1
|
Asah FN, Kaasbøll JJ. Challenges and Strategies for Enhancing eHealth Capacity Building Programs in African Nations. J Pers Med 2023; 13:1463. [PMID: 37888074 PMCID: PMC10608493 DOI: 10.3390/jpm13101463] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/11/2023] [Revised: 09/28/2023] [Accepted: 09/28/2023] [Indexed: 10/28/2023] Open
Abstract
eHealth applications play a crucial role in achieving Universal Health Coverage. (1) Background: To ensure successful integration and use, particularly in developing and low/middle-income countries (LMIC), it is vital to have skilled healthcare personnel. The purpose of this study was to describe challenges that hinder capacity-building initiatives among healthcare personnel in developing and LMIC and suggest interventions to mitigate them. (2) Methods: Adopted a descriptive research design and gathered empirical data through an online survey from 37 organizations. (3) Results: The study found that in developing and LMIC, policymakers and eHealth specialists face numerous obstacles integrating and using eHealth including limited training opportunities. These obstacles include insufficient funds, inadequate infrastructure, poor leadership, and governance, which are specific to each context. The study suggests implementing continuous in-service training, computer-based systems, and academic modules to address these challenges. Additionally, the importance of having solid and appropriate eHealth policies and committed leaders were emphasized. (4) Conclusions: These findings are consistent with previous research and highlight the need for practical interventions to enhance eHealth capacity-building in LMICs. However, it should be noted that the data was collected only from BETTEReHEALTH partners. Therefore, the results only represent their respective organizations and cannot be generalized to the larger population.
Collapse
Affiliation(s)
- Flora Nah Asah
- HISP Centre, Department of Informatics, University of Oslo, Gaustadallen 30, 0373 Oslo, Norway;
| | | |
Collapse
|
2
|
Shorfuzzaman M. IoT-enabled stacked ensemble of deep neural networks for the diagnosis of COVID-19 using chest CT scans. COMPUTING 2023; 105. [PMCID: PMC8216100 DOI: 10.1007/s00607-021-00971-5] [Citation(s) in RCA: 3] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/15/2023]
Abstract
The ongoing COVID-19 (novel coronavirus disease 2019) pandemic has triggered a global emergency, resulting in significant casualties and a negative effect on socioeconomic and healthcare systems around the world. Hence, automatic and fast screening of COVID-19 infections has become an urgent need of this pandemic. Real-time reverse transcription polymerase chain reaction (RT-PCR), a commonly used primary clinical method, is expensive and time-consuming for skilled health professionals. With the aid of various AI functionalities and advanced technologies, chest CT scans may thus be a viable alternative for quick and automatic screening of COVID-19. At the moment, significant advances in 5G cellular and internet of things (IoT) technology are finding use in various applications in the healthcare sector. This study presents an IoT-enabled deep learning-based stacking model to analyze chest CT scans for effective diagnosis of COVID-19 encounters. At first, patient data will be obtained using IoT devices and sent to a cloud server during the data procurement stage. Then we use different fine-tuned CNN sub-models, which are stacked together using a meta-learner to detect COVID-19 infection from input CT scans. The proposed model is evaluated using an open access dataset containing both COVID-19 infected and non-COVID CT images. Evaluation results show the efficacy of the proposed stacked model containing fine-tuned CNNs and a meta-learner in detecting coronavirus infections using CT scans.
Collapse
Affiliation(s)
- Mohammad Shorfuzzaman
- Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944 Saudi Arabia
| |
Collapse
|
3
|
Zala K, Thakkar HK, Jadeja R, Dholakia NH, Kotecha K, Jain DK, Shukla M. On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:3804553. [PMID: 36035822 PMCID: PMC9410930 DOI: 10.1155/2022/3804553] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/27/2022] [Revised: 07/21/2022] [Accepted: 07/26/2022] [Indexed: 11/20/2022]
Abstract
Traditional healthcare services have changed into modern ones in which doctors can diagnose patients from a distance. All stakeholders, including patients, ward boy, life insurance agents, physicians, and others, have easy access to patients' medical records due to cloud computing. The cloud's services are very cost-effective and scalable, and provide various mobile access options for a patient's electronic health records (EHRs). EHR privacy and security are critical concerns despite the many benefits of the cloud. Patient health information is extremely sensitive and important, and sending it over an unencrypted wireless media raises a number of security hazards. This study suggests an innovative and secure access system for cloud-based electronic healthcare services storing patient health records in a third-party cloud service provider. The research considers the remote healthcare requirements for maintaining patient information integrity, confidentiality, and security. There will be fewer attacks on e-healthcare records now that stakeholders will have a safe interface and data on the cloud will not be accessible to them. End-to-end encryption is ensured by using multiple keys generated by the key conclusion function (KCF), and access to cloud services is granted based on a person's identity and the relationship between the parties involved, which protects their personal information that is the methodology used in the proposed scheme. The proposed scheme is best suited for cloud-based e-healthcare services because of its simplicity and robustness. Using different Amazon EC2 hosting options, we examine how well our cloud-based web application service works when the number of requests linearly increases. The performance of our web application service that runs in the cloud is based on how many requests it can handle per second while keeping its response time constant. The proposed secure access scheme for cloud-based web applications was compared to the Ethereum blockchain platform, which uses internet of things (IoT) devices in terms of execution time, throughput, and latency.
Collapse
Affiliation(s)
- Kirtirajsinh Zala
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| | - Hiren Kumar Thakkar
- Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar 382007, Gujarat, India
| | | | - Neel H. Dholakia
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| | - Ketan Kotecha
- Symbiosis Centre for Applied Artificial Intelligence, Symbiosis International (Deemed) University, Pune, India
| | - Deepak Kumar Jain
- Key Laboratory of Intelligent Air-Ground Cooperative Control for Universities in Chongqing, College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, China
| | - Madhu Shukla
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| |
Collapse
|
4
|
Huang CH, Liu JS, Ho MHC, Chou TC. Towards more convergent main paths: A relevance-based approach. J Informetr 2022. [DOI: 10.1016/j.joi.2022.101317] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/16/2022]
|
5
|
Kamruzzaman MM, Yan B, Sarker MNI, Alruwaili O, Wu M, Alrashdi I. Blockchain and Fog Computing in IoT-Driven Healthcare Services for Smart Cities. JOURNAL OF HEALTHCARE ENGINEERING 2022; 2022:9957888. [PMID: 35126961 PMCID: PMC8808208 DOI: 10.1155/2022/9957888] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/29/2021] [Revised: 05/05/2021] [Accepted: 12/23/2021] [Indexed: 11/18/2022]
Abstract
Nowadays, technology has been evolving rapidly. Due to the consequent impact of smart technologies, it becomes a ubiquitous part of life. These technologies have led to the emergence of smart cities that are geographic areas driven by advanced information and communication technologies. In the context of smart cities, IoT, blockchain, and fog computing have been found as the significant drivers of smart initiates. In this recognition, the present study is focused on delineating the impact and potential of blockchain, IoT, and fog computing on healthcare services in the context of smart cities. In pursuit of this objective, the study has conducted a systematic review of literature that is most relevant to the topic of the paper. In order to select the most relevant and credible articles, the researcher has used PRISMA and AMSTAR that have culminated in the 10 most relevant articles for the present study. The findings revealed that IoT, blockchain, and fog computing had become drivers of efficiency in the healthcare services in smart cities. Among the three technologies, IoT has been found to be widely incorporated. However, it is found to be lacking in terms of cost efficiency, data privacy, and interoperability of data. In this recognition, blockchain technology and fog computing have been found to be more relevant to the healthcare sector in smart cities. Blockchain has been presented as a promising technology for ensuring the protection of private data, creating a decentralized database, and improving the interoperability of data while fog computing has been presented as the promising technology for low-cost remote monitoring, reducing latency and increasing efficiency.
Collapse
Affiliation(s)
- M. M. Kamruzzaman
- Department of Computer Science, College of Computer and Information Sciences, Jouf University, Sakakah, Saudi Arabia
| | - Bingxin Yan
- School of Public Administration, Sichuan University, Chengdu, China
| | - Md Nazirul Islam Sarker
- School of Political Science and Public Administration, Neijiang Normal University, Neijiang, China
| | - Omar Alruwaili
- Department of Computer Engineering and Networks, College of Computer and Information Sciences, Jouf University, Sakakah, Saudi Arabia
| | - Min Wu
- School of Public Administration, Sichuan University, Chengdu, China
| | - Ibrahim Alrashdi
- Department of Computer Science, College of Computer and Information Sciences, Jouf University, Sakakah, Saudi Arabia
| |
Collapse
|
6
|
Masud M. A light-weight convolutional Neural Network Architecture for classification of COVID-19 chest X-Ray images. MULTIMEDIA SYSTEMS 2022; 28:1165-1174. [PMID: 35017797 PMCID: PMC8739507 DOI: 10.1007/s00530-021-00857-8] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/11/2020] [Accepted: 10/07/2021] [Indexed: 05/19/2023]
Abstract
The COVID-19 pandemic has opened numerous challenges for scientists to use massive data to develop an automatic diagnostic tool for COVID-19. Since the outbreak in January 2020, COVID-19 has caused a substantial destructive impact on society and human life. Numerous studies have been conducted in search of a suitable solution to test COVID-19. Artificial intelligence (AI) based research is not behind in this race, and many AI-based models have been proposed. This paper proposes a lightweight convolutional neural network (CNN) model to classify COVID and Non_COVID patients by analyzing the hidden features in the X-Ray images. The model has been evaluated with different standard metrics to prove the reliability of the model. The model obtained 98.78%, 93.22%, and 92.7% accuracy in the training, validation, and testing phases. In addition, the model achieved 0.964 scores in the Area Under Curve (AUC) metric. We compared the model with four state-of-art pre-trained models (VGG16, InceptionV3, DenseNet121, and EfficientNetB6). The evaluation results demonstrate that the proposed CNN model is a candidate for an automatic diagnostic tool for the classification of COVID-19 patients using chest X-ray images. This research proposes a technique to classify COVID-19 patients and does not claim any medical diagnosis accuracy.
Collapse
Affiliation(s)
- Mehedi Masud
- Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif, 21944 Saudi Arabia
| |
Collapse
|
7
|
Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta BB, Kumar P, Ghoneim A. A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care. IEEE INTERNET OF THINGS JOURNAL 2021; 8:15694-15703. [PMID: 35782176 PMCID: PMC8791439 DOI: 10.1109/jiot.2020.3047662] [Citation(s) in RCA: 18] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/16/2020] [Accepted: 12/22/2020] [Indexed: 05/05/2023]
Abstract
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the doctors to remotely diagnose the patients, control the medical equipment, and monitor the quarantined patients through their digital devices. Security is a major concern in IoMT because the Internet of Things (IoT) nodes exchange sensitive information between virtual medical facilities over the vulnerable wireless medium. Hence, the virtual facilities must be protected from adversarial threats through secure sessions. This article proposes a lightweight and physically secure mutual authentication and secret key establishment protocol that uses physical unclonable functions (PUFs) to enable the network devices to verify the doctor's legitimacy (user) and sensor node before establishing a session key. PUF also protects the sensor nodes deployed in an unattended and hostile environment from tampering, cloning, and side-channel attacks. The proposed protocol exhibits all the necessary security properties required to protect the IoMT networks, like authentication, confidentiality, integrity, and anonymity. The formal AVISPA and informal security analysis demonstrate its robustness against attacks like impersonation, replay, a man in the middle, etc. The proposed protocol also consumes fewer resources to operate and is safe from physical attacks, making it more suitable for IoT-enabled medical network applications.
Collapse
Affiliation(s)
- Mehedi Masud
- Department of Computer ScienceCollege of Computers and Information TechnologyTaif University Taif 21974 Saudi Arabia
| | - Gurjot Singh Gaba
- Department of Electronics and Electrical EngineeringLovely Professional University Phagwara 144411 India
| | - Salman Alqahtani
- Department of Computer EngineeringCollege of Computer and Information SciencesKing Saud University Riyadh 11451 Saudi Arabia
| | - Ghulam Muhammad
- Chair of Pervasive and Mobile Computing Saudi Arabia
- Department of Computer EngineeringCollege of Computer and Information SciencesKing Saud University Riyadh 11543 Saudi Arabia
| | - B B Gupta
- Department of Computer EngineeringNational Institute of Technology Kurukshetra Haryana 136119 India
- Department of Computer Science and Information EngineeringAsia University Taichung 41354 Taiwan
| | - Pardeep Kumar
- Department of Computer ScienceSwansea University Swansea SA1 8EN U.K
| | - Ahmed Ghoneim
- Department of Software EngineeringCollege of Computer and Information SciencesKing Saud University Riyadh 51178 Saudi Arabia
- Department of Mathematics and Computer ScienceFaculty of ScienceMenoufia University Shebin El-Koom 32511 Egypt
| |
Collapse
|
8
|
Masud M, Gaba GS, Choudhary K, Alroobaea R, Hossain MS. A robust and lightweight secure access scheme for cloud based E-healthcare services. PEER-TO-PEER NETWORKING AND APPLICATIONS 2021; 14:3043-3057. [PMID: 33968292 PMCID: PMC8090928 DOI: 10.1007/s12083-021-01162-x] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/31/2020] [Accepted: 04/08/2021] [Indexed: 06/12/2023]
Abstract
Traditional healthcare services have transitioned into modern healthcare services where doctors remotely diagnose the patients. Cloud computing plays a significant role in this change by providing easy access to patients' medical records to all stakeholders, such as doctors, nurses, patients, life insurance agents, etc. Cloud services are scalable, cost-effective, and offer a broad range of mobile access to patients' electronic health record (EHR). Despite the cloud's enormous benefits like real-time data access, patients' EHR security and privacy are major concerns. Since the information about patients' health is highly sensitive and crucial, sharing it over the unsecured wireless medium brings many security challenges such as eavesdropping, modifications, etc. Considering the security needs of remote healthcare, this paper proposes a robust and lightweight, secure access scheme for cloud-based E-healthcare services. The proposed scheme addresses the potential threats to E-healthcare by providing a secure interface to stakeholders and prohibiting unauthorized users from accessing information stored in the cloud. The scheme makes use of multiple keys formed through the key derivation function (KDF) to ensure end-to-end ciphering of information for preventing misuse. The rights to access the cloud services are provided based on the identity and the association between stakeholders, thus ensuring privacy. Due to its simplicity and robustness, the proposed scheme is the best fit for protecting data security and privacy in cloud-based E-healthcare services.
Collapse
Affiliation(s)
- Mehedi Masud
- Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944 Saudi Arabia
| | - Gurjot Singh Gaba
- School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, 144411 India
| | - Karanjeet Choudhary
- School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, 144411 India
| | - Roobaea Alroobaea
- Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944 Saudi Arabia
| | - M. Shamim Hossain
- Research Chair of Pervasive and Mobile Computing, and Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
| |
Collapse
|
9
|
Rahman MA, Hossain MS, Islam MS, Alrajeh NA, Muhammad G. Secure and Provenance Enhanced Internet of Health Things Framework: A Blockchain Managed Federated Learning Approach. IEEE ACCESS : PRACTICAL INNOVATIONS, OPEN SOLUTIONS 2020; 8:205071-205087. [PMID: 34192116 PMCID: PMC8043507 DOI: 10.1109/access.2020.3037474] [Citation(s) in RCA: 37] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2020] [Accepted: 11/09/2020] [Indexed: 05/06/2023]
Abstract
Recent advancements in the Internet of Health Things (IoHT) have ushered in the wide adoption of IoT devices in our daily health management. For IoHT data to be acceptable by stakeholders, applications that incorporate the IoHT must have a provision for data provenance, in addition to the accuracy, security, integrity, and quality of data. To protect the privacy and security of IoHT data, federated learning (FL) and differential privacy (DP) have been proposed, where private IoHT data can be trained at the owner's premises. Recent advancements in hardware GPUs even allow the FL process within smartphone or edge devices having the IoHT attached to their edge nodes. Although some of the privacy concerns of IoHT data are addressed by FL, fully decentralized FL is still a challenge due to the lack of training capability at all federated nodes, the scarcity of high-quality training datasets, the provenance of training data, and the authentication required for each FL node. In this paper, we present a lightweight hybrid FL framework in which blockchain smart contracts manage the edge training plan, trust management, and authentication of participating federated nodes, the distribution of global or locally trained models, the reputation of edge nodes and their uploaded datasets or models. The framework also supports the full encryption of a dataset, the model training, and the inferencing process. Each federated edge node performs additive encryption, while the blockchain uses multiplicative encryption to aggregate the updated model parameters. To support the full privacy and anonymization of the IoHT data, the framework supports lightweight DP. This framework was tested with several deep learning applications designed for clinical trials with COVID-19 patients. We present here the detailed design, implementation, and test results, which demonstrate strong potential for wider adoption of IoHT-based health management in a secure way.
Collapse
Affiliation(s)
- Mohamed Abdur Rahman
- Department of Cyber Security and Forensic ComputingCollege of Computing and Cyber SciencesUniversity of Prince MugrinMadinah41499Saudi Arabia
| | - M. Shamim Hossain
- Department of Software EngineeringCollege of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
| | | | - Nabil A. Alrajeh
- Department of Biomedical EngineeringCollege of Applied Medical SciencesKing Saud UniversityRiyadh11543Saudi Arabia
| | - Ghulam Muhammad
- Department of Computer EngineeringCollege of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
| |
Collapse
|
10
|
|
11
|
Silva BM, Rodrigues JJ, de la Torre Díez I, López-Coronado M, Saleem K. Mobile-health: A review of current state in 2015. J Biomed Inform 2015; 56:265-72. [DOI: 10.1016/j.jbi.2015.06.003] [Citation(s) in RCA: 345] [Impact Index Per Article: 38.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/21/2014] [Revised: 05/28/2015] [Accepted: 06/03/2015] [Indexed: 10/23/2022]
|
12
|
Shen Q, Liang X, Shen X, Lin X, Luo HY. Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation. IEEE J Biomed Health Inform 2014; 18:430-9. [PMID: 24608048 DOI: 10.1109/jbhi.2013.2292829] [Citation(s) in RCA: 59] [Impact Index Per Article: 5.9] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
Abstract
In this paper, we propose an e-health monitoring system with minimum service delay and privacy preservation by exploiting geo-distributed clouds. In the system, the resource allocation scheme enables the distributed cloud servers to cooperatively assign the servers to the requested users under the load balance condition. Thus, the service delay for users is minimized. In addition, a traffic-shaping algorithm is proposed. The traffic-shaping algorithm converts the user health data traffic to the nonhealth data traffic such that the capability of traffic analysis attacks is largely reduced. Through the numerical analysis, we show the efficiency of the proposed traffic-shaping algorithm in terms of service delay and privacy preservation. Furthermore, through the simulations, we demonstrate that the proposed resource allocation scheme significantly reduces the service delay compared to two other alternatives using jointly the short queue and distributed control law.
Collapse
|
13
|
Shamim Hossain M, Goebel S, El Saddik A. Guest EditorialMultimedia Services and Technologies for E-Health (MUST-EH). ACTA ACUST UNITED AC 2012; 16:1005-6. [DOI: 10.1109/titb.2012.2225260] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
|