Abstract big data collection in large scale

Abstract : Internet of things is the network of devicesconnected to the Internet, including vehicle, wearable devices,and almost anything with a sensor on it. These things collectand exchange data.Internet of vehicles enables information exchange and contentsharing among vehicles. IoV offers several benefits such asroad safety, traffic efficiency, etc. by forwarding up-to-datetraffic information about upcoming traffic. And big datacollection can improve decision making, especially pathplanning in IoV. But malicious users in IoV may mislead thewhole communications. How to secure the big data collection inlarge scale IoV is meaningful and deserves researching.In an IoV architecture, initially vehicles need to register in thebig data centre to connect into the network. Afterward,vehicles associate with big data centre via mutualauthentication and single sign-on algorithm. The business datais transferred in plain text form while the confidential data istransferred in cipher text form. The collected big data will beprocessed using Hadoop architecture to achieve the unifiedmanagement.The benefits of IoV are, Global Internet ID-vehicles will haveIDs in cyberspace. Which will no doubt make the operation offalsely registered, smuggled, and illegally modified vehiclesmuch more difficult , Online vehicle status check, annualinspection, and monitoring etc., It will be possible to remotelydetermine a vehicle’s operational legality, regulatorycompliance, and license status of the driver, which will reducevehicle management costs, change industries, and save lives,Big Business Data- The cloud based integration ofheterogeneous networks with vehicular network would resultas a huge data resource. The resource could be utilized inproductive manner with wide range of businesses includingautomobile, Internet, insurance and market analysis.Keywords: Big data, Security, Data Collection, Internet ofVehicle, IoTI. INTRODUCTIONInternet of vehicles (IoV) is an integrated network based onvehicular ad hoc network. IoT Internet of things is thenetwork of devices connected to the Internet, includingvehicle, wearable devices, and almost anything with a sensoron it. These things collect and exchange data.IoV enables information exchange among vehicles. IoVoffers benefits such as traffic efficiency, road safety etc. byforwarding up-to-date traffic information about traffic. IoVachieves intelligent traffic management control, andintelligent dynamic. Big data collection can improve decisionmaking, especially path planning in IoV. And helps toanalyzes and solve the traffic problems, etc. But malicioususers in IoV may mislead the whole communications. Howto secure the big data collection in large scale IoV ismeaningful and deserves researching.In an IoV architecture, initially vehicles need to registerin the big data centre to connect into the network. Afterward,vehicles associate with big data centre via mutualauthentication and single sign-on algorithm. Different secureprotocols are needed for business data and confidential datacollection. The collected big data stored securely usingdistributed storage.The benefits of IoV are, Global Internet ID-vehicles willhave IDs in cyberspace. Which will no doubt make theoperation of falsely registered, smuggled, and illegallymodified vehicles much more difficult , Online vehicle statuscheck, annual inspection, and monitoring etc., It will bepossible to remotely determine a vehicle’s operationallegality, regulatory compliance, and license status of thedriver, which will reduce vehicle management costs, changeindustries, and save lives, Big Business Data- The cloudbased integration of heterogeneous networks with vehicularnetwork would result as a huge data resource. The resourcecould be utilized in productive manner with wide range ofbusinesses including automobile, Internet, insurance andmarket analysis.II. EXISTING SYSTEMRelated works include cryptographic hash chains toauthenticate Internet of vehicle users 2, security throughthird party authentication 3, security using cryptographictechnique and security through signature-basedauthentication 2 etc. Directly or indirectly many methodsuse cryptographic hash function to increase security.Cryptographic hash function is a mathematical algorithm thatmaps data of arbitrary size to a bit string of fixed size. Whichis a one way function. Only way to recreate the input from anideal cryptographic hash output is to attempt a brute forcesearch of possible inputs to see if they produce a match 8.However, the existing protocols in the related area cannot bedirectly applied in big data collection in large scale IoV. As aresult, the security and efficiency issue for big data collectionstill deserves research.III. DRAWBACKS? Less scalability:? The capability of a system, network, orprocess to handle a growing amount of workis less.? Data falsification attack:? Data can be falsified by unauthorized access.? High delay? Secure Data StorageIV. METHODOLOGYA. Single sign-onSingle sign-on (SSO) is a property of access control ofmultiple related, yet independent, software systems. Withthis property, a user logs in with a single ID and password togain access to a connected system or systems without usingdifferent usernames or passwords, or in some configurationsseamlessly sign on at each system.B. cryptographic hash functionA cryptographic hash function is a hash function whichtakes an input and returns a fixed size alphanumeric string.The string is called the ‘hash value’, ‘message digest’, ‘digest’or ‘checksum’.A hash function takes a string of any length as input andproduces a fixed length string which acts as a kind of”signature” for the data provided. In this way, a personknowing the “hash value” is unable to know the originalmessage, but only the person who knows the originalmessage can prove the “hash value” is created from thatmessage.C. Message Authentication CodeA message authentication code, It is similar to acryptographic hash, except that it is based on a secret key.When secret key information is included with the data that isprocessed by using a cryptographic hash function, the outputhash is known as HMAC.D. Digital SignaturesIf a cryptographic hash is created for a message, the hash isencrypted with private key of the sender. This resultant hashis called a digital signature.V. ADVANTAGES OF IOV• Global Internet ID :-vehicles will have IDs in cyberspace.Which will no doubt make the operation of falselyregistered, smuggled, and illegally modified vehicles muchmore difficult 4.• Vehicular status perception:– The GID features variousembedded sensors and connects with a vehicular bus, suchas OBD or the controller–area network, enabling it toperceive and monitor almost all static and dynamicvehicular information, including environmental and statusdiagnosisinformation.• Infrastructure as a Service :- Basic IoV-and traffic-relatedcomputing services are based on the cloud framework,including vehicle/traffic status data storage, area-basedvehicle monitoring/control, vehicle safety statusmonitoring/control, real-time traffic analysis, and accessbilling and settlement. Meanwhile, as a core capability, openAPIs are provided to any third-party application developerto help them rapidly build related application services.• Platform as a Service – Includes bulk GPS data and GIDdata processing, ITS holographic data processing, cloudstorage, information mining and analysis, informationsecurity, and data buses.• Software as a Service :– Through basic cloud services andthird-party service resources, any developer may createcertain applications that support IoV and ITS from variousterminals 9.VI. COMPARISONA SecureMechanismfor Big DataCollection inLarge ScaleIoV 1.On theSecurity ofInformationDisseminationin the IoV 2.Reliableemergencymessagedisseminationprotocolfor urban IoV6.StandardusedIEEE 802.11p IEEE 802.11p IEEE 802.11pAuthentication-vehicleSingle sign onalgorithmusessignatureUsing HashchainUsing HashchainDatatransmissionBusiness datatransferred inplain text formandconfidentialdatatransferred incipher textform.Plain text Plain textSecurity Uses signature,Hash messageAuthenticationcodeHash code Ready tobroadcast andclear toBroadcastemergencymessagehandshake.TransmissiondelayLow delay Delay reducedby reducingcontentionwindow sizeLess than100msVII. CONCLUSIONSIn the secure information collection scheme for big data inlarge scale IoV, Single sign-on algorithm for authenticationare utilized with improved efficiency. The business data istransferred in plain text form while the confidential data istransferred in cipher text form. The collected big data will beprocessed using Hadoop architecture to achieve the unifiedmanagement.Vehicles have IDs in cyberspace. Which willno doubt make the operation of falsely registered, smuggled,and illegally modified vehicles much more difficult.. Thecloud based integration of heterogeneous networks withvehicular network would result as a huge data resource. Theresource could be utilized in productive manner with widerange of businesses including automobile, Internet, insuranceand market analysis.