Skip to main content
Erschienen in: The Journal of Supercomputing 10/2016

01.10.2016

Health Fog: a novel framework for health and wellness applications

verfasst von: Mahmood Ahmad, Muhammad Bilal Amin, Shujaat Hussain, Byeong Ho Kang, Taechoong Cheong, Sungyoung Lee

Erschienen in: The Journal of Supercomputing | Ausgabe 10/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the past few years the role of e-health applications has taken a remarkable lead in terms of services and features inviting millions of people with higher motivation and confidence to achieve a healthier lifestyle. Induction of smart gadgetries, people lifestyle equipped with wearables, and development of IoT has revitalized the feature scale of these applications. The landscape of health applications encountering big data need to be replotted on cloud instead of solely relying on limited storage and computational resources of handheld devices. With this transformation, the outcome from certain health applications is significant where precise, user-centric, and personalized recommendations mimic like a personal care-giver round the clock. To maximize the services spectrum from these applications over cloud, certain challenges like data privacy and communication cost need serious attention. Following the existing trend together with an ambition to promote and assist users with healthy lifestyle we propose a framework of Health Fog where Fog computing is used as an intermediary layer between the cloud and end users. The design feature of Health Fog successfully reduces the extra communication cost that is usually found high in similar systems. For enhanced and flexible control of data privacy and security, we also introduce the cloud access security broker (CASB) as an integral component of Health Fog where certain polices can be implemented accordingly. The modular framework design of Health Fog is capable of engaging data from multiple resources together with adequate level of security and privacy using existing cryptographic primitives.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Depending upon the nature of proposed framework we will refer Fog computing as Health Fog.
 
Literatur
8.
Zurück zum Zitat Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, pp 13–16 Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, pp 13–16
10.
Zurück zum Zitat HP cloud access security protection platform. Business white paper : Case for a cloud access security brokers. hp.com/go/CloudAccessSecurity, (2015) HP cloud access security protection platform. Business white paper : Case for a cloud access security brokers. hp.com/go/CloudAccessSecurity, (2015)
11.
Zurück zum Zitat Fischlin M (2001) A cost-effective pay-per-multiplication comparison method for millionaires. In: Topics in Cryptology CT-RSA 2001, Springer. pp 457–471 Fischlin M (2001) A cost-effective pay-per-multiplication comparison method for millionaires. In: Topics in Cryptology CT-RSA 2001, Springer. pp 457–471
12.
Zurück zum Zitat Sweeney Latanya (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl Based Syst 10(05):571–588MathSciNetCrossRefMATH Sweeney Latanya (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl Based Syst 10(05):571–588MathSciNetCrossRefMATH
13.
Zurück zum Zitat Sweeney Latanya (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570MathSciNetCrossRefMATH Sweeney Latanya (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570MathSciNetCrossRefMATH
14.
Zurück zum Zitat Evdokimov S, Günther O (2007) Encryption techniques for secure database outsourcing. In: Computer Security–ESORICS 2007, Springer, pp 327–342 Evdokimov S, Günther O (2007) Encryption techniques for secure database outsourcing. In: Computer Security–ESORICS 2007, Springer, pp 327–342
15.
Zurück zum Zitat De Capitani S, Di Vimercati FS, Jajodia S, Paraboschi S, Samarati P (2007) A data outsourcing architecture combining cryptography and access control. In: Proceedings of the 2007 ACM workshop on Computer security architecture, ACM, pp 63–69 De Capitani S, Di Vimercati FS, Jajodia S, Paraboschi S, Samarati P (2007) A data outsourcing architecture combining cryptography and access control. In: Proceedings of the 2007 ACM workshop on Computer security architecture, ACM, pp 63–69
16.
Zurück zum Zitat Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N (2011) Relational cloud: a database-as-a-service for the cloud Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N (2011) Relational cloud: a database-as-a-service for the cloud
18.
Zurück zum Zitat Shi Y, Ding G, Wang H, Roman HE, Lu S (2015) The fog computing service for healthcare. In: 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), IEEE, pp 1–5 Shi Y, Ding G, Wang H, Roman HE, Lu S (2015) The fog computing service for healthcare. In: 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), IEEE, pp 1–5
19.
Zurück zum Zitat Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, pp 1–8 Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, pp 1–8
20.
Zurück zum Zitat Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW), IEEE, pp 125–128 Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW), IEEE, pp 125–128
21.
Zurück zum Zitat Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an iot recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp 325–329 Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an iot recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp 325–329
22.
Zurück zum Zitat Paillier P (2000) Trapdooring discrete logarithms on elliptic curves over rings. In: Okamoto T (ed) Advances in CryptologyASI—ACRYPT 2000. Springer, Berlin, Heidelberg, pp 573–584 Paillier P (2000) Trapdooring discrete logarithms on elliptic curves over rings. In: Okamoto T (ed) Advances in CryptologyASI—ACRYPT 2000. Springer, Berlin, Heidelberg, pp 573–584
23.
Zurück zum Zitat Paillier P (1999) Public key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT’99, Springer-Verlag, Berlin, Heidelberg, pp 223–238 Paillier P (1999) Public key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT’99, Springer-Verlag, Berlin, Heidelberg, pp 223–238
24.
Zurück zum Zitat Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS (2010) A cloud computing solution for patient’s data collection in health care institutions. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10, IEEE, pp. 95–99 Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS (2010) A cloud computing solution for patient’s data collection in health care institutions. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10, IEEE, pp. 95–99
25.
Zurück zum Zitat Chen Y, Shen W, Huo H, Xu Y (2010) A smart gateway for health care system using wireless sensor network. In: 2010 Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM), IEEE, pp 545–550 Chen Y, Shen W, Huo H, Xu Y (2010) A smart gateway for health care system using wireless sensor network. In: 2010 Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM), IEEE, pp 545–550
26.
Zurück zum Zitat Laine TH, Lee C, Suk H (2014) Mobile gateway for ubiquitous health care system using zigbee and bluetooth. In: 014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2. IEEE, pp 139–145 Laine TH, Lee C, Suk H (2014) Mobile gateway for ubiquitous health care system using zigbee and bluetooth. In: 014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2. IEEE, pp 139–145
27.
Zurück zum Zitat Yang S, Gerla M (2011) Personal gateway in mobile health monitoring. In: 011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2. IEEE, pp 636–641 Yang S, Gerla M (2011) Personal gateway in mobile health monitoring. In: 011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2. IEEE, pp 636–641
28.
Zurück zum Zitat Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing. ACM, pp 15–20 Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing. ACM, pp 15–20
29.
Zurück zum Zitat Gia TN, Rahmani MJAM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet-of-things: a case study on ecg feature extraction Gia TN, Rahmani MJAM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet-of-things: a case study on ecg feature extraction
30.
Zurück zum Zitat Hussain J, Khan WA, Afzal M, Hussain M, Kang BH, Lee S (2014) Adaptive user interface and user experience based authoring tool for recommendation systems. In: Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. Springer, pp 136–142 Hussain J, Khan WA, Afzal M, Hussain M, Kang BH, Lee S (2014) Adaptive user interface and user experience based authoring tool for recommendation systems. In: Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. Springer, pp 136–142
Metadaten
Titel
Health Fog: a novel framework for health and wellness applications
verfasst von
Mahmood Ahmad
Muhammad Bilal Amin
Shujaat Hussain
Byeong Ho Kang
Taechoong Cheong
Sungyoung Lee
Publikationsdatum
01.10.2016
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 10/2016
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1634-x

Weitere Artikel der Ausgabe 10/2016

The Journal of Supercomputing 10/2016 Zur Ausgabe

Premium Partner