Fog Integrated Secured and Distributed Environment for Healthcare Industry with Software Defined Networking
DOI:
https://doi.org/10.31185/wjcm.Vol1.Iss1.5Abstract
Fog computing is a segment of cloud computing where a vast number of peripheral equipment links to the internet. The term "fog" indicates the edges of a cloud in which high performance can be achieved. Many of these devices will generate voluminous raw data as from sensors, and rather than forward all this data to cloud-based servers to be processed, the idea behind fog computing is to do as much processing as possible using computing units co-located with the data-generating devices, so that processed rather than raw data is forwarded, and bandwidth requirements are reduced. A major advantage of processing locally is that data is more often used for the same computation machine which produced the data. Also, the latency between data production and data consumption was reduced. This example is not fully original, since specially programmed hardware has long been used for signal processing. The work presents the integration of software defined networking with the association of fog environment to have the cavernous implementation patterns in the health care industry with higher degree of accuracy.
References
F. C. Chang and H. C. Huang, “A survey on intelligent sensor network and its applications,” Journal of Network Intelligence, vol. 1, no. 1, pp. 1–15, 2016.
J. S. Pan, L. Kong, T. W. Sung, P. W. Tsai, and V. Snasel, “Alpha-fraction first strategy for hierarchical wireless sensor networks,” Journal of Internet Technology, vol. 19, no. 6, pp. 1717–1726, 2018.
J. Wang, Y. Gao, K. Wang, A. K. Sangaiah, and S. J. Lim, “An affinity propagation-based self-adaptive clustering method for wireless sensor networks,” Sensors, vol. 19, no. 11, pp. 2579–2579, 2019.
Z. G. Du, J. S. Pan, S. C. Chu, H. J. Luo, and P. Hu, “Quasi-affine transformation evolutionary algorithm with communication schemes for application of RSSI in wireless sensor networks,” IEEE Access, vol. 8, pp. 8583–8594, 2020.
J. Wang, Y. Gao, C. Zhou, R. S. Sherratt, and L. Wang, “Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs,” Computers, Materials & Continua, vol. 62, no. 2, pp. 695–711, 2020.
H. Alemdar and C. Ersoy, “Wireless sensor networks for healthcare: a survey,” Computer Networks, vol. 54, no. 15, pp. 2688–2710, 2010.
T. N. Gia, M. Jiang, A. M. Rahmani, T. Westerlund, P. Liljeberg, and H. Tenhunen, “Fog computing in healthcare internet of things: a case study on ECG feature extraction,” in Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), pp. 356–363, IEEE, 2015.
B. Farahani, F. Firouzi, V. Chang, M. Badaroglu, N. Constant, and K. Mankodiya, “Towards fog-driven IoT ehealth: promises and challenges of IoT in medicine and healthcare,” Future Generation Computer Systems, vol. 78, pp. 659–676, 2018.
M. Rahmani, T. N. Gia, and B. Negash, “Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach,” Future Generation Computer Systems, vol. 78, pp. 641–658, 2018.
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing ACM, pp. 13–16, 2012.
S. Yi, Z. Qin, and Q. Li, “Security and privacy issues of fog computing: a survey,” in Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer (Science, K. Xu, and H. Zhu, eds.), vol. 9204, pp. 685–695, Springer, 2015.
C. Huang, R. Lu, and K.-K. R. Choo, “Vehicular fog computing: architecture, use case, and security and forensic challenges,” IEEE
Communications Magazine, vol. 55, no. 11, pp. 105–111, 2017.
O. Osanaiye, S. Chen, Z. Yan, R. Lu, K.-K. R. Choo, and M. Dlodlo, “From cloud to fog computing: a review and a conceptual live vm migration framework,” IEEE Access, vol. 5, pp. 8284–8300, 2017.
A. Alrawais, C. Alhothaily, X. Hu, and Cheng, “Fog computing for the internet of things: security and privacy issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34–42, 2017.
H. Xiong, Y. Wu, C. Jin, and S. Kumari, “Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT,” IEEE Internet of Things Journal.
H. Xiong, Y. Zhao, and Y. Hou, “Heterogeneous signcryption with equality test for IIoT environment,” IEEE Internet of Things Journal.
Z. Meng, J. S. Pan, and K. K. Tseng, “PaDE: an enhanced differential evolution algorithm with novel control parameter adaptation schemes for numerical optimization,” Knowledge-Based Systems, vol. 168, pp. 80–99, 2019.
H. Gupta, A. V. Dastjerdi, S. K. Ghosh, and R. Buyya iFogSim: A Toolkit for Modeling and Simulation of Resource Management Techniques in Internet of Things, Edge and Fog Computing Environments.
Q. Tian, S. C. Chu, J. S. Pan, H. Cui, and W. M. Zheng, “A compact pigeon-inspired optimization for maximum short-term generation mode in cascade hydroelectric power station,” Sustainability, vol. 12, no. 3, pp. 767–767, 2020.
S. C. Chu, X. Xue, J. S. Pan, and X. Wu, “Optimizing ontology alignment in vector space,” Journal of Internet Technology, vol. 21, no. 1, pp. 15–22, 2020.
Y. Huang, M. Hsieh, H. Chao, S. Hung, and J. Park, “Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400–411, 2009.
J. S. Pan, X. X. Sun, S. C. Chu, A. Abraham, and B. Yan, “Digital watermarking with improved SMS applied for QR code,” Engineering Applications of Artificial Intelligence, vol. 97, 2021
R. Tso, “Two-in-one oblivious signatures,” Future Generation Computer Systems, vol. 101, pp. 467–475, 2019.
T. Y. Wu, C. M. Chen, K. H. Wang, C. Meng, and E. K. Wang, “A provably secure certificateless public key encryption with keyword search,” Journal of the Chinese Institute of Engineers, vol. 42, no. 1, pp. 20–28, 2019.
J. Zhang, H. Liu, and L. Ni, “A secure energy-saving communication and encrypted storage model based on RC4 for EHR,” IEEE Access, vol. 8, pp. 38995–39012, 2020.
J. M. Wu, G. Srivastava, A. Jolfaei, P. Fournier-Viger, and J. C.-W. Lin, “Hiding sensitive information in eHealth datasets,” Future Generation Computer Systems, vol. 117, pp. 169–180, 2021
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Jamal Kh-madhloom
This work is licensed under a Creative Commons Attribution 4.0 International License.