

HVC is the combination of VC and VuC where VC serves as both service provider and consumer at the same time. HVC architecture is shown in Fig. 7. The motivation behind HVC is that the vehicles moving on the road might want to rent out their resources and might want to use cloud services at the same time. NaaS and P2P are the most suitable examples for such scenarios. Nevertheless due to the ephemeral nature of VANET, connection among vehicular nodes is very intermittent. However, it can be argued that usually for P2P applications, the size of the files is fairly small making it suitable for short time connection. Other potential applications for this architecture include IaaS in case of VC.

Fig. 7
figure 7

Hybrid vehicular clouds (inter-vehicle clouds) [15]

Another potential application of HVC is the MoD service provided by public transport buses in a multi-cloud environment, where buses provide MoD to the subscriber vehicles. The buses use their local storage and if the requested file is not available locally, then they can use the multi-cloud architecture and use third-party service providers to access the requested file. In-car cloud for diagnostics and heterogeneous environment while using other third-party cloud is another promising application of HVC. In such scenario, the in-car cloud gathers data from different sensors in the car for instance tire pressure, brake oil, engine oil and so forth, and processes it for car diagnostics. There are two options, either this data could be dealt with locally or can be uploaded to the manufacturer cloud. Meanwhile the car’s OBU also cooperates with the VANET cloud in the form of coarse-grained whereabouts information and receives fine-grained traffic information and warning from the cloud.

5 Use-Case (Traffic Information Dissemination Through Clouds)

5.1 Baseline

In this section we outline a novel use-case for our proposed VANET-based clouds framework which is based on Traffic Information as a Service (TIaaS) [38]. We chose the widely used traffic information dissemination system (TIDS) among vehicles in VANET. Traditionally traffic views (short-range local and long-range extended) are constructed from the beacon information in hand by vehicles which consume a considerable amount of vehicle’s processing power. Therefore, we propose cloud-based TIDS where vehicles share their coarse-grained traffic information with cloud in the form of beacons and cloud after processing, provides the subscriber vehicles with fine-grained traffic information based on their locations.

5.2 Network Model

Figure 8 illustrates our proposed network model. We divide our proposed architecture into two networks connected through Gateway Terminals (GTs). VANET architecture consists of traditional vehicular nodes, RSUs, and management/revocation authorities. Vehicles moving on the road serve both as producers (they share coarse-grained information with the cloud) and consumers (they subscribe to fine-grained traffic information from the cloud). RSUs serve as GT between vehicles and the cloud infrastructure. We assume that a fraction of vehicles on the road have 3/4G internet access which can be leveraged to serve as a secondary GT to the cloud.

Fig. 8
figure 8

Network model of traffic information as a service

It is worth noting that in case if there is no access to RSU directly, then vehicles with 3/4G connections could be used as mobile GT.

Cloud architecture consists of authenticator, Cloud Processing Module (CPM), Cloud Knowledge Base (CKB), and Cloud Decision Module (CDM). Authenticator is responsible for handling subscriptions from the vehicles and authenticating them. Data-contained coarse-grained MVs from vehicles are collected by cloud, stored at CKB and forwarded to CPM for processing. After processing coarse-grained MV, CPM constructs fine-grained traffic information and forwards it to CDM. CDM then categorizes the fine-grained data based on physical locations. Without loss of generality, physical roads are divided into small manageable zones and zones are further divided into segments beforehand. The data is delivered to vehicles on the segment basis.

5.3 Mobility Vector (MV)

As a cornerstone of VANET, vehicles rely on situational awareness information from neighbors in order to have smooth, safe, and reliable driving experience. Such awareness is realized through beacons shared among the vehicles. The information contained in beacon (timestamp, location, speed, acceleration, and heading etc.) helps the neighbors to update their awareness about the network topology. We define a variation of beacon message namely Movement Vector (MV)Footnote 3 which is shared with the cloud, with slightly lesser frequency than the original beacon. The format of MV is given below:

$$ MV_{i} = \{ MD, (\updelta_{1} ,\updelta_{2} , \ldots ,\updelta_{n} )\} $$

MV i is i-th movement vector by vehicle V i containing Movement Data (MD). The contents of MD are: \( MD = (\delta , t_{cur} ,loc_{cur} ,vel_{cur} ,dir) \). (δ 1, δ 2,…, δ n , δ) are the security parameters that guarantee different security aspects. It is worth noting that we do not consider the security aspects of the proposed TIDS. t cur is the current time, and loc cur is current position of the vehicle moving with velocity vel cur in the direction dir.

Vehicles broadcast these movement vectors to the nearby neighbors in the transmission range and also to the gateways (RSUs). To realize a more practical scenario, we consider Hussain et al.’s mobile gateways/RSU mechanism [37].

5.4 Fine-Grained Traffic Information Dissemination

VANET is divided into manageable physical domains and each domain has its own potential cloud infrastructure for traffic information dissemination. It is also worth noting that the cloud must be established privately by the government authorities such as department of transportation, to minimize the transmission and/or access delays during the information retrieval. In order to guarantee the relevant and right information delivery to subscribers, domains are further divided into reasonable zones and without loss of generality, going down to another level of hierarchy, each zone consists of segments that correspond to small road segments (for instance in urban areas, a road segment between two traffic lights or a block). The number of road segments is the tradeoff between the granularity of traffic information and the performance. CPM constructs traffic information based on physical locations (segments). Similarly when CPM constructs fine-grained traffic information corresponding to segments, it forwards the information to CDM in order to provide the subscribers with the right and relevant information according to their current and near-future locations. The reason for segment level delivery is that the subscribers might only be interested in certain area. The desired information may vary depending on the direction of the vehicle. This fine-grained traffic information exhibits the extended traffic view of the vehicles ahead of them. The length of the extended traffic view is again a tradeoff between the granularity of the information and the length of the individual segments. The fine-grained traffic information message M TI is given below:

$$ M_{TI} = (t_{cur} , ZID, Seg_{ID} ,TD_{{Seg_{ID} }} , AV_{{Seg_{ID} }} , others) $$

TD SegID is the traffic density at SegID, and AV SegID is the average velocity at SegID. ‘others’ corresponds to any warning or alarming alert (for instance a black ice on the road or fog). It is worth noting that the pair ZID and SegID corresponds to a physical location and this information is used by CDM to forward the traffic information to concerned GT. The actual implementation of the graphical user interface can vary from vender to vender and we do not give implementation details here. The information displayed to the drivers on their on-board screen can be represented in different ways such as different colors of the road segments, exact physical representation of the vehicles and so forth. The complete protocol for traffic information dissemination through cloud infrastructure is shown in Fig. 9.

Fig. 9
figure 9

Traffic information dissemination protocol

5.5 Performance Evaluation

5.5.1 Complexity

We do not consider the security and privacy factors of our proposed cloud-based TIDS in details and consider them to be out of the scope of this paper and leave it for future work. The complexity of our proposed cloud-based TIDS is O(1) by searching the relationship of different security parameters, depending upon the hash function and its implementation. This complexity is incurred by the revocation authorities in worst case scenario, in order to find the relationship between different messages from the same user (contributor). Whereas in the previous efforts, Qin et al. [41] and Bernstein et al. [26] did not address worst case scenarios in case where liable situations are essential. Qin et al. leveraged Time Space Link Graph (TSLG) for defining vertices and edges in VANET where every vehicle can be source as well as destination at the same time. However in worst case, the number of links can be (\( \frac{n(n - 1)}{4} \)) on average and the order of routing optimization is O(n 2) where n is the number of vehicles in the network. In the next subsection, we explain our simulations results to argue on the feasibility of the proposed cloud-based TIDS. However, we argue that there are enough resources set by the authorities in a private cloud that meet the delay requirements of the VANET application. In our case, since we consider TIDS, the delay requirements are not that much stringent as compared to the safety applications. That is why, the arguments on the delay can be relaxed according to the VANET non-safety applications.

5.5.2 Simulation Setup

In this subsection, we present the simulation setup, simulation tools used, and simulation environment. Moreover we also discuss the traffic scenarios. We evaluate our proposed cloud-based TIDS using ns2Footnote 4 (version 2.34 with vanetrbc amendment and the FreeSpace propagation model). In order to generate the real traffic scenarios, we considered a \( 5 \times 9\;{\text{km}}^{2} \) section of the Seoul city, South Korea and used TraNSFootnote 5 and SUMOFootnote 6 to generate the mobility traces for vehicles and RSUs. RSUs are randomly deployed in the simulation and observed section in the simulation exhibits both urban and semi-highway scenarios. The wireless bandwidth and the transmission ranges were set according to DSRC standard.

To investigate different traffic scenarios, we took into account, three traffic regimes, i.e. extensively dense traffic regime, average traffic regime, and sparse traffic regime. We set the simulation matrices as information retrieval rate (IRR), data loss rate (DLR) with varying movement vector frequency (ψ MV ), varying traffic density \( (\Gamma _{TD} ) \), and varying traffic information frequency \( (\Phi _{TI} ) \). In order to realize the traffic information through clouds, we added another message type, traffic information message to the vanetrbc amendment of the ns2. The new message type represents the fine-grained traffic information from cloud to the vehicles through RSUs and currently our version supports long-range traffic views of the length up to 1, 1.5, 2 and 2.5 km. The simulation parameters used are listed in Table 1.

Table 1 Simulation parameters

5.5.3 Simulation Results

In this subsection we demonstrate our simulation results. The main aim of these results is to show the feasibility of the traffic information through VuC architecture and a decent acceptable amount of traffic information retrieval from the cloud infrastructure through gateways. Without loss of generality, we assume a private dedicated cloud infrastructure owned by the authorities, for instance the transportation department of the government with unlimited computation resources. We also assume that the communication between the cloud and the gateways is fast enough and within acceptable delay range. Nonetheless the application we considered, i.e. traffic information dissemination, does not require tight-bound delay.

Information retrieval rate (IRR) Our simulation results show that almost every scenario exhibits the favorable percentage of retrieved fine-grained traffic information from the cloud infrastructure. Figure 10 shows the IRR with varying ψ MV . It can be seen that the variance in ψ MV slightly affects the rate of information retrieval. In Fig. 10a, the dense traffic regime with \( \psi_{MV} = 300\;{\text{Hz}} \) obtains 83 % information which means that 83 % of the total time every vehicle retrieves fine-grained traffic information successfully. The IRR gets better when the traffic regime makes transition from dense to average and sparse. The natural drop in the IRR in case of dense traffic regime is understandable from the fact that when the number of vehicles increases in the area, the load on the channel also increases thereby causing packets drop. Figure 10b, c show the IRR in case of \( \psi_{MV} = 400\,{\text{and}}\,500\;{\text{Hz}} \) respectively. The results in case of dense and average traffic regimes, i.e. 1000 and 600 vehicles respectively, are naturally predictable and with the decrease in ψ MV from 300 to 400 and 500 Hz, the IRR gets better. This behavior is expected because decreasing the movement vector frequency gives more room for the channel to receive more messages and the packets drop is subsequently decreased. However, the sparse traffic regime, i.e. 200 vehicles behaves unpredictably with the decrease in ψ MV because the number of neighbors are decreased and the vehicles can easily go out of the range of the gateways easily. In our simulations, \( \Phi _{TI} = 6\;{\text{s}} \) gives the best results, that is why in Fig. 11 we investigate the behavior of the vehicles against varying movement vector frequencies. It can be seen that \( \Phi _{TI} = 6\;{\text{s}} \) gives above 94 % IRR which can result in the best performance of VANET application. It can be seen that there is minute variance in the IRR with different ψ MV , however we argue that this small change will add up more to the optimization of the VANET application. To this end, \( \Phi _{TI} = 6\;{\text{s}} \) performs best in all three traffic regimes.

Fig. 10
figure 10

Information retrieval rate (IRR)

Fig. 11
figure 11

Information retrieval rate at

Data loss rate (DLR) We investigate the percentage of data lost during communication while retrieving the fine-grained traffic information from the cloud. In our simulations, we vary both ψ MV and \( \Phi _{TI} \) with different traffic densities to see the behavior of the system. Figure 12 shows the effect of different \( \Phi _{TI} \) and the information loss therein. In Fig. 12a we can see the unpredictable behavior in case of sparse traffic regime, where the data loss in case of \( \Phi _{TI} = 2\;{\text{s}} \) is more than the data loss in case of \( \Phi _{TI} = 4\;{\text{s}} \). Such behavior is the result of the same argument that we made in case of IRR. In case of average and dense traffic regimes, the improvement in data loss with decreased \( \Phi _{TI} \) is natural and expected. Figure 12b, c outlines the result obtains with \( \psi_{MV} = 400\;{\text{ms}} \) and \( \psi_{MV} = 500\;{\text{ms}} \) respectively. We can see the unpredictable behavior of the sparse traffic regime in both cases. However in case of average and dense traffic regime, the loss in data retrieval slightly increases with the increase traffic density, but the loss decreases with the decrease in \( \Phi _{TI} \), which means that fewer traffic information messages will be sent. In other words, \( \Phi _{TI} = 2\;{\text{s}} \) causes more data loss than \( \Phi _{TI} = 4\;{\text{s}} \) and \( \Phi _{TI} = 6\;{\text{s}} \) which is the expected behavior.

Fig. 12
figure 12

Data loss rate (DLR)

5.5.4 Discussion

In the previous subsection, we investigated the different simulation scenarios to observe the feasibility of the traffic information dissemination through proposed VuC framework. Without loss of generality, we assume the established cloud framework and focus only on the gateways and the mobile vehicles on the road. Since we consider traffic information dissemination application as a use-case, the delay requirements are not stringent for such VANET applications. Therefore, above 70 % of the reception rate of the information will result in phenomenal quality of service (QoS) provided by the VANET application. In our case, as it can be seen from the graphs, in worst case each vehicle on the road received the traffic information 83 % of the total time. With more tuning and tweaking, these results can be further improved which will result in more QoS guarantees from the service provider standpoint. Moreover taking into account the urban scenario, the speed of the vehicles is relatively slow or moderate, that means a little less frequent information retrieval would be acceptable by the application. Overall our simulation results show that the traffic information through gateways from clouds is feasible and fulfills the VANET application requirements. To be more precise, it can be seen that on average, the most favorable parameter for generic semi-optimized VANET application (from traffic information dissemination standpoint) is \( \Phi _{TI} = 6\;{\text{s}} \) and \( \psi_{MV} = 400\;{\text{ms}} \).

6 Security Challenges in VANET-Based Clouds

Security and privacy are indispensable in vehicular communications for successful acceptance and deployment of such technology. Similarly there are many risks involved with renting virtual resources in cloud environment or storing data in cloud thereby releasing control over data. One concern that many users are aware of, is loss of the privacy and data storage security. Nevertheless, the popularity of social networks and online data sharing repositories suggest that many users are willing to forfeit their privacy to some extent which enabled them to offshore their data and information [25, 34]. Logically VANET clouds inherit their parental long-chased security and privacy issues from both VANET and cloud computing. We take a different road towards security issues in VANET clouds. Unlike Yan et al.’s scheme [27], where the authors discussed spoofing of identities, repudiation issues, DoS and so forth, we believe that potential solutions to such issues have been put forth by VANET community already. These issues can be solved with the scheme designed for signature VANET and cloud computing. The same argument holds for traditional cloud architectural issues.

The security and privacy challenges faced by standalone VANET and cloud computing will remain unchanged even if the two technologies are merged to form VANET clouds. We scrutinize the security challenges faced by VANET clouds from both structural and operational standpoint. We believe that in addition to security threats faced by VANET and cloud computing, the following challenges must be addressed as well.

  1. A.

    Gossip Interval

Vehicles while moving on the road, have very less time to be in the neighborhood of other vehicles thereby leaving very less room for inter-connection among them. Such topology dynamism is a nightmare for cloud service providers and vehicles themselves. This scenario is a challenge for dynamic VANET clouds. The connection time, at least probabilistically, must be taken into account before using and/or renting the services.

  1. B.

    Mobile Authentication

High mobility is a distinguishing characteristic of VANET. This mobility may become a bottleneck in authentication process where gossip interval is too small. Efficient authentication schemes must be in place to take the mobility and high speed into account.

  1. C.

    Conditional anonymity yet virtualization

Since cloud computing’s core idea is virtualization of resources but conditional anonymity of users and service providers in case of VANET cloud must be made sure so that in case of a dispute, revocation of user, message, or service provider whichever is necessary, can be possible.

  1. D.

    Insiders and Outsiders

Insiders and outsiders are two kinds of attackers in VANET. The former are legitimate VANET users and the latter are non-authorized users. In VANET clouds scenario, both insiders and outsiders are crucial threat for cloud services as well as VANET services. Strong security measures must be taken in both static and dynamic VANET clouds against them.

  1. E.

    Renting out resources, Autonomy, and Control

The other huge challenge for VANET clouds is the tussle among ‘renting out resources’, autonomy, and control. These three terms have conflict of interest which makes the security of VANET clouds more challenging. Renting out only resources but not control, is an ideal solution for VANET clouds, but autonomy may need to be compromised to some extent. The middle way would be conditional autonomy where in case of a dispute, non-repudiation must be possible.

  1. F.

    Cooperation Middlewares

Cooperation middleware solutions must be developed in order to connect VANET clouds to each other and/or to external clouds. This situation may arise in case of VuC and HVC scenarios. These middleware solutions will provide trust relationship, data flow control, security, and privacy for the connecting infrastructures.

  1. G.

    Trust

Trust will be a major concern in VANET-based clouds. Since a considerable number of VANET applications would need to either store the data at the cloud or retrieve data from the cloud, in such case the privacy-critical data storage at cloud would need effective countermeasures. If the government authorities are not the cloud service providers, then the third party cloud service provider might be a vulnerability point as well.

  1. H.

    Location Security and Privacy

Location security is a challenge in VANET-based clouds and its parental VANET as well, but it gets worse in VANET-based clouds because of the nature of services provided by this technology. Most of the VANET-based clouds applications demand accurate location information from users. The users’ location information is used for service provisioning. However adversaries, with enough resources, can manipulate location information to construct users’ movement profiles. That is why in order to stimulate active participation from the users, their location security and privacy must be preserved.

7 Conclusions and Future Directions

In this paper, we put forth the vision of combining two emergent fields, VANET and cloud computing. In the recent past, the core idea of vehicular clouds was suggested for the first time in the literature but to date, architectural framework for VANET-based clouds has not been proposed. To this end, only application is emphasized in vehicular clouds environment. To the best of our knowledge, ours is the first effort to suggest a concrete VANET clouds architecture from services standpoint. A brief taxonomy of VANET clouds is outlined. We divide VANET clouds into three architectural frameworks namely Vehicular Clouds (VC), Vehicles using Clouds (VuC), and Hybrid Vehicular Clouds (HVC). In order to better understand our framework, we take cloud-based traffic information dissemination as a use-case. Our simulation results show that the traffic information dissemination through clouds is feasible and offer acceptable throughput with phenomenal information reception rate thereby improving VANET application functionality. It is also to be noted, that by leveraging cloud computing infrastructure for information dissemination, complex and computation and communication-expensive multi-hop communication can be avoided. Moreover we also put light on the security challenges unique to VANET clouds. In the future, we want to derive the optimized values for different frequencies of movement vectors and the traffic information messages of the VANET traffic view application. Additionally we intend to cover more services offered by the VANET-based clouds.