Connected cars, cloud and cybersecurity

1 November 2019 Information Security

Autonomous, or self-driving cars will make driving safer, smarter and more efficient. Equipped with internet connections and often wireless local area networks, self-driving cars can speak to each other and the environment around them.


Prabashni Naidoo

Autonomous cars will include features such as lane assist, collision avoidance and automatic calls to emergency services to create a safer driving experience. One feature allows the cars to keep their distance and synchronise braking to avoid accidents. Some automotive brands are taking automation a step further, innovating to enable vehicles to communicate with nearby infrastructure and even pedestrians, adding a new dimension to how automation can benefit society.

To develop and deploy autonomous cars at scale, the right technology infrastructure is critical. Production of these vehicles requires high-performance computing capacity, along with seamless cybersecurity and the ability to manage vast data sets. This is why many organisations are taking advantage of the numerous benefits offered by the cloud, including cloud infrastructure’s reliability, scalability and security.

Training and testing

Autonomous cars strive to create vehicles that operate more safely than humans. Delivering on this ambition requires extensive modelling and testing. The ability to collect, store, and manage data is critical, as are advanced machine learning techniques.

Toyota Research Institute (TRI) believes that accurately training autonomous cars requires trillions of miles of testing. To deliver on this, it has a fleet of test cars equipped with Light Direction and Ranging (Lidar) Sensors to record data, collecting terabytes of data every day, needing quick retrieval and analyses.

TRI uses AWS to manage this data and access the processing power required to train machine learning models quickly. Using cloud infrastructure, it has gained the ability to spin up compute and storage resources on demand and blend these with management and orchestration services. TRI now retrains vehicle models, increases accuracy, and introduces new features faster. By following similar models, more automotive businesses will accelerate the development of safer cars.

Edging forward

Enabling autonomous cars to make rapid, data-driven decisions will make our roads safer. These machines need backing by reliable infrastructure with low latency and high availability. They also need to analyse information in real time, including data on road conditions, weather, and the behaviour of other vehicles. Applying AI allows the car to react swiftly and safely to road conditions.

Edge computing allows this core in-car technology to perform its in-car data crunching. When a second of lag can make the difference between a safe or dangerous response, autonomous vehicles do not have the luxury of waiting for data processing in the cloud. Therefore, organisations need to look for cloud providers with integrated edge solutions. These allow analysis of mission-critical data at the source and reducing the cost of transmitting additional data to the cloud.

Security in the cloud

Cybersecurity is important when developing safety-focused autonomous cars. Each vehicle becomes a new endpoint which must be secured. Protection from hackers and malware must be a top priority to ensure they cannot gain access to driving controls or the data that runs through each vehicle.

Autonomous car producers are turning to the cloud in order to support and run connected cars. It’s the job of the cloud provider to ensure cybersecurity updates and upgrades regularly happen. Additionally, the best cloud providers deliver automated security services which apply machine learning to proactively manage tasks including security assessments, threat detection, and policy management. By having security baked in, manufacturers can be confident that they have the solutions in place to detect new and emerging vulnerabilities and threats which will reduce harm to drivers and lower the risk of a breach.

Connected cars, cloud and security

Autonomous cars are our future; however to drive adoption, manufacturers must ensure they are secure and supported by robust infrastructure. Using the right cloud vendors is critical, enabling organisations to focus their resources on building differentiated automotive experiences, rather than managing IT infrastructure.

With this in mind, AWS provides a full suite of services to support autonomous vehicle development and deployment. AWS provides a full suite of services to support Advanced Driver Assistance Systems (ADAS) and Autonomous Vehicle development and deployment. AWS' nearly unlimited storage and compute capacity and support for deep learning frameworks such as Apache MXNet, TensorFlow and PyTorch accelerate algorithm training and testing. AWS Greengrass provides edge computing with machine learning inference capabilities for real-time processing of local rules and events in the vehicle while minimising the cost of transmitting data to the cloud. A combination of scalable storage and compute capacity and support for deep learning frameworks help accelerate testing and service development. At the same time, its agile platform helps businesses accelerate the pace of innovation, improve security posture and lower IT cost structure.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.