Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: http://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2019, 7(1), 31-36
DOI: 10.12691/jcsa-7-1-5
Open AccessDesign

Efficient Data Privacy and Security in Autonomous Cars

Rushit Dave1, , Evelyn R Sowells Boone2 and Kaushik Roy1

1Department of Computer Science, North Carolina A&T State University, Greensboro, USA

2Department of Computer System Technology, North Carolina A&T State University, Greensboro, USA

Pub. Date: May 10, 2019

Cite this paper:
Rushit Dave, Evelyn R Sowells Boone and Kaushik Roy. Efficient Data Privacy and Security in Autonomous Cars. Journal of Computer Sciences and Applications. 2019; 7(1):31-36. doi: 10.12691/jcsa-7-1-5

Abstract

As the advancement and testing of self-driving auto innovation has advanced, the possibility of exclusive self-ruling vehicles working on open streets is nearing. Industry specialists foresee that self-governing vehicles will be financially accessible inside the following five to ten years. As automation becomes more prevalent in the transportation industry, driverless vehicles are appearing more frequently in the news. Asymmetric algorithms have shown their impact on large amount of data that have been secured by generating a public key. Cyber security is the major concern for any autonomous vehicle. The main contribution of this research is to secure data using an Asymmetric algorithm technique which will be saved in cloud storage.

Keywords:
automated cars privacy security RSA algorithm

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  N. Davis. New laser technology lets driverless cars see round corners Guardian (2018).https://www.theguardian.com/technology/2018/mar/05/self-driving-cars-may-soon-be-able-to-see-around-corners.
 
[2]  A. Halsey Driverless cars promise far greater mobility for the elderly and people with disabilities https://www.washingtonpost.com/local/trafficandcommuting/driverless-cars-promise-far-greater-mobility-for-the-elderly-and-people-with-disabilities/2017/11/23/6994469c-c4a3-11e7-84bc 5e285c7f4512_story.html?utm_term=.b5549509a7a4.
 
[3]  D. Wakabayashi. Self-driving Uber car kills Arizona pedestrian, where robots roam https://www.nytimes.com/2018/03/19/technology/uber-driverless-fatality.html.
 
[4]  Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, and Yan Huang. Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward Vincent. www.oblivious-storage.com.
 
[5]  Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Stoica, I. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58. Google Scholar, Crossref, ISI.
 
[6]  Daniel J Fagnant and Kara Kockelman. 2014. Preparing a nation for autonomous vehicles: opportunities, barriers and policy recommendations for capitalizing on self-driven vehicles. Transportation Research Board (2014).
 
[7]  D. J. Glancy. Privacy in autonomous vehicles. Santa Clara L. Rev., 52:1171, 2012.
 
[8]  The privacy implications of Autonomous vehicles By Norton Rose Fulbright on July 17, 2017. Posted in Compliance and risk management, Regulatory response.
 
[9]  Self-Driving Cars and Data Collection: Privacy Perceptions of Networked Autonomous Vehicles Cara Bloom Joshua Tan Javed Ramjohn Lujo Bauer Carnegie Mellon University.
 
[10]  J. Petit. Self-driving and connected cars: Fooling sensors and tracking drivers, 2015. https://www.blackhat.com/docs/eu-15/materials/eu-15-Petit-Self-Driving-And-Connected-CarsFooling-Sensors-And-Tracking-Drivers.pdf. Accessed March 2017.
 
[11]  RituTripathi, Sanjay Agrawal. “Comparative Study of Symmetric and Asymmetric Cryptography Techniques” International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 1, Issue 6, June 2014. ISSN 2348-4853.
 
[12]  Study on Symmetric and Asymmetric Cryptographic Techniques May Aye Chan Aung Myat Su Wai.
 
[13]  Alfred J Menezes, Paul C Oorschot, Scott A Vanstone, Handbook of Applied Cryptography, 2005
 
[14]  Lakshmi Neelima, M. Padma. A STUDY ON CLOUD STORAGE M. IJCSMC, Vol. 3, Issue. 5, May 2014, pg. 966-971.
 
[15]  BS ISO 5725-1: "Accuracy (trueness and precision) of measurement methods and results - Part 1: General principles and definitions", p.1 (1994).
 
[16]  Rivest, R.L. Response to NIST's proposal. Communications of ACM, 35, 1992, 41-47.
 
[17]  Kaliski, B., and Robshaw, M. The Secure Use of RSA. CryptoBytes, RSA Laboratories, (Autumn 1995), 7-13.
 
[18]  Koç, Ç. K. High-Speed RSA Implementation. Technical Report TR-201, version 2.0, RSA Laboratories, November 1994.