IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 9, SEPTEMBER 2020 6203 TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud Mohammad N. Aladwan, Feras M. Awaysheh , Sadi Alawadi, Mamoun Alazab , Senior Member, IEEE, Tomás F. Pena , Senior Member, IEEE, and José C. Cabaleiro AbstractThe integration between cloud computing and vehicular ad hoc networks, namely, vehicular clouds (VCs), has become a significant research area. This integration was proposed to accelerate the adoption of intelligent transportation systems. The trustworthiness in VCs is ex- pected to carry more computing capabilities that manage large-scale collected data. This trend requires a security evaluation framework that ensures data privacy protection, integrity of information, and availability of resources. To the best of our knowledge, this is the first study that proposes a robust trustworthiness evaluation of vehicular cloud for security criteria evaluation and selection. This article proposes three-level security features in order to develop effectiveness and trustworthiness in VCs. To as- sess and evaluate these security features, our evaluation framework consists of three main interconnected compo- nents: 1) an aggregation of the security evaluation values of the security criteria for each level; 2) a fuzzy multicriteria decision-making algorithm; and 3) a simple additive weight associated with the importance-performance analysis and performance rate to visualize the framework findings. The evaluation results of the security criteria based on the aver- age performance rate and global weight suggest that data residency, data privacy, and data ownership are the most pressing challenges in assessing data protection in a VC environment. Overall, this article paves the way for a se- cure VC using an evaluation of effective security features and underscores directions and challenges facing the VC community. This article sheds light on the importance of Manuscript received August 19, 2019; revised November 9, 2019 and December 18, 2019; accepted January 6, 2020. Date of publication January 13, 2020; date of current version May 26, 2020. This work was supported in part by the Ministry of Education, Culture, and Sport, Gov- ernment of Spain under Grant TIN2016-76373-P, in part by the Xunta de Galicia Accreditation 2016–2019 under Grant ED431G/08 and Grant ED431C 2018/2019, and in part by the European Union under the Euro- pean Regional Development Fund. Paper no. TII-19-3810. (Mohammad N. Aladwan and Feras M. Awaysheh are co-first authors.) (Correspond- ing author: Mamoun Alazab.) M. N. Aladwan, F. M. Awaysheh, T. F. Pena, and J. C. Cabaleiro are with the Centro Singular de Investigación en Tecnoloxías Intelix- entes, University of Santiago de Compostela, 15782 Santiago de Compostela, Spain (e-mail: m.alseran@gmail.com; feras.awaysheh@ usc.es; tf.pena@usc.es; jc.cabaleiro@usc.es). S. Alawadi is with the Department of Computer Science and Media Technology - Internet of Things and People Research Center, Depart- ment of Computer Science and Media Technology, Malmö University, 20506 Malmö, Sweden (e-mail: sadi.alawadi@mau.se). M. Alazab is with the College of Engineering, IT and Environ- ment, Charles Darwin University, Casuarina NT 0810, Australia (e-mail: alazab.m@ieee.org). Color versions of one or more of the figures in this article are available online at https://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TII.2020.2966288 security by design, emphasizing multiple layers of security when implementing industrial VCs. Index TermsDecision-making (DM), industrial con- nected vehicles (CVs), industrial Internet of Things (IIoT), security analysis, security by design, vehicular clouds (VCs). I. INTRODUCTION T HE vast amount of data generated by the Internet of Things (IoT), especially vehicular ad hoc networks (VANETs), needs a scalable resource, which can be provided by cloud computing on a rental basis. Accordingly, the cloud has attracted the most significant interest in IoT-based applications [1], [2], particularly vehicular clouds (VCs) [3]. The transmitted data in such a realm should be located securely throughout the whole life cycle to guarantee high data privacy. Security is a crucial aspect of spreading the adoption of cloud capabilities among industrial connected vehicles (CVs) [4] and industrial cyber-physical systems [5], [6]. In this regard, security by design can mitigate many of these imposed challenges [7]. Without adequately addressing this concern, a VC would not gain the clients’ trustworthiness and, hence, acceptance. This facility can be achieved by regularly evaluating the security components of the VC to put together an adequate plan of improvement. However, a dedicated work that evaluates the trustworthiness of this framework remains an open challenge. When a cloud-based CV system is realized, significant secu- rity concerns should be considered [8]–[10]. Security features (criteria) are not equal, which means that they should not be gov- erned and managed at the same level. It is essential to note the im- portance of creating a shared understanding of security-related criteria and be able to assign priorities based on each security criteria impact and potential for mitigation. These considerations include security by design of the system and utilization of underlying security technologies and services. This research captures security services used in industrial CVs that describe the VC security items and relationships among them. It also presents landscape techniques to define security gaps (distance from an ideal point of security) and best practices. This article aims at facilitating the realization of vehicles securely connected to cloud computing in an industrial environment. First, we analyze the security criteria of data analytics in VC computing and propose three-level security evaluation elements. Namely, Level 1 consists of six common security criteria (CSCs). Level 2 consist of ten security control components (SCCs). Level 3 1551-3203 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information. Authorized licensed use limited to: UNIVERSIDADE DE SANTIAGO. Downloaded on July 13,2020 at 10:31:32 UTC from IEEE Xplore. Restrictions apply.