Edge computing in multi-scope service-oriented mobile healthcare systems
DOI:
https://doi.org/10.20535/SRIT.2308-8893.2019.1.09Keywords:
wireless sensor networks, personal health systems, cloud services, IoT, fog computing, service-oriented architecture (SOA), mHealth, communication, infrastructureAbstract
IoT based e-Health solutions is an upcoming trend which will revolutionize the healthcare in the near future. IoT has evolved from micro-electro-mechanical systems (MEMS), wireless technologies and Internet which together offer connectivity of systems, microelectronic devices, and medical services and allow data processing at the edge. That at the same time allows to save computational resources and avoid unnecessary point of failure, such as centralized synchronization point. Monitoring of patients’ vital signs parameters (measured at home) is achieved by using modern Internet of Things technology which provides networkable connections between portable diagnostic sensors, their cell phones, cloud data storage with patients’ Personal Health Records and professional health providers. This paper explores possibilities of using fog computing approach to shift data processing and computations from cloud to the edge and to build a multi-scope infrastructure for mHealth and citizen-observation system, based on SOA approach.References
Jones Jake. Edge Computing - The Cloud, The Fog And The Edge / Jake Jones. — Solidrun, 2017. — Avaliable at: https://www.solid-run.com/edge-computing-cloud-fog-edge/.
Rahmani Amir M. Fog Computing In The Internet Of Things / M. Rahmani Amir et al. — Cham, Springer, 2017. — 169.
Maier Martin. Context- And Self-Awareness In Fog And Mist Computing / Maier Martin, Mohammad Hossein Same. — 2017. — Avaliable at: http://www.zeitgeistlab.ca/doc/context_and_self_awareness_in_fog_and_mist_computing.html.
Solidrun. Fog And Mist Computing Levels. — 2017. — Avaliable at: https://www.solid-run.com/wp-content/uploads/2017/04/edge-computing-600x450.png.
Diogenes Yuri. Internet Of Things Security Architecture / Yuri Diogenes. — 2017. — Avaliable at: https://docs.microsoft.com/en-us/azure/iot-suite/iot-security-architecture.
Song Tianyi. A Privacy Preserving Communication Protocol For Iot Applications In Smart Homes / Tianyi Song // IEEE Internet Of Things Journal. — Vol 4, N. 6. — 2017. — P. 1844–1852. doi:10.1109/jiot.2017.2707489.
Global Structural Health Monitoring Market Demand, Growth & Revenue Opportunity (2016-2023). — 2017. — Avaliable at: https://www.researchnester.com/reports/structural-health-monitoring-market-global-demand-analysis-opportunity-outlook-2023/173.
CITI-SENSE: Development Of Sensor-Based Citizens’ Observatory Community For Improving Quality Of Life In Cities. — 2017. — Avaliable at: http://www.citi-sense.eu
Ericsson Mobility Report November 2017 – Ericsson. — 2017. — Avaliable at: https://www.ericsson.com/en/mobility-report/reports/november-2017.
World Population Prospects: The 2017 Revision, DVD Edition. — United Nations, Department of Economic and Social Affairs, Population Division, 2017. — Avaliable at: https://esa.un.org/unpd/wpp/Download/Standard/Population/
Secure Multiparty Computation. — 2017. — Avaliable at: https://partisia.com/secure-simple-efficient/
Secure Multiparty Computation. — 2017. — Avaliable at: https://partisia.com/secure-simple-efficient/
Prosanta Gope. BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network / Prosanta Gope, Tzonelih Hwang // IEEE Sensors Journal. — Vol 16, N 5. — 2016. — P. 1368–1376.
Bluetooth Topology Options. — 2017. — Avaliable at: https://www.bluetooth.com/bluetooth-technology/topology-options.
Grpc / Grpc Concepts. — 2017. — Avaliable at: https://grpc.io/docs/guides/concepts.html.
Zyskind G. Enigma: Decentralized Computation Platform with Guaranteed Privacy/ G. Zyskind, O. Nathan, A. Pentland. — arXiv:1506.03471v1 [cs.CR], Jun. 2015.
Stojmenovic Ivan. The Fog Computing Paradigm: Scenarios And Security Issues / Ivan Stojmenovic, Wen Sheng // Proceedings Of The 2014 Federated Conference On Computer Science And Information Systems, 2014. — P. 1–8. — IEEE, doi:10.15439/2014f503.
Damgrd Ivan. Practical covertly secure MPC for dishonest majorityor: Breaking the SPDZ limits / Ivan Damgrd et al. // Computer SecurityESORICS 2013. Springer Berlin Heidelberg, 2013. — P. 1–18.
Petrenko A. Blockchain as a service for medical records / A. Petrenko, R. Kyisliy, I. Pysmennyi // System Research & Information Technologies. — 2017. —N 1. — P. 7–11.
Baidu Mobile Deep Learning. — 2017. — Avaliable at: https://github.com/baidu/mobile-deep-learning.
Weisstein Eric W. Moving Average / Eric W. Weisstein // Wolfram MathWorld. — 2017. — Avaliable at: http://mathworld.wolfram.com/MovingAverage.html
Petrenko A. Human Respiration Pattern Detection Using Deep Convolutional Neural Networks / A. Petrenko, R. Kyslyi, I. Pysmennyi // Eastern-European Journal of Enterprise Technologies. — 2018. — N 4. — P. 6–13.