Research and Application of Active Security Protection Methods for Automotive Cloud
Main Article Content
Abstract
With the gradual maturity of the Internet of vehicles and cloud computing industry and the continuous evolution of network
attack forms, the demand for cloud security in the automotive industry will increase year by year. In the automobile cloud platform
environment, because the traditional security scheme is still effective for the north-south traffic, the security problem of the automobile
cloud platform mainly lies in the security protection of the east-west traffic of the platform and the division of the security boundary.
The purpose of this project is to solve the security risk of east-west cross-subnet traffic of the automobile cloud platform, especially
the traffic security problem between hosts, in order to provide the next generation firewall, intrusion prevention and other professional
security protection functions for the virtual network environment without affecting the service virtual machine. In order to achieve the
above purpose, it is necessary to solve the problem of virtual switch diversion and virtual machine drift on the cloud platform, study
the service security requirements of the automotive cloud platform, the relationship between data transfer and processing on the cloud
platform, and finally provide a prototype system of active security protection for the cloud platform risks. The system implements VM
microisolation, network attack defense, malicious code defense, ip address-based secure access policies, application-type secure access
policies, and VM migration security functions in cloud application scenarios.
Article Details
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
References
Abdullayeva F. Cyber resilience and cyber security issues of intelligent cloud computing systems. Results in Control and
Optimization, 2023, 12: 100268.
Younis Y A, Kifayat K. Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University,
United Kingdom, Tech. Rep, 2013: 599-610.
Yang fei, Hong yun. Research on the construction of cloud computing network information security protection system.
omniscient, 2022, 4(5): 74-76.
Ke L. Network information security technology based on cloud computing environment. Journal of Electronics and
Information Science, 2023, 8(2): 57-62.
Wang qi. The application of total traffic analysis technology in network threat perception and security incident response.
Proceedings of the China Network Security Hierarchical Protection and Critical Information Infrastructure Protection
Conference, 2019.
J. Electrical Systems 20-2 (2024): 80-87
Yaoqi. Research and application of regional boundary protection model based on trusted computing. Information Security
and Technology, 2010 (6): 71-75.
Sheik S A, Muniyandi A P. Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A
review. Cyber Security and Applications, 2023, 1: 100002.
Burkacky O, Deichmann J, Doll G, et al. Rethinking car software and electronics architecture. McKinsey & Company, 2018:
Tan H, Choi D, Kim P, et al. Comments on “dual authentication and key management techniques for secure data transmission
in vehicular ad hoc networks”. IEEE Transactions on Intelligent Transportation Systems, 2017, 19(7): 2149-2151.
Kaplan E. D., Hegarty C. J. Understanding GPS: Principles and Applications[M], 2nd ed.,Artech House, 2006