Article citationsMore >>

J. Petit. Self-driving and connected cars: Fooling sensors and tracking drivers, 2015. https://www.blackhat.com/docs/eu-15/materials/eu-15-Petit-Self-Driving-And-Connected-CarsFooling-Sensors-And-Tracking-Drivers.pdf. Accessed March 2017.

has been cited by the following article:

Article

Efficient Data Privacy and Security in Autonomous Cars

1Department of Computer Science, North Carolina A&T State University, Greensboro, USA

2Department of Computer System Technology, North Carolina A&T State University, Greensboro, USA


Journal of Computer Sciences and Applications. 2019, Vol. 7 No. 1, 31-36
DOI: 10.12691/jcsa-7-1-5
Copyright © 2019 Science and Education Publishing

Cite this paper:
Rushit Dave, Evelyn R Sowells Boone, Kaushik Roy. Efficient Data Privacy and Security in Autonomous Cars. Journal of Computer Sciences and Applications. 2019; 7(1):31-36. doi: 10.12691/jcsa-7-1-5.

Correspondence to: Rushit  Dave, Department of Computer Science, North Carolina A&T State University, Greensboro, USA. Email: rrdave@ncat.edu

Abstract

As the advancement and testing of self-driving auto innovation has advanced, the possibility of exclusive self-ruling vehicles working on open streets is nearing. Industry specialists foresee that self-governing vehicles will be financially accessible inside the following five to ten years. As automation becomes more prevalent in the transportation industry, driverless vehicles are appearing more frequently in the news. Asymmetric algorithms have shown their impact on large amount of data that have been secured by generating a public key. Cyber security is the major concern for any autonomous vehicle. The main contribution of this research is to secure data using an Asymmetric algorithm technique which will be saved in cloud storage.

Keywords