h2 avoid; }h2.western { font-family: “Times New Roman”,

h2 { margin-top: 0.21cm; margin-bottom: 0.11cm; direction: ltr; color: rgb(0, 0, 0); text-align: left; page-break-inside: avoid; }h2.western { font-family: “Times New Roman”, serif; font-size: 10pt; font-style: italic; font-weight: normal; }h2.cjk { font-family: “SimSun”, “??”; font-size: 10pt; font-style: italic; font-weight: normal; }h2.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; font-style: italic; font-weight: normal; }h1 { margin-top: 0.28cm; margin-bottom: 0.14cm; direction: ltr; font-variant: small-caps; color: rgb(0, 0, 0); text-align: center; page-break-inside: avoid; }h1.western { font-family: “Times New Roman”, serif; font-size: 10pt; font-weight: normal; }h1.cjk { font-family: “SimSun”, “??”; font-size: 10pt; font-weight: normal; }h1.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; font-weight: normal; }p { text-indent: 0.51cm; margin-bottom: 0.21cm; direction: ltr; color: rgb(0, 0, 0); letter-spacing: -0.1pt; line-height: 95%; text-align: justify; }p.western { font-family: “Times New Roman”, serif; font-size: 10pt; }p.cjk { font-family: “SimSun”, “??”; font-size: 10pt; }p.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; }

Abstract
: Internet of things is the network of devices connected to the
Internet, including vehicle, wearable devices, and almost anything
with a sensor on it. These things collect and exchange data.

Internet
of vehicles enables information exchange and content sharing among
vehicles. IoV offers several benefits such as road safety, traffic
efficiency, etc. by forwarding up-to-date traffic information about
upcoming traffic. And big data collection can improve decision
making, especially path planning in IoV. But malicious users in IoV
may mislead the whole communications. How to secure the big data
collection in large scale IoV is meaningful and deserves researching.

In an
IoV architecture, initially vehicles need to register in the big data
centre to connect into the network. Afterward, vehicles associate
with big data centre via mutual authentication and single sign-on
algorithm. The business data is transferred in plain text form while
the confidential data is transferred in cipher text form. The
collected big data will be processed using Hadoop architecture to
achieve the unified management.

The
benefits of IoV are, Global Internet ID-vehicles will have IDs in
cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult , Online vehicle status check, annual inspection, and
monitoring etc., It will be possible to remotely determine a
vehicle’s operational legality, regulatory compliance, and license
status of the driver, which will reduce vehicle management costs,
change industries, and save lives, Big Business Data- The cloud based
integration of heterogeneous networks with vehicular network would
result as a huge data resource. The resource could be utilized in
productive manner with wide range of businesses including automobile,
Internet, insurance and market analysis.

Keywords:
Big data, Security, Data Collection, Internet of Vehicle, IoT

I.Introduction

Internet of vehicles (IoV) is an integrated
network based on vehicular ad hoc network. IoT Internet of things is
the network of devices connected to the Internet, including vehicle,
wearable devices, and almost anything with a sensor on it. These
things collect and exchange data.

IoV enables information exchange among vehicles.
IoV offers benefits such as traffic efficiency, road safety etc. by
forwarding up-to-date traffic information about traffic. IoV
achieves intelligent traffic management control, and intelligent
dynamic. Big data collection can improve decision making, especially
path planning in IoV. And helps to analyzes and solve the traffic
problems, etc. But malicious users in IoV may mislead the whole
communications. How to secure the big data collection in large scale
IoV is meaningful and deserves researching.

In
an IoV architecture, initially vehicles need to register in the big
data centre to connect into the network. Afterward, vehicles
associate with big data centre via mutual authentication and single
sign-on algorithm. Different secure protocols are needed for business
data and confidential data collection. The collected big data stored
securely using distributed storage.

The
benefits of IoV are, Global Internet ID-vehicles will have IDs in
cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult , Online vehicle status check, annual inspection, and
monitoring etc., It will be possible to remotely determine a
vehicle’s operational legality, regulatory compliance, and license
status of the driver, which will reduce vehicle management costs,
change industries, and save lives, Big Business Data- The cloud based
integration of heterogeneous networks with vehicular network would
result as a huge data resource. The resource could be utilized in
productive manner with wide range of businesses including automobile,
Internet, insurance and market analysis.

II.EXISTING SYSTEM

Related works include cryptographic hash chains
to authenticate Internet of vehicle users 2, security through third
party authentication 3, security using cryptographic technique and
security through signature-based authentication 2 etc. Directly or
indirectly many methods use cryptographic hash function to increase
security.

Cryptographic hash function is a mathematical
algorithm that maps data of arbitrary size to a bit string of fixed
size. Which is a one way function. Only way to recreate the input
from an ideal cryptographic hash output is to attempt a brute force
search of possible inputs to see if they produce a match 8.

However, the existing protocols in the related
area cannot be directly applied in big data collection in large scale
IoV. As a result, the security and efficiency issue for big data
collection still deserves research.
III.DRAWBACKS

Less
scalability:

The
capability of a system, network, or process to handle a growing
amount of work is less.

Data
falsification attack:

Data can
be falsified by unauthorized access.

High
delay

Secure
Data Storage

IV.METHODOLOGY
A.Single
sign-on

Single sign-on (SSO) is a property of access
control of multiple related, yet independent, software systems. With
this property, a user logs in with a single ID and password to gain
access to a connected system or systems without using different
usernames or passwords, or in some configurations seamlessly sign on
at each system.
B.cryptographic hash
function 

A cryptographic hash function is a hash function
which takes an input and returns a fixed size alphanumeric string.
The string is called the ‘hash value’, ‘message digest’, ‘digest’ or
‘checksum’.

A hash function takes a string of any length as
input and produces a fixed length string which acts as a kind of
“signature” for the data provided. In this way, a person
knowing the “hash value” is unable to know the original
message, but only the person who knows the original message can prove
the “hash value” is created from that message.

C.Message Authentication
Code

A message authentication code, It is similar to a
cryptographic hash, except that it is based on a secret key. When
secret key information is included with the data that is processed by
using a cryptographic hash function, the output hash is known as
HMAC.

D.Digital Signatures

If a cryptographic hash is
created for a message, the hash is encrypted with private key of the
sender. This resultant hash is called a digital signature.

V.ADVANTAGES OF IOV

• Global Internet ID :-vehicles will have IDs
in cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult 4.

• Vehicular status perception:– The GID
features various embedded sensors and connects with a vehicular bus,
such as OBD or the controller–area network, enabling it to perceive
and monitor almost all static and dynamic vehicular information,
including environmental and status-diagnosis information.

• Infrastructure as a Service :- Basic IoV-and
traffic-related computing services are based on the cloud framework,
including vehicle/traffic status data storage, area-based vehicle
monitoring/control, vehicle safety status monitoring/control,
real-time traffic analysis, and access billing and settlement.
Meanwhile, as a core capability, open APIs are provided to any
third-party application developer to help them rapidly build related
application services.

• Platform as a Service – Includes bulk GPS
data and GID data processing, ITS holographic data processing, cloud
storage, information mining and analysis, information security, and
data buses.

• Software as a Service :– Through basic
cloud services and third-party service resources, any developer may
create certain applications that support IoV and ITS from various
terminals 9.

VI.COMPARISON

A
Secure Mechanism for Big Data Collection in Large Scale IoV 1.

On
the Security of Information

Dissemination
in the IoV 2.

Reliable
emergency message

dissemination
protocol

for
urban IoV 6.

Standard
used

IEEE
802.11p

IEEE
802.11p

IEEE
802.11p

Authentication-vehicle

Single
sign on algorithm- uses signature

Using
Hash chain

Using
Hash chain

Data
transmission

Business
data transferred in plain text form and confidential data
transferred in cipher text form.

Plain
text

Plain
text

Security

Uses
signature, Hash message Authentication code

Hash
code

Ready to
broadcast and clear to Broadcast emergency message handshake.

Transmission
delay

Low
delay

Delay
reduced by reducing contention window size

Less
than 100ms

VII.CONCLUSIONS

In the secure information collection scheme for
big data in large scale IoV, Single sign-on algorithm for
authentication are utilized with improved efficiency. The business
data is transferred in plain text form while the confidential data is
transferred in cipher text form. The collected big data will be
processed using Hadoop architecture to achieve the unified
management.Vehicles have IDs in cyberspace. Which will no doubt make
the operation of falsely registered, smuggled, and illegally modified
vehicles much more difficult.. The cloud
based integration of heterogeneous networks with vehicular network
would result as a huge data resource. The resource could be utilized
in productive manner with wide range of businesses including
automobile, Internet, insurance and market analysis.