h2 { margin-top: 0.21cm; margin-bottom: 0.11cm; text-align: left; page-break-inside:

h2 { margin-top: 0.21cm; margin-bottom: 0.11cm; text-align: left; page-break-inside: avoid; }h2.western { font-family: “Liberation Serif”, serif; font-size: 12pt; font-style: italic; font-weight: normal; }h2.

cjk { font-family: “Noto Sans CJK SC Regular”; font-size: 10pt; font-style: italic; font-weight: normal; }h2.ctl { font-family: “FreeSans”; font-size: 12pt; font-style: italic; font-weight: normal; }h1 { margin-top: 0.28cm; margin-bottom: 0.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

14cm; font-variant: small-caps; page-break-inside: avoid; }h1.western { font-family: “Liberation Serif”, serif; font-size: 12pt; font-weight: normal; }h1.cjk { font-size: 10pt; font-weight: normal; }h1.ctl { font-size: 12pt; font-weight: normal; }p { margin-bottom: 0.25cm; line-height: 120%; }Abstract: Internet of things is the network of devices connected to theInternet, including vehicle, wearable devices, and almost anythingwith a sensor on it. These things collect and exchange data. Internetof vehicles enables information exchange and content sharing amongvehicles. IoV offers several benefits such as road safety, trafficefficiency, etc.

by forwarding up-to-date traffic information aboutupcoming traffic. And big data collection can improve decisionmaking, especially path planning in IoV. But malicious users in IoVmay mislead the whole communications. How to secure the big datacollection in large scale IoV is meaningful and deserves researching.Inan IoV architecture, initially vehicles need to register in the bigdata centre to connect into the network.

Afterward, vehiclesassociate with big data centre via mutual authentication and singlesign-on algorithm. The business data is transferred in plain textform while the confidential data is transferred in cipher text form.The collected big data will be processed using Hadoop architecture toachieve the unified management. Thebenefits of IoV are, Global Internet ID-vehicles will have IDs incyberspace. Which will no doubt make the operation of falselyregistered, smuggled, and illegally modified vehicles much moredifficult , Online vehicle status check, annual inspection, andmonitoring etc.

, It will be possible to remotely determine avehicle’s operational legality, regulatory compliance, and licensestatus of the driver, which will reduce vehicle management costs,change industries, and save lives, Big Business Data- The cloud basedintegration of heterogeneous networks with vehicular network wouldresult as a huge data resource. The resource could be utilized inproductive manner with wide range of businesses including automobile,Internet, insurance and market analysis.Keywords:Big data, Security, Data Collection, Internet of Vehicle, IoTIntroduction Internetof vehicles (IoV) is an integrated network based on vehicular ad hocnetwork. IoT Internet of things is the network of devices connectedto the Internet, including vehicle, wearable devices, and almostanything with a sensor on it.

These things collect and exchange data.IoVenables information exchange among vehicles. IoV offers benefitssuch as traffic efficiency, road safety etc. by forwarding up-to-datetraffic information about traffic.

IoV achieves intelligent trafficmanagement control, and intelligent dynamic. Big data collection canimprove decision making, especially path planning in IoV. And helpsto analyzes and solve the traffic problems, etc.

But malicious usersin IoV may mislead the whole communications. How to secure the bigdata collection in large scale IoV is meaningful and deservesresearching. Inan IoV architecture, initially vehicles need to register in the bigdata centre to connect into the network. Afterward, vehiclesassociate with big data centre via mutual authentication and singlesign-on algorithm. Different secure protocols are needed for businessdata and confidential data collection. The collected big data storedsecurely using distributed storage.

Thebenefits of IoV are, Global Internet ID-vehicles will have IDs incyberspace. Which will no doubt make the operation of falselyregistered, smuggled, and illegally modified vehicles much moredifficult , Online vehicle status check, annual inspection, andmonitoring etc., It will be possible to remotely determine avehicle’s operational legality, regulatory compliance, and licensestatus of the driver, which will reduce vehicle management costs,change industries, and save lives, Big Business Data- The cloud basedintegration of heterogeneous networks with vehicular network wouldresult as a huge data resource. The resource could be utilized inproductive manner with wide range of businesses including automobile,Internet, insurance and market analysis.

EXISTINGSYSTEM Relatedworks include cryptographic hash chains to authenticate Internet ofvehicle users 2, security through third party authentication 3,security using cryptographic technique and security throughsignature-based authentication 2 etc. Directly or indirectly manymethods use cryptographic hash function to increase security. Cryptographichash function is a mathematical algorithm that maps data of arbitrarysize to a bit string of fixed size. Which is a one way function. Onlyway to recreate the input from an ideal cryptographic hash output isto attempt a brute force search of possible inputs to see if theyproduce a match 8.

However,the existing protocols in the related area cannot be directly appliedin big data collection in large scale IoV. As a result, the securityand efficiency issue for big data collection still deserves research.DRAWBACKS Less scalability: The capability of a system, network, or process to handle a growing amount of work is less. Data falsification attack: Data can be falsified by unauthorized access. High delay Secure Data Storage METHODOLOGYSinglesign-onSinglesign-on (SSO) is a property of access control of multiple related,yet independent, software systems. With this property, a user logs inwith a single ID and password to gain access to a connected system orsystems without using different usernames or passwords, or in someconfigurations seamlessly sign on at each system.

cryptographic hashfunction  Acryptographic hash function is a hash function which takes an input and returns a fixed size alphanumeric string. The string is calledthe ‘hash value’, ‘message digest’, ‘digest’ or ‘checksum’.Ahash function takes a string of any length as input and produces afixed length string which acts as a kind of “signature” forthe data provided. In this way, a person knowing the “hashvalue” is unable to know the original message, but only theperson who knows the original message can prove the “hash value”is created from that message.

MessageAuthentication CodeAmessage authentication code, It is similar to a cryptographic hash,except that it is based on a secret key. When secret key informationis included with the data that is processed by using a cryptographichash function, the output hash is known as HMAC.DigitalSignaturesIfa cryptographic hash is created for a message, the hash is encryptedwith private key of the sender. This resultant hash is called adigital signature.ADVANTAGESOF IOV• GlobalInternet ID :-vehicles will have IDs in cyberspace.

Which will nodoubt make the operation of falsely registered, smuggled, andillegally modified vehicles much more difficult 4. • Vehicularstatus perception:– The GID features various embedded sensors andconnects with a vehicular bus, such as OBD or the controller–areanetwork, enabling it to perceive and monitor almost all static anddynamic vehicular information, including environmental andstatus-diagnosis information. • Infrastructureas a Service :- Basic IoV-and traffic-related computing services arebased on the cloud framework, including vehicle/traffic status datastorage, area-based vehicle monitoring/control, vehicle safety statusmonitoring/control, real-time traffic analysis, and access billingand settlement. Meanwhile, as a core capability, open APIs areprovided to any third-party application developer to help themrapidly build related application services. • Platformas a Service – Includes bulk GPS data and GID data processing, ITSholographic data processing, cloud storage, information mining andanalysis, information security, and data buses. • Softwareas a Service :– Through basic cloud services and third-partyservice resources, any developer may create certain applications thatsupport IoV and ITS from various terminals 9.

COMPARISON h1 { margin-top: 0.28cm; margin-bottom: 0.14cm; font-variant: small-caps; page-break-inside: avoid; }h1.western { font-family: “Liberation Serif”, serif; font-size: 12pt; font-weight: normal; }h1.cjk { font-size: 10pt; font-weight: normal; }h1.

ctl { font-size: 12pt; font-weight: normal; }p { margin-bottom: 0.25cm; line-height: 120%; }CONCLUSIONSInthe secure information collection scheme for big data in large scaleIoV, Single sign-on algorithm for authentication are utilized withimproved efficiency. The business data is transferred in plain textform while the confidential data is transferred in cipher text form.The collected big data will be processed using Hadoop architecture toachieve the unified management.

Vehicles have IDs in cyberspace.Which will no doubt make the operation of falsely registered,smuggled, and illegally modified vehicles much more difficult..The cloud based integration of heterogeneous networks withvehicular network would result as a huge data resource.

The resourcecould be utilized in productive manner with wide range of businessesincluding automobile, Internet, insurance and market analysis.