scholarly journals Implementation of Fog computing in IoT-based healthcare system

Author(s):  
Mirjana Maksimović

Nowhere do the technology advancements bring improvements than in the healthcare sector, constantly creating new healthcare applications and systems which completely revolutionize the healthcare domain. The appearance of Internet of Things (IoT) based healthcare systems has immensely improved quality and delivery of care, and significantly reduced the costs. At the same time, these systems generate the enormous amount of health-associated data which has to be properly gathered, analyzed and shared. The smart devices, as the components of IoT-driven healthcare systems, are not able to deal with IoT-produced data, neither data posting to the Cloud is the appropriate solution. To overcome smart devices’ and Cloud’s limitations the new paradigm, known as Fog computing, has appeared, where an additional layer processes the data and sends the results to the Cloud. Despite numerous benefits Fog computing brings into IoT-based environments, the privacy and security issues remain the main challenge for its implementation. The reasons for integrating the IoT-based healthcare system and Fog computing, benefits and challenges, as well as the proposition of simple low-cost system are presented in this paper.

Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2502
Author(s):  
Muneeb Ejaz ◽  
Tanesh Kumar ◽  
Ivana Kovacevic ◽  
Mika Ylianttila ◽  
Erkki Harjula

The rapid evolution of technology allows the healthcare sector to adopt intelligent, context-aware, secure, and ubiquitous healthcare services. Together with the global trend of an aging population, it has become highly important to propose value-creating, yet cost-efficient digital solutions for healthcare systems. These solutions should provide effective means of healthcare services in both the hospital and home care scenarios. In this paper, we focused on the latter case, where the goal was to provide easy-to-use, reliable, and secure remote monitoring and aid for elderly persons at their home. We proposed a framework to integrate the capabilities of edge computing and blockchain technology to address some of the key requirements of smart remote healthcare systems, such as long operating times, low cost, resilience to network problems, security, and trust in highly dynamic network conditions. In order to assess the feasibility of our approach, we evaluated the performance of our framework in terms of latency, power consumption, network utilization, and computational load, compared to a scenario where no blockchain was used.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


2021 ◽  
Author(s):  
Michael Enbibel

This research is done for optimizing telemedicine framework by using fogging or fog computing for smart healthcare systems. Fog computing is used to solve the issues that arise on telemedicine framework of smart healthcare system like Infrastructural, Implementation, Acceptance, Data Management, Security, Bottleneck system organization, and Network latency Issues. we mainly used Distributed Data Flow (DDF) method using fog computing in order to fully solve the listed issues.


Author(s):  
Akashdeep Bhardwaj

This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, thereby increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.


Internet-of-Things (IoT) has been considered as a fundamental part of our day by day existence with billions of IoT devices gathering information remotely and can interoperate within the current Internet framework. Fog computing is nothing but cloud computing to the extreme of network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in the Internet of Things (IoT). Fog computing allows the data storing and processing any nearby network devices or nearby cloud endpoint continuum. Using fog computing, the designer can reduce the computation architecture of the IoT devices. Unfortunitily, this new paradigm IoT-Fog faces numerous new privacy and security issues, like authentication and authorization, secure communication, information confidentiality. Despite the fact that the customary cloud-based platform can even utilize heavyweight cryptosystem to upgrade security, it can't be performed on fog devices drectly due to reseource constraints. Additionally, a huge number of smart fog devices are fiercely disseminated and situated in various zones, which expands the danger of being undermined by some pernicious gatherings. Trait Based Encryption (ABE) is an open key encryption conspire that enables clients to scramble and unscramble messages dependent on client qualities, which ensures information classification and hearty information get to control. Be that as it may, its computational expense for encryption and unscrambling stage is straightforwardly corresponding to the multifaceted nature of the arrangements utilized. The points is to assess the planning, CPU burden, and memory burden, and system estimations all through each phase of the cloud-to-things continuum amid an analysis for deciding highlights from a finger tapping exercise for Parkinson's Disease patients. It will be appeared there are confinements to the proposed testbeds when endeavoring to deal with upwards of 35 customers at the same time. These discoveries lead us to a proper conveyance of handling the leaves the Intel NUC as the most suitable fog gadget. While the Intel Edison and Raspberry Pi locate a superior balance at in the edge layer, crossing over correspondence conventions and keeping up a self-mending network topology for "thing" devices in the individual territory organize.


2019 ◽  
pp. 1927-1951
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


2018 ◽  
Vol 1 (1) ◽  
pp. 35-49 ◽  
Author(s):  
Akashdeep Bhardwaj

This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, thereby increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.


Inventions ◽  
2021 ◽  
Vol 6 (3) ◽  
pp. 45
Author(s):  
Prathamesh Churi ◽  
Ambika Pawar ◽  
Antonio-José Moreno-Guerrero

Background: According to the renowned and Oscar award-winning American actor and film director Marlon Brando, “privacy is not something that I am merely entitled to, it is an absolute prerequisite.” Privacy threats and data breaches occur daily, and countries are mitigating the consequences caused by privacy and data breaches. The Indian healthcare industry is one of the largest and rapidly developing industry. Overall, healthcare management is changing from disease-centric into patient-centric systems. Healthcare data analysis also plays a crucial role in healthcare management, and the privacy of patient records must receive equal attention. Purpose: This paper mainly presents the utility and privacy factors of the Indian healthcare data and discusses the utility aspect and privacy problems concerning Indian healthcare systems. It defines policies that reform Indian healthcare systems. The case study of the NITI Aayog report is presented to explain how reformation occurs in Indian healthcare systems. Findings: It is found that there have been numerous research studies conducted on Indian healthcare data across all dimensions; however, privacy problems in healthcare, specifically in India, are caused by prevalent complacency, culture, politics, budget limitations, large population, and existing infrastructures. This paper reviews the Indian healthcare system and the applications that drive it. Additionally, the paper also maps that how privacy issues are happening in every healthcare sector in India. Originality/Value: To understand these factors and gain insights, understanding Indian healthcare systems first is crucial. To the best of our knowledge, we found no recent papers that thoroughly reviewed the Indian healthcare system and its privacy issues. The paper is original in terms of its overview of the healthcare system and privacy issues. Social Implications: Privacy has been the most ignored part of the Indian healthcare system. With India being a country with a population of 130 billion, much healthcare data are generated every day. The chances of data breaches and other privacy violations on such sensitive data cannot be avoided as they cause severe concerns for individuals. This paper segregates the healthcare system’s advances and lists the privacy that needs to be addressed first.


2021 ◽  
Author(s):  
Michael Enbibel

This research is done for optimizing telemedicine framework by using fogging or fog computing for smart healthcare systems. Fog computing is used to solve the issues that arise on telemedicine framework of smart healthcare system like Infrastructural, Implementation, Acceptance, Data Management, Security, Bottleneck system organization, and Network latency Issues. we mainly used Distributed Data Flow (DDF) method using fog computing in order to fully solve the listed issues.


2020 ◽  
Vol 12 (5) ◽  
pp. 86
Author(s):  
Georgios Tsoumanis ◽  
Asterios Papamichail ◽  
Vasileios Dragonas ◽  
George Koufoudakis ◽  
Constantinos T. Angelis ◽  
...  

The emerging new paradigm under the fifth generation of wireless communications technologies (5G) and high expectations for massively expanding today’s Internet of Things (IoT) under 5G, are expected to support a large plurality of low-cost devices for an all-increasing number of new IoT applications. Many emerging IoT applications are going to take advantage of techniques and technologies that have high demands from low-cost devices in terms of processing large amounts of data and communication. For example, in systems based on fog computing technology, low-cost devices have to assign some of their limited resources for processing purposes. Considering the drawbacks emerging from using low-cost devices and the fact that many applications are in need for time-constrained approaches, TDMA-based Medium Access Control (MAC) policies need to be revisited and implemented in low-cost devices of today. In this sense, a policy independent of the underlying topology, TiMAC policy, is considered here and is implemented in low-cost devices using 433 MHz RF modules. Even though the implementation is limited by synchronization issues and a small number of nodes, the obtained experimental results demonstrate the potential for employing TDMA-based MAC policies on IoT systems consisting of low-cost devices.


Sign in / Sign up

Export Citation Format

Share Document