Research and Application of Active Security Protection Methods for Automotive Cloud

Main Article Content

Kexun He, Qiang Zhang, Baizheng Wang

Abstract

With the gradual maturity of the Internet of vehicles and cloud computing industry and the continuous evolution of network 
attack forms, the demand for cloud security in the automotive industry will increase year by year. In the automobile cloud platform 
environment, because the traditional security scheme is still effective for the north-south traffic, the security problem of the automobile 
cloud platform mainly lies in the security protection of the east-west traffic of the platform and the division of the security boundary. 
The purpose of this project is to solve the security risk of east-west cross-subnet traffic of the automobile cloud platform, especially 
the traffic security problem between hosts, in order to provide the next generation firewall, intrusion prevention and other professional 
security protection functions for the virtual network environment without affecting the service virtual machine. In order to achieve the 
above purpose, it is necessary to solve the problem of virtual switch diversion and virtual machine drift on the cloud platform, study 
the service security requirements of the automotive cloud platform, the relationship between data transfer and processing on the cloud 
platform, and finally provide a prototype system of active security protection for the cloud platform risks. The system implements VM 
microisolation, network attack defense, malicious code defense, ip address-based secure access policies, application-type secure access 
policies, and VM migration security functions in cloud application scenarios.

Article Details

Section
Articles
Author Biography

Kexun He, Qiang Zhang, Baizheng Wang

[1]Kexun He

2,*Qiang Zhang

3Baizheng Wang

 

 

[1] CATARC Automotive Test Center (Tianjin) Co., Ltd, Tianjin, China

2 CATARC Automotive Test Center (Tianjin) Co., Ltd, Tianjin, China

3 CATARC Automotive Test Center (Tianjin) Co., Ltd, Tianjin, China

*Corresponding author: Qiang Zhang

Copyright © JES 2024 on-line : journal.esrgroups.org

References

Abdullayeva F. Cyber resilience and cyber security issues of intelligent cloud computing systems. Results in Control and

Optimization, 2023, 12: 100268.

Younis Y A, Kifayat K. Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University,

United Kingdom, Tech. Rep, 2013: 599-610.

Yang fei, Hong yun. Research on the construction of cloud computing network information security protection system.

omniscient, 2022, 4(5): 74-76.

Ke L. Network information security technology based on cloud computing environment. Journal of Electronics and

Information Science, 2023, 8(2): 57-62.

Wang qi. The application of total traffic analysis technology in network threat perception and security incident response.

Proceedings of the China Network Security Hierarchical Protection and Critical Information Infrastructure Protection

Conference, 2019.

J. Electrical Systems 20-2 (2024): 80-87

Yaoqi. Research and application of regional boundary protection model based on trusted computing. Information Security

and Technology, 2010 (6): 71-75.

Sheik S A, Muniyandi A P. Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A

review. Cyber Security and Applications, 2023, 1: 100002.

Burkacky O, Deichmann J, Doll G, et al. Rethinking car software and electronics architecture. McKinsey & Company, 2018:

Tan H, Choi D, Kim P, et al. Comments on “dual authentication and key management techniques for secure data transmission

in vehicular ad hoc networks”. IEEE Transactions on Intelligent Transportation Systems, 2017, 19(7): 2149-2151.

Kaplan E. D., Hegarty C. J. Understanding GPS: Principles and Applications[M], 2nd ed.,Artech House, 2006