1
|
Hosseinzadeh M, Mohammed AH, Rahmani AM, A. Alenizi F, Zandavi SM, Yousefpoor E, Ahmed OH, Hussain Malik M, Tightiz L. A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcare. PLoS One 2023; 18:e0290119. [PMID: 37782661 PMCID: PMC10545119 DOI: 10.1371/journal.pone.0290119] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/11/2023] [Accepted: 08/02/2023] [Indexed: 10/04/2023] Open
Abstract
Patients must always communicate with their doctor for checking their health status. In recent years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare. In these applications, energy-efficient and secure routing is really critical because health data of individuals must be forwarded to the destination securely to avoid unauthorized access by malicious nodes. However, biosensors have limited resources, especially energy. Recently, energy-efficient solutions have been proposed. Nevertheless, designing lightweight security mechanisms has not been stated in many schemes. In this paper, we propose a secure routing approach based on the league championship algorithm (LCA) for wireless body sensor networks in healthcare. The purpose of this scheme is to create a tradeoff between energy consumption and security. Our approach involves two important algorithms: routing process and communication security. In the first algorithm, each cluster head node (CH) applies the league championship algorithm to choose the most suitable next-hop CH. The proposed fitness function includes parameters like distance from CHs to the sink node, remaining energy, and link quality. In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. Also, we utilize an asymmetric cryptography scheme for forming secure inter-cluster connections. Network simulator version 2 (NS2) is used to implement the proposed approach. The simulation results show that our method is efficient in terms of consumed energy and delay. In addition, our scheme has good throughput, high packet delivery rate, and low packet loss rate.
Collapse
Affiliation(s)
- Mehdi Hosseinzadeh
- Institute of Research and Development, Duy Tan University, Da Nang, Vietnam
- School of Medicine and Pharmacy, Duy Tan University, Da Nang, Vietnam
| | - Adil Hussein Mohammed
- Department of Communication and Computer Engineering, Faculty of Engineering, Cihan University-Erbil, Erbil, Kurdistan Region, Iraq
| | - Amir Masoud Rahmani
- Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, Taiwan
| | - Farhan A. Alenizi
- Electrical Engineering Department, College of engineering, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia
| | - Seid Miad Zandavi
- School of Biotechnology and Biomolecular Science, The University of New South Wales, Sydney, Australia
| | - Efat Yousefpoor
- Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
| | - Omed Hassan Ahmed
- Department of Information Technology, University of Human Development, Sulaymaniyah, Iraq
| | - Mazhar Hussain Malik
- School of Computing and Creative Technologies College of Arts, Technology and Environment (CATE) University of the West of England Frenchay Campus, Bristol, United Kingdom
| | - Lilia Tightiz
- School of Computing, Gachon University, Seongnam, Korea
| |
Collapse
|
2
|
El Khatib M, Alzoubi HM, Hamidi S, Alshurideh M, Baydoun A, Al-Nakeeb A. Impact of Using the Internet of Medical Things on e-Healthcare Performance: Blockchain Assist in Improving Smart Contract. CLINICOECONOMICS AND OUTCOMES RESEARCH 2023; 15:397-411. [PMID: 37287899 PMCID: PMC10241599 DOI: 10.2147/ceor.s407778] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/13/2023] [Accepted: 05/27/2023] [Indexed: 06/09/2023] Open
Abstract
Background This paper explores the use of blockchain technology and smart contracts in the Internet of Medical Things (IoMT). It aims to identify the challenges and benefits of implementing smart contracts based on blockchain technology in the IoMT. It provides solutions and evaluates the IoMT uses in e-healthcare performance. Methods A quantitative approach used an online survey from public and private hospital administrative departments in Dubai, United Arab Emirates (UAE). ANOVA, t-test, correlation, and regression analysis were performed to assess the e-healthcare performance with and without IoMT (smart contract based on blockchain). Patients and Methods A mixed method was used in this research, a quantitative approach for data analysis utilizing online surveys from public and private hospitals' administrative departments in Dubai, UAE. A correlation, regression through ANOVA, and independent two-sample t-test were performed to assess the e-healthcare performance with and without IoMT (smart contract based on blockchain). Results Blockchain application in smart contracts has proven to be significant in the healthcare sector. Results highlight the importance of integrating smart contracts and blockchain technology in the IoMT infrastructure to improve efficiency, transparency, and security. The study provides empirical evidence to support the implementation of smart contracts in the e-healthcare sector and suggests improved e-healthcare performance through this transition. Conclusion The emergence of e-healthcare systems with upgraded smart contracts and blockchain technology brings continuous health monitoring, time-effective operations, and cost-effectiveness to the healthcare sector.
Collapse
Affiliation(s)
- Mounir El Khatib
- School of Business and Quality Management, Hamdan Bin Mohammed Smart University, Dubai, United Arab Emirates
| | - Haitham M Alzoubi
- School of Business, Skyline University College, Sharjah, United Arab Emirates
- Applied Science Research Center, Applied Science Private University, Amman, Jordan
| | - Samer Hamidi
- School of Health and Environmental Studies, Hamdan Bin Mohammed Smart University, Dubai, United Arab Emirates
| | - Muhammad Alshurideh
- College of Business Administration, University of Sharjah, Sharjah, United Arab Emirates
- Department of Marketing, School of Business, The University of Jordan, Amman, Jordan
| | - Ali Baydoun
- School of Medicine, St. George’s University, Grenada, West Indies
| | - Ahmed Al-Nakeeb
- School of Business and Quality Management, Hamdan Bin Mohammed Smart University, Dubai, United Arab Emirates
| |
Collapse
|
3
|
Lakhan A, Mohammed MA, Nedoma J, Martinek R, Tiwari P, Kumar N. DRLBTS: deep reinforcement learning-aware blockchain-based healthcare system. Sci Rep 2023; 13:4124. [PMID: 36914679 PMCID: PMC10009826 DOI: 10.1038/s41598-023-29170-2] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/25/2022] [Accepted: 01/31/2023] [Indexed: 03/16/2023] Open
Abstract
Industrial Internet of Things (IIoT) is the new paradigm to perform different healthcare applications with different services in daily life. Healthcare applications based on IIoT paradigm are widely used to track patients health status using remote healthcare technologies. Complex biomedical sensors exploit wireless technologies, and remote services in terms of industrial workflow applications to perform different healthcare tasks, such as like heartbeat, blood pressure and others. However, existing industrial healthcare technoloiges still has to deal with many problems, such as security, task scheduling, and the cost of processing tasks in IIoT based healthcare paradigms. This paper proposes a new solution to the above-mentioned issues and presents the deep reinforcement learning-aware blockchain-based task scheduling (DRLBTS) algorithm framework with different goals. DRLBTS provides security and makespan efficient scheduling for the healthcare applications. Then, it shares secure and valid data between connected network nodes after the initial assignment and data validation. Statistical results show that DRLBTS is adaptive and meets the security, privacy, and makespan requirements of healthcare applications in the distributed network.
Collapse
Affiliation(s)
- Abdullah Lakhan
- Department of Computer Science, Dawood University of Engineering and Technology, Sindh, Karachi, 74800, Pakistan.,Department of Telecommunications, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic.,Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic
| | - Mazin Abed Mohammed
- College of Computer Science and Information Technology, University of Anbar, Anbar, 31001, Iraq.,Department of Telecommunications, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic.,Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic
| | - Jan Nedoma
- Department of Telecommunications, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic
| | - Radek Martinek
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic
| | - Prayag Tiwari
- School of Information Technology, Halmstad University, Halmstad, Sweden.
| | - Neeraj Kumar
- Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology (Deemed University), Patiala, Punjab, India.,School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India.,Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan
| |
Collapse
|
4
|
Chatterjee K, Singh A, Neha, Yu K. A Multifactor Ring Signature based Authentication Scheme for Quality Assessment of IoMT Environment in COVID-19 Scenario. ACM JOURNAL OF DATA AND INFORMATION QUALITY 2023. [DOI: 10.1145/3575811] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/21/2023]
Abstract
The quality of the healthcare environment has become an essential factor for healthcare users to access quality services. Smart healthcare systems use the Internet of Medical Things (IoMT) devices to capture patients’ health data for treatment or diagnostic purposes. This sensitive collected patient data is shared between the different stakeholders across the network to provide quality services. Due to this, healthcare systems are vulnerable to confidentiality, integrity and privacy threats. In the COVID-19 scenario, when collaborative medical consultation is required, the quality assessment of the framework is essential to protect the privacy of doctors and patients. In this paper, a ring signature-based anonymous authentication and quality assessment scheme is designed for collaborative medical consultation environments for quality assessment and protection of the privacy of doctors and patients. This scheme also uses a new KMOV Cryptosystem to ensure the quality of the network and protect the system from different attacks that hamper data confidentiality.
Collapse
Affiliation(s)
| | - Ashish Singh
- School of Computer Engineering, KIIT University, India
| | - Neha
- Department of CSE, National Institute of Technology Patna, India
| | - Keping Yu
- Graduate School of Science and Engineering, Hosei University, Japan
| |
Collapse
|
5
|
Gec S, Stankovski V, Lavbič D, Kochovski P. A Recommender System for Robust Smart Contract Template Classification. SENSORS (BASEL, SWITZERLAND) 2023; 23:639. [PMID: 36679436 PMCID: PMC9866539 DOI: 10.3390/s23020639] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/01/2022] [Revised: 01/01/2023] [Accepted: 01/02/2023] [Indexed: 06/17/2023]
Abstract
IoT environments are becoming increasingly heterogeneous in terms of their distributions and included entities by collaboratively involving not only data centers known from Cloud computing but also the different types of third-party entities that can provide computing resources. To transparently provide such resources and facilitate trust between the involved entities, it is necessary to develop and implement smart contracts. However, when developing smart contracts, developers face many challenges and concerns, such as security, contracts' correctness, a lack of documentation and/or design patterns, and others. To address this problem, we propose a new recommender system to facilitate the development and implementation of low-cost EVM-enabled smart contracts. The recommender system's algorithm provides the smart contract developer with smart contract templates that match their requirements and that are relevant to the typology of the fog architecture. It mainly relies on OpenZeppelin, a modular, reusable, and secure smart contract library that we use when classifying the smart contracts. The evaluation results indicate that by using our solution, the smart contracts' development times are overall reduced. Moreover, such smart contracts are sustainable for fog-computing IoT environments and applications in low-cost EVM-based ledgers. The recommender system has been successfully implemented in the ONTOCHAIN ecosystem, thus presenting its applicability.
Collapse
|
6
|
Zirui M, Bin G. A Privacy-Preserved and User Self-Governance Blockchain-Based Framework to Combat COVID-19 Depression in Social Media. IEEE ACCESS 2023; 11:35255-35280. [DOI: 10.1109/access.2023.3264598] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Affiliation(s)
- Ma Zirui
- Department of Electronic Business, South China University of Technology, Guangzhou, China
| | - Gu Bin
- Department of Electronic Business, South China University of Technology, Guangzhou, China
| |
Collapse
|
7
|
Vargas C, Mira da Silva M. Case studies about smart contracts in healthcare. Digit Health 2023; 9:20552076231203571. [PMID: 37822961 PMCID: PMC10563467 DOI: 10.1177/20552076231203571] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/01/2022] [Accepted: 09/07/2023] [Indexed: 10/13/2023] Open
Abstract
The Internet of Things (IoT) such as devices and sensors are a fast growth reality which our bureaucratical and archaic institutional system is not yet ready to embrace its functionalities. In the health system, many developments are made, and smart devices are the key to preventing, studying, investigating, and solving a lot of diseases and improving our health system. But along with this, innovation is necessary for the hospitals, for example, to have a proper system that provides storage of health data information and respects the General Data Protection Regulation (GDPR) with the use of smart contracts that secure the integrity and disclosure of the patient's data, since the majority of hospitals still use paper, physical records to store data. In this study, we will briefly analyse and explain three different suggested methods to deal with the challenges that Internet of Medical Things (IoMT) encounters. We will not choose which one is the best because of the different features and the countries they are proposed but will emphasize the benefits and challenges which one has.
Collapse
Affiliation(s)
- Cristina Vargas
- Instituto Superior Técnico, University of Lisbon, Lisboa, Portugal
| | | |
Collapse
|
8
|
Singh A, Chatterjee K. Edge computing based secure health monitoring framework for electronic healthcare system. CLUSTER COMPUTING 2022; 26:1205-1220. [PMID: 36091662 PMCID: PMC9438893 DOI: 10.1007/s10586-022-03717-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/24/2022] [Revised: 07/07/2022] [Accepted: 08/03/2022] [Indexed: 06/15/2023]
Abstract
Nowadays, Smart Healthcare Systems (SHS) are frequently used by people for personal healthcare observations using various smart devices. The SHS uses IoT technology and cloud infrastructure for data capturing, transmitting it through smart devices, data storage, processing, and healthcare advice. Processing such a huge amount of data from numerous IoT devices in a short time is quite challenging. Thus, technological frameworks such as edge computing or fog computing can be used as a middle layer between cloud and user in SHS. It reduces the response time for data processing at the lower level (edge level). But, Edge of Things (EoT) also suffers from security and privacy issues. A robust healthcare monitoring framework with secure data storage and access is needed. It will provide a quick response in case of the production of abnormal data and store/access the sensitive data securely. This paper proposed a Secure Framework based on the Edge of Things (SEoT) for Smart healthcare systems. This framework is mainly designed for real-time health monitoring, maintaining the security and confidentiality of the healthcare data in a controlled manner. This paper included clustering approaches for analyzing bio-signal data for abnormality detection and Attribute-Based Encryption (ABE) for bio-signal data security and secure access. The experimental results of the proposed framework show improved performance with maintaining the accuracy of up to 98.5% and data security.
Collapse
Affiliation(s)
- Ashish Singh
- School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha 751024 India
| | - Kakali Chatterjee
- Department of Computer Science and Engineering, National Institute of Technology, Patna, Bihar 800005 India
| |
Collapse
|
9
|
Manoharan SN, Kumar KMVM, Vadivelan N. A Novel CNN-TLSTM Approach for Dengue Disease Identification and Prevention using IoT-Fog Cloud Architecture. Neural Process Lett 2022; 55:1951-1973. [PMID: 36039275 PMCID: PMC9402409 DOI: 10.1007/s11063-022-10971-x] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 07/08/2022] [Indexed: 12/02/2022]
Abstract
One of the mosquito-borne pandemic viral infections is Dengue which is mostly transmitted to humans by the Aedes agypti or female Aedes albopictis mosquitoes. The dengue disease expansion is mainly due to the different factors such as climate change, socioeconomic factors, viral evolution, globalization, etc. The unavailability of certain antiviral therapy and specific vaccine increases the risk of the dengue disease spreading even further. This arises the need for a novel technique that overcomes the complexities associated with dengue disease prediction such as low reporting level, misclassification, and incompatible disease monitoring framework. This paper mainly overcomes the above-mentioned problems by integrating the Internet of Things (IoT), fog-cloud, and deep learning techniques for efficient dengue monitoring. A compatible disease monitoring framework is formed via the IoT devices and the reports are effectively created and transferred to the healthcare facilities via the fog-cloud model. The misdiagnosis error is overcome in this paper using the novel Hybrid Convolutional Neural Network (CNN) with Tanh Long and Short Term Memory (TLSTM) based Adaptive Teaching Learning Based Optimization (ATLBO) algorithm. The ATLBO optimized CNN-TLSTM architecture mainly analyzes the dengue-related parameters such as Soft Bleeding, Muscle Pain, Joint Pain, Skin rash, Fever, Water Site, Carbon Dioxide, Water Site Humidity, Water Site Temperature, etc. for an efficient clinical decision making and timely disease diagnosis. The experimental results are conducted using a real-time dataset and its performance is validated using various performance metrics. When compared in terms of different statistical parameters such as accuracy, f-measure, mean square error, and reliability, the proposed method offers superior results in the case of dengue disease detection than other existing methods. The ATLBO optimized hybrid CNN-TLSTM shows an accuracy of 96.9%, a precision of 95.7%, recall of 96.8%, and F-measure of 96.2% which is relatively high when compared to the existing techniques. The proposed model is capable of identifying the patients in a certain geographical region and preventing the disease emergency via immediate disease diagnosis and alerting the healthcare officials to offer the stipulated services.
Collapse
Affiliation(s)
- S. N. Manoharan
- Department of Computer Science & Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu India
| | - K. M. V. Madan Kumar
- Computer Science and Engineering, Teegala Krishna Reddy Engineering College, Hyderabad, India
| | - N. Vadivelan
- Computer Science and Engineering, Teegala Krishna Reddy Engineering College, Hyderabad, India
| |
Collapse
|
10
|
Mohammed MA, Al-Khateeb B, Yousif M, Mostafa SA, Kadry S, Abdulkareem KH, Garcia-Zapirain B. Novel Crow Swarm Optimization Algorithm and Selection Approach for Optimal Deep Learning COVID-19 Diagnostic Model. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:1307944. [PMID: 35996653 PMCID: PMC9392599 DOI: 10.1155/2022/1307944] [Citation(s) in RCA: 16] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/01/2022] [Revised: 03/16/2022] [Accepted: 07/19/2022] [Indexed: 02/07/2023]
Abstract
Due to the COVID-19 pandemic, computerized COVID-19 diagnosis studies are proliferating. The diversity of COVID-19 models raises the questions of which COVID-19 diagnostic model should be selected and which decision-makers of healthcare organizations should consider performance criteria. Because of this, a selection scheme is necessary to address all the above issues. This study proposes an integrated method for selecting the optimal deep learning model based on a novel crow swarm optimization algorithm for COVID-19 diagnosis. The crow swarm optimization is employed to find an optimal set of coefficients using a designed fitness function for evaluating the performance of the deep learning models. The crow swarm optimization is modified to obtain a good selected coefficient distribution by considering the best average fitness. We have utilized two datasets: the first dataset includes 746 computed tomography images, 349 of them are of confirmed COVID-19 cases and the other 397 are of healthy individuals, and the second dataset are composed of unimproved computed tomography images of the lung for 632 positive cases of COVID-19 with 15 trained and pretrained deep learning models with nine evaluation metrics are used to evaluate the developed methodology. Among the pretrained CNN and deep models using the first dataset, ResNet50 has an accuracy of 91.46% and a F1-score of 90.49%. For the first dataset, the ResNet50 algorithm is the optimal deep learning model selected as the ideal identification approach for COVID-19 with the closeness overall fitness value of 5715.988 for COVID-19 computed tomography lung images case considered differential advancement. In contrast, the VGG16 algorithm is the optimal deep learning model is selected as the ideal identification approach for COVID-19 with the closeness overall fitness value of 5758.791 for the second dataset. Overall, InceptionV3 had the lowest performance for both datasets. The proposed evaluation methodology is a helpful tool to assist healthcare managers in selecting and evaluating the optimal COVID-19 diagnosis models based on deep learning.
Collapse
Affiliation(s)
- Mazin Abed Mohammed
- College of Computer Science and Information Technology, University of Anbar, Ramadi 31001, Anbar, Iraq
| | - Belal Al-Khateeb
- College of Computer Science and Information Technology, University of Anbar, Ramadi 31001, Anbar, Iraq
| | - Mohammed Yousif
- Directorate of Regions and Governorates Affairs, Ministry of Youth & Sport, Ramadi 31065, Anbar, Iraq
| | - Salama A. Mostafa
- Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Johor 86400, Malaysia
| | - Seifedine Kadry
- Department of Applied Data Science, Noroff University College, Kristiansand 4608, Norway
| | - Karrar Hameed Abdulkareem
- College of Agriculture, Al-Muthanna University, Samawah 66001, Iraq
- College of Engineering, University of Warith Al-Anbiyaa, Karbala, Iraq
| | | |
Collapse
|
11
|
Blockchain Socket Factories with RMI-Enabled Framework for Fine-Grained Healthcare Applications. SENSORS 2022; 22:s22155833. [PMID: 35957396 PMCID: PMC9371211 DOI: 10.3390/s22155833] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/03/2022] [Revised: 07/25/2022] [Accepted: 07/28/2022] [Indexed: 12/04/2022]
Abstract
The usage of digital and intelligent healthcare applications on mobile devices has grown progressively. These applications are generally distributed and access remote healthcare services on the user’s applications from different hospital sources. These applications are designed based on client–server architecture and different paradigms such as socket, remote procedure call, and remote method invocation (RMI). However, these existing paradigms do not offer a security mechanism for healthcare applications in distributed mobile-fog-cloud networks. This paper devises a blockchain-socket-RMI-based framework for fine-grained healthcare applications in the mobile-fog-cloud network. This study introduces a new open healthcare framework for applied research purposes and has blockchain-socket-RMI abstraction level classes for healthcare applications. The goal is to meet the security and deadline requirements of fine-grained healthcare tasks and minimize execution and data validation costs during processing applications in the system. This study introduces a partial proof of validation (PPoV) scheme that converts the workload into the hash and validates it among mobile, fog, and cloud nodes during offloading, execution, and storing data in the secure form. Simulation discussions illustrate that the proposed blockchain-socket-RMI minimizes the processing and blockchain costs and meets the security and deadline requirements of fine-grained healthcare tasks of applications as compared to existing frameworks in work.
Collapse
|
12
|
Kongjit C, Nimmolrat A, Khamaksorn A. Mobile health application for Thai women: investigation and model. BMC Med Inform Decis Mak 2022; 22:202. [PMID: 35907950 PMCID: PMC9338500 DOI: 10.1186/s12911-022-01944-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/29/2021] [Accepted: 07/19/2022] [Indexed: 11/23/2022] Open
Abstract
Background Women’s mobile health (m-health) applications are currently widely used for health education, medication, prevention of illness, etcetera. However, women are extremely sensitive to their design. While the number of m-health applications for women is increasing, many are of poor quality and have development issues. Objective This paper aims to develop and evaluate an m-health application for Thai women based on a user-centred design (UCD). Current women’s m-health applications were investigated to identify any lack of development in usability, functionality and graphical user interface. The results were evaluated and used to create criteria for the trial of a prototype application. Methods UCD methodology was used to design a graphical user interface, analyse the application’s functionality, and enhance its usability. Data from thirty female end-users were collected and maintained locally, and thirteen information technology (IT) experts provided feedback on the prototype trial. Interviews and questionnaires were used to gather user data and identify problems. Results The average scores of the evaluation by the end-users (n = 30) and IT experts (n = 13) were compared using a t-test statistical analysis. For the first version, the end-users gave higher usability scores (average = 4.440), with no statistical significance and a P value of 0.05. In comparison, lower scores for functionality were given by the IT experts (average = 4.034), with no statistical significance and a P value of 0.05. For the second version, the average scores from the end-users were higher than those from the IT experts. The highest score was related to usability (average = 4.494), with no statistical significance and a P value of 0.05. The lowest score was for the user interface from the group of IT experts (average = 4.084), with no statistical significance and a P value of 0.05. Conclusion A UCD was utilised to construct a process taxonomy to understand, analyse, design and develop an application suitable for Thai women. It was found from an evaluation of the currently-available women’s m-health applications that usability is their main weakness; therefore, this aspect needed to be prioritised in the new design. According to the results, IT experts’ perspective of the development of an m-health application was different from that of end-users. Hence, it was evident that both end-users and IT experts needed to be involved in helping developers to analyse, prioritise and establish a strategy for developing an m-health application, particularly one for women’s health. This would give researchers an in-depth understanding of the end-users’ expectations.
Collapse
Affiliation(s)
- Chalermpon Kongjit
- College of Arts, Media and Technology, Chiang Mai University, Chiang Mai, 50200, Thailand.
| | - Acrapol Nimmolrat
- College of Arts, Media and Technology, Chiang Mai University, Chiang Mai, 50200, Thailand
| | - Achara Khamaksorn
- Research Group of Embedded Systems and Mobile Application in Health Science, College of Arts, Media and Technology, Chiang Mai University, Chiang Mai, 50200, Thailand
| |
Collapse
|
13
|
Hameed Abdulkareem K, Awad Mutlag A, Musa Dinar A, Frnda J, Abed Mohammed M, Hasan Zayr F, Lakhan A, Kadry S, Ali Khattak H, Nedoma J. Smart Healthcare System for Severity Prediction and Critical Tasks Management of COVID-19 Patients in IoT-Fog Computing Environments. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:5012962. [PMID: 35875731 PMCID: PMC9297127 DOI: 10.1155/2022/5012962] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/10/2022] [Revised: 04/07/2022] [Accepted: 06/10/2022] [Indexed: 12/23/2022]
Abstract
COVID-19 has depleted healthcare systems around the world. Extreme conditions must be defined as soon as possible so that services and treatment can be deployed and intensified. Many biomarkers are being investigated in order to track the patient's condition. Unfortunately, this may interfere with the symptoms of other diseases, making it more difficult for a specialist to diagnose or predict the severity level of the case. This research develops a Smart Healthcare System for Severity Prediction and Critical Tasks Management (SHSSP-CTM) for COVID-19 patients. On the one hand, a machine learning (ML) model is projected to predict the severity of COVID-19 disease. On the other hand, a multi-agent system is proposed to prioritize patients according to the seriousness of the COVID-19 condition and then provide complete network management from the edge to the cloud. Clinical data, including Internet of Medical Things (IoMT) sensors and Electronic Health Record (EHR) data of 78 patients from one hospital in the Wasit Governorate, Iraq, were used in this study. Different data sources are fused to generate new feature pattern. Also, data mining techniques such as normalization and feature selection are applied. Two models, specifically logistic regression (LR) and random forest (RF), are used as baseline severity predictive models. A multi-agent algorithm (MAA), consisting of a personal agent (PA) and fog node agent (FNA), is used to control the prioritization process of COVID-19 patients. The highest prediction result is achieved based on data fusion and selected features, where all examined classifiers observe a significant increase in accuracy. Furthermore, compared with state-of-the-art methods, the RF model showed a high and balanced prediction performance with 86% accuracy, 85.7% F-score, 87.2% precision, and 86% recall. In addition, as compared to the cloud, the MAA showed very significant performance where the resource usage was 66% in the proposed model and 34% in the traditional cloud, the delay was 19% in the proposed model and 81% in the cloud, and the consumed energy was 31% in proposed model and 69% in the cloud. The findings of this study will allow for the early detection of three severity cases, lowering mortality rates.
Collapse
Affiliation(s)
- Karrar Hameed Abdulkareem
- College of Agriculture, Al-Muthanna University, Samawah 66001, Iraq
- College of Engineering, University of Warith Al-Anbiyaa, Karbala, Iraq
| | - Ammar Awad Mutlag
- Ministry of Education, General Directorate of Curricula, Pure Science Department, Baghdad, Iraq
| | - Ahmed Musa Dinar
- Engineering Department, University of Technology- Iraq, Baghdad, Iraq
| | - Jaroslav Frnda
- Department of Quantitative Methods and Economic Informatics, Faculty of Operation and Economics of Transport and Communication, University of Žilina, Žilina, Slovakia
- Department of Telecommunications, Faculty of Electrical Engineering and Computer Science, VSB-Technical University of Ostrava, Ostrava, Poruba, Czech Republic
| | - Mazin Abed Mohammed
- College of Computer Science and Information Technology, University of Anbar, 11, Ramadi, Anbar, Iraq
| | - Fawzi Hasan Zayr
- Department of Biochemistry, College of Medicine, University of Wasit, Wasit, Iraq
| | - Abdullah Lakhan
- Department of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou 325035, China
| | | | - Hasan Ali Khattak
- School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad 44500, Pakistan
| | - Jan Nedoma
- Department of Telecommunications, Faculty of Electrical Engineering and Computer Science, VSB-Technical University of Ostrava, Ostrava, Poruba, Czech Republic
| |
Collapse
|
14
|
A Novel Low-Latency and Energy-Efficient Task Scheduling Framework for Internet of Medical Things in an Edge Fog Cloud System. SENSORS 2022; 22:s22145327. [PMID: 35891007 PMCID: PMC9319030 DOI: 10.3390/s22145327] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/18/2022] [Revised: 07/12/2022] [Accepted: 07/13/2022] [Indexed: 01/08/2023]
Abstract
In healthcare, there are rapid emergency response systems that necessitate real-time actions where speed and efficiency are critical; this may suffer as a result of cloud latency because of the delay caused by the cloud. Therefore, fog computing is utilized in real-time healthcare applications. There are still limitations in response time, latency, and energy consumption. Thus, a proper fog computing architecture and good task scheduling algorithms should be developed to minimize these limitations. In this study, an Energy-Efficient Internet of Medical Things to Fog Interoperability of Task Scheduling (EEIoMT) framework is proposed. This framework schedules tasks in an efficient way by ensuring that critical tasks are executed in the shortest possible time within their deadline while balancing energy consumption when processing other tasks. In our architecture, Electrocardiogram (ECG) sensors are used to monitor heart health at home in a smart city. ECG sensors send the sensed data continuously to the ESP32 microcontroller through Bluetooth (BLE) for analysis. ESP32 is also linked to the fog scheduler via Wi-Fi to send the results data of the analysis (tasks). The appropriate fog node is carefully selected to execute the task by giving each node a special weight, which is formulated on the basis of the expected amount of energy consumed and latency in executing this task and choosing the node with the lowest weight. Simulations were performed in iFogSim2. The simulation outcomes show that the suggested framework has a superior performance in reducing the usage of energy, latency, and network utilization when weighed against CHTM, LBS, and FNPA models.
Collapse
|
15
|
Khanna A, Sah A, Bolshev V, Burgio A, Panchenko V, Jasiński M. Blockchain-Cloud Integration: A Survey. SENSORS (BASEL, SWITZERLAND) 2022; 22:5238. [PMID: 35890918 PMCID: PMC9320072 DOI: 10.3390/s22145238] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/08/2022] [Revised: 07/07/2022] [Accepted: 07/08/2022] [Indexed: 06/15/2023]
Abstract
Over the last couple of years, Blockchain technology has emerged as a game-changer for various industry domains, ranging from FinTech and the supply chain to healthcare and education, thereby enabling them to meet the competitive market demands and end-user requirements. Blockchain technology gained its popularity after the massive success of Bitcoin, of which it constitutes the backbone technology. While blockchain is still emerging and finding its foothold across domains, Cloud computing is comparatively well defined and established. Organizations such as Amazon, IBM, Google, and Microsoft have extensively invested in Cloud and continue to provide a plethora of related services to a wide range of customers. The pay-per-use policy and easy access to resources are some of the biggest advantages of Cloud, but it continues to face challenges like data security, compliance, interoperability, and data management. In this article, we present the advantages of integrating Cloud and blockchain technology along with applications of Blockchain-as-a-Service. The article presents itself with a detailed survey illustrating recent works combining the amalgamation of both technologies. The survey also talks about blockchain-cloud services being offered by existing Cloud Service providers.
Collapse
Affiliation(s)
- Abhirup Khanna
- Department of Systemics, School of Computer Science, University of Petroleum and Energy Studies, Dehradun 248007, India;
| | - Anushree Sah
- Department of Systemics, School of Computer Science, University of Petroleum and Energy Studies, Dehradun 248007, India;
| | - Vadim Bolshev
- Laboratory of Power Supply and Heat Supply, Federal Scientific Agroengineering Center VIM, 109428 Moscow, Russia;
- Laboratory of Intelligent Agricultural Machines and Complexes, Don State Technical University, 344000 Rostov-on-Don, Russia
| | | | - Vladimir Panchenko
- Department of Theoretical and Applied Mechanics, Russian University of Transport, 127994 Moscow, Russia;
| | | |
Collapse
|
16
|
Lakhan A, Morten Groenli T, Majumdar A, Khuwuthyakorn P, Hussain Khoso F, Thinnukool O. Potent Blockchain-Enabled Socket RPC Internet of Healthcare Things (IoHT) Framework for Medical Enterprises. SENSORS (BASEL, SWITZERLAND) 2022; 22:s22124346. [PMID: 35746127 PMCID: PMC9227973 DOI: 10.3390/s22124346] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/08/2022] [Revised: 05/31/2022] [Accepted: 06/06/2022] [Indexed: 06/12/2023]
Abstract
Present-day intelligent healthcare applications offer digital healthcare services to users in a distributed manner. The Internet of Healthcare Things (IoHT) is the mechanism of the Internet of Things (IoT) found in different healthcare applications, with devices that are attached to external fog cloud networks. Using different mobile applications connecting to cloud computing, the applications of the IoHT are remote healthcare monitoring systems, high blood pressure monitoring, online medical counseling, and others. These applications are designed based on a client-server architecture based on various standards such as the common object request broker (CORBA), a service-oriented architecture (SOA), remote method invocation (RMI), and others. However, these applications do not directly support the many healthcare nodes and blockchain technology in the current standard. Thus, this study devises a potent blockchain-enabled socket RPC IoHT framework for medical enterprises (e.g., healthcare applications). The goal is to minimize service costs, blockchain security costs, and data storage costs in distributed mobile cloud networks. Simulation results show that the proposed blockchain-enabled socket RPC minimized the service cost by 40%, the blockchain cost by 49%, and the storage cost by 23% for healthcare applications.
Collapse
Affiliation(s)
- Abdullah Lakhan
- Department of Computer Science, Dawood University of Engineering and Technology, Karachi 74800, Pakistan; (A.L.); (F.H.K.)
- Mobile Technology Lab (MOTEL), Department of Technology, Kristiania University College, Kirkegata 24-26, 0153 Oslo, Norway;
| | - Tor Morten Groenli
- Mobile Technology Lab (MOTEL), Department of Technology, Kristiania University College, Kirkegata 24-26, 0153 Oslo, Norway;
| | - Arnab Majumdar
- Faculty of Engineering, Imperial College London, London SW7 2AZ, UK;
| | | | - Fida Hussain Khoso
- Department of Computer Science, Dawood University of Engineering and Technology, Karachi 74800, Pakistan; (A.L.); (F.H.K.)
| | - Orawit Thinnukool
- College of Arts and Technology, Chiang Mai University, Chiang Mai 50200, Thailand;
| |
Collapse
|
17
|
Blockchain multi-objective optimization approach-enabled secure and cost-efficient scheduling for the Internet of Medical Things (IoMT) in fog-cloud system. Soft comput 2022. [DOI: 10.1007/s00500-022-07167-9] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
18
|
Parallel Meta-Heuristics for Solving Dynamic Offloading in Fog Computing. MATHEMATICS 2022. [DOI: 10.3390/math10081258] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
Abstract
The internet of things (IoT) concept has been extremely investigated in many modern smart applications, which enable a set of sensors to either process the collected data locally or send them to the cloud for remote processing. Unfortunately, cloud datacenters are located far away from IoT devices, and consequently, the transmission of IoT data may be delayed. In this paper, we investigate fog computing, which is a new paradigm that overcomes many issues of cloud computing. More importantly, dynamic task offloading in fog computing is a challenging problem that requires an optimal decision for processing the tasks that are generated in each time slot. Thus, exact optimization methods based on Lyapunov function have been widely used for solving dynamic offloading which represents an NP hard problem. To overcome the scalability issue of exact optimization techniques, we have explored famous population based meta-heuristics for optimizing the offloading process of a set of dynamic tasks using Orthogonal Frequency Division Multiplexing (OFDM) communication. Hence, a parallel multi-threading framework is proposed for generating the optimal offloading solution while selecting the best sub-carrier for each offloaded task. More importantly, our contribution associates a thread for each IoT device and generates a population of random solutions. Next, each population is updated and evaluated according to the proposed fitness function that considers a tradeoff between the delay and energy consumption. Upon the arrival of new tasks at each time slot, an evaluation is performed for maintaining some individuals of the previous population while generating new individuals based on some criteria. Our results have been compared to the results achieved using Lyapunov optimization. They demonstrate the convergence of the fitness function, the scalability of the parallel Particle Swarm Optimization (PSO) approach, and the performance in terms of the offline error and the execution cost.
Collapse
|
19
|
Nayak J, Meher SK, Souri A, Naik B, Vimal S. Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. THE JOURNAL OF SUPERCOMPUTING 2022; 78:14866-14891. [PMID: 35431452 PMCID: PMC8994862 DOI: 10.1007/s11227-022-04453-z] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 03/14/2022] [Indexed: 05/23/2023]
Abstract
The Internet of Medical Things (IoMT) is a bionetwork of allied medical devices, sensors, wearable biosensor devices, etc. It is gradually reforming the healthcare industry by leveraging its capabilities to improve personalized healthcare services by enabling seamless communication of medical data. IoMT facilitates prompt emergency responses and provides improved quality of medical services with minimum cost. With the advancement of modern technology, progressively ubiquitous medical devices raise critical security and data privacy concerns through resource constraints and open connectivity. Vulnerabilities in IoMT devices allow unauthorized access for potential entry into healthcare and sensitive personal data. In addition, the patient may experience severe physical damage with the attack on IoMT devices. To provide security to IoMT devices and privacy to patient data, we have proposed a novel IoMT framework with the hybridization of Bayesian optimization and extreme learning machine (ELM). The proposed model derives encouraging performance with enhanced accuracy in decision-making process compared to similar state-of-the-art methods.
Collapse
Affiliation(s)
- Janmenjoy Nayak
- Department of Computer Science, Maharaja Sriram Chandra Bhanja Deo (MSCB) University, Baripada, Odisha 757003 India
| | - Saroj K. Meher
- Systems Science and Informatics Unit, Indian Statistical Institute (ISI), Bangalore Centre, 8th Mile, Mysore Road, RVCE Post, Bangalore, 560059 India
| | - Alireza Souri
- Department of Computer Engineering, Haliç University, Istanbul, Turkey
| | - Bighnaraj Naik
- Department of Computer Application, Veer Surendra Sai University of Technology, Burla, Sambalpur, Odisha 768018 India
| | - S. Vimal
- Department of AI & DS, Ramco Institute of Technology, Rajapalayam, Tamil Nadu 626117 India
| |
Collapse
|
20
|
Lakhan A, Sodhro AH, Majumdar A, Khuwuthyakorn P, Thinnukool O. A Lightweight Secure Adaptive Approach for Internet-of-Medical-Things Healthcare Applications in Edge-Cloud-Based Networks. SENSORS 2022; 22:s22062379. [PMID: 35336549 PMCID: PMC8956015 DOI: 10.3390/s22062379] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/26/2022] [Revised: 03/17/2022] [Accepted: 03/18/2022] [Indexed: 12/04/2022]
Abstract
Mobile-cloud-based healthcare applications are increasingly growing in practice. For instance, healthcare, transport, and shopping applications are designed on the basis of the mobile cloud. For executing mobile-cloud applications, offloading and scheduling are fundamental mechanisms. However, mobile healthcare workflow applications with these methods are widely ignored, demanding applications in various aspects for healthcare monitoring, live healthcare service, and biomedical firms. However, these offloading and scheduling schemes do not consider the workflow applications’ execution in their models. This paper develops a lightweight secure efficient offloading scheduling (LSEOS) metaheuristic model. LSEOS consists of light weight, and secure offloading and scheduling methods whose execution offloading delay is less than that of existing methods. The objective of LSEOS is to run workflow applications on other nodes and minimize the delay and security risk in the system. The metaheuristic LSEOS consists of the following components: adaptive deadlines, sorting, and scheduling with neighborhood search schemes. Compared to current strategies for delay and security validation in a model, computational results revealed that the LSEOS outperformed all available offloading and scheduling methods for process applications by 10% security ratio and by 29% regarding delays.
Collapse
Affiliation(s)
- Abdullah Lakhan
- Department of Computer Science, Dawood University of Engineering and Technology, Karachi 74800, Pakistan;
- College of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou 325035, China
| | - Ali Hassan Sodhro
- Department of Computer Science, Kristianstad University, SE-291 88 Kristianstad, Sweden;
| | - Arnab Majumdar
- Department of Civil and Environmental Engineering, Imperial College London, London SW7 2AZ, UK;
| | | | - Orawit Thinnukool
- College of Arts, Media, and Technology, Chiang Mai University, Chiang Mai 50200, Thailand;
- Correspondence:
| |
Collapse
|
21
|
Call for Special Issue Papers: Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems. ACTA INFORMATICA PRAGENSIA 2022. [DOI: 10.18267/j.aip.175] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022] Open
|
22
|
Dootio MA, Lakhan A, Sodhro AH, Groenli TM, Bawany NZ, Kumar S. Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2022; 19:513-536. [PMID: 34903001 DOI: 10.3934/mbe.2022024] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
These days, the Industrial Internet of Healthcare Things (IIT) enabled applications have been growing progressively in practice. These applications are ubiquitous and run onto the different computing nodes for healthcare goals. The applications have these tasks such as online healthcare monitoring, live heartbeat streaming, and blood pressure monitoring and need a lot of resources for execution. In IIoHT, remote procedure call (RPC) mechanism-based applications have been widely designed with the network and computational delay constraints to run healthcare applications. However, there are many requirements of IIoHT applications such as security, network and computation, and failure efficient RPC with optimizing the quality of services of applications. In this study, the work devised the lightweight RPC mechanism for IIoHT applications and considered the hybrid constraints in the system. The study suggests the secure hybrid delay scheme (SHDS), which schedules all healthcare workloads under their deadlines. For the scheduling problem, the study formulated this problem based on linear integer programming, where all constraints are integer, as shown in the mathematical model. Simulation results show that the proposed SHDS scheme and lightweight RPC outperformed the hybrid for IIoHT applications and minimized 50% delays compared to existing RPC and their schemes.
Collapse
Affiliation(s)
- Mazhar Ali Dootio
- Research Lab of AI and Information Security, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh Pakistan
| | - Abdullah Lakhan
- Research Lab of AI and Information Security, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh Pakistan
- Kristiania University College, Department of Technology, Mobile Technology Lab, OSLO, Norway
| | - Ali Hassan Sodhro
- Department of Computer Science, Kristianstad University, SE-291 88 Kristianstad, Sweden
- Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518000, China
| | - Tor Morten Groenli
- Kristiania University College, Department of Technology, Mobile Technology Lab, OSLO, Norway
| | - Narmeen Zakaria Bawany
- Department of Computer Science and Software Engineering, Jinnah University for Women, Pakistan
| | | |
Collapse
|
23
|
Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J. RSM analysis based cloud access security broker: a systematic literature review. CLUSTER COMPUTING 2022; 25:3733-3763. [PMID: 35578669 PMCID: PMC9094129 DOI: 10.1007/s10586-022-03598-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/20/2021] [Revised: 02/08/2022] [Accepted: 04/20/2022] [Indexed: 05/05/2023]
Abstract
A Cloud Access Security Broker (CASB) is a security enforcement point or cloud-based software that is placed between cloud service users and cloud applications of cloud computing (CC) which is used to run the dimensionality, heterogeneity, and ambiguity correlated with cloud services. They permit the organization to amplify the reach of their security approaches past their claim framework to third-party computer programs and storage. In contrast to other systematic literature reviews (SLR), this one is directed at the client setting. To identify and evaluate methods to understand CASB, the SLR discusses the literature, citing a comprehension of the state-of-the-art and innovative characterization to describe. An SLR was performed to compile CASB related experiments and analyze how CASBs are designed and formed. These studies are then analyzed from different contexts, like motivation, usefulness, building approach, and decision method. The SLR has discussed the contrasts present between the studies and implementations, with planning accomplishments conducted with combinations of market-based courses of action, simulation tools, middleware's, etc. Search words with the keywords, which were extracted from the Research Questions (RQs), were utilized to recognize the essential consideration from the journal papers, conference papers, workshops, and symposiums. This SLR has distinguished 20 particular studies distributed from 2011 to 2021. Chosen studies were evaluated concurring to the defined RQs for their eminence and scope to particular CASB in this way recognizing a few gaps within the literature. Unlike other studies, this one concentrates on the customer's viewpoint. The survey uses a systematic analysis of the literature to discover and classify techniques for realizing CASB, resulting in a comprehensive grasp of the state-of-the-art and a novel taxonomy to describe CASBs. To assemble studies relating to CASB and investigate how CASB are engineered, a systematic literature review was done. These investigations are then evaluated from a variety of angles, including motivation, functionality, engineering approach, and methodology. Engineering efforts were directed at a combination of "market-based solutions", "middlewares", "toolkits", "algorithms", "semantic frameworks", and "conceptual frameworks", according to the study, which noted disparities in the studies' implementations. For further understanding, the different independent parameters influencing the CASB are studied using PCA (Principal Component Analysis). The outcome of their analysis was the identification of five parameters influencing the PCA analysis. The experimental results were used as input for Research Surface Methodology (RSM) to obtain an empirical model. For this, five-level coding was employed for developing the model and considered three dependent parameters and four center values. For more understanding of these independent variables' influence, on the CASB study, RSM analysis was employed. It was observed from the CCD (Central Composite Design) model that the actual values show significant influence with R2 = 0.90. This wide investigation reveals that CASB is still in a formative state. Even though vital advancement has been carried out in this zone, obvious challenges stay to be tended to, which have been highlighted in this paper.
Collapse
Affiliation(s)
- Shahnawaz Ahmad
- Department of Electrical Engineering, Jamia Millia Islamia, New Delhi, 110025 India
| | - Shabana Mehfuz
- Department of Electrical Engineering, Jamia Millia Islamia, New Delhi, 110025 India
| | - Fateh Mebarek-Oudina
- Department of Physics, Faculty of Sciences, University of 20 août 1955 - Skikda, B.P 26 Road El-Hadaiek, 21000 Skikda, Algeria
| | | |
Collapse
|
24
|
Alahmadi DH, Baothman FA, Alrajhi MM, Alshahrani FS, Albalawi HZ. Comparative analysis of blockchain technology to support digital transformation in ports and shipping. JOURNAL OF INTELLIGENT SYSTEMS 2021. [DOI: 10.1515/jisys-2021-0131] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/23/2022] Open
Abstract
Abstract
Blockchain is one of the technologies that can support digital transformation in industries in many aspects. This sophisticated technology can provide a decentralized, transparent, and secure environment for organizations and businesses. This review article discusses the adoption of blockchain in the ports and shipping industry to support digital transformation. It also explores the integration of this technology into the current ports and shipping ecosystem. Besides, the study highlighted the situation of the supply chains management in ports and shipping domain as a case study in this field. The investigated studies show that blockchain can be integrated into processes such as financial and document workflow. This review contributes to research by focusing on the adoption of blockchain in the ports and shipping industry to support digital transformation. It also aims to understand the existing port practice and map it with current tendencies based on blockchain. This study gives insight analysis to incorporate blockchain technology into ports and shipping processes globally.
Collapse
Affiliation(s)
- Dimah H. Alahmadi
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| | - Fatmah Abdulrahman Baothman
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| | - Mona M. Alrajhi
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| | - Fatimah S. Alshahrani
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| | - Hawazin Z. Albalawi
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| |
Collapse
|
25
|
Merlec MM, Lee YK, Hong SP, In HP. A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR. SENSORS (BASEL, SWITZERLAND) 2021; 21:7994. [PMID: 34883997 PMCID: PMC8659597 DOI: 10.3390/s21237994] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/26/2021] [Revised: 11/24/2021] [Accepted: 11/25/2021] [Indexed: 12/25/2022]
Abstract
A massive amount of sensitive personal data is being collected and used by scientists, businesses, and governments. This has led to unprecedented threats to privacy rights and the security of personal data. There are few solutions that empower individuals to provide systematic consent agreements on distinct personal information and control who can collect, access, and use their data for specific purposes and periods. Individuals should be able to delegate consent rights, access consent-related information, and withdraw their given consent at any time. We propose a smart-contract-based dynamic consent management system, backed by blockchain technology, targeting personal data usage under the general data protection regulation. Our user-centric dynamic consent management system allows users to control their personal data collection and consent to its usage throughout the data lifecycle. Transaction history and logs are recorded in a blockchain that provides trusted tamper-proof data provenance, accountability, and traceability. A prototype of our system was designed and implemented to demonstrate its feasibility. The acceptability and reliability of the system were assessed by experimental testing and validation processes. We also analyzed the security and privacy of the system and evaluated its performance.
Collapse
Affiliation(s)
- Mpyana Mwamba Merlec
- Department of Computer Science and Engineering, Korea University, Seoul 02841, Korea;
| | - Youn Kyu Lee
- Department of Computer Engineering, Hongik University, Seoul 04066, Korea
| | - Seng-Phil Hong
- Management Support Division, Hancom WITH, Inc., Pangyo 13493, Korea;
| | - Hoh Peter In
- Department of Computer Science and Engineering, Korea University, Seoul 02841, Korea;
| |
Collapse
|
26
|
lakhan A, Mohammed MA, Ibrahim DA, Abdulkareem KH. Bio-inspired robotics enabled schemes in blockchain-fog-cloud assisted IoMT environment. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2021. [DOI: 10.1016/j.jksuci.2021.11.009] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
27
|
Lakhan A, Dootio MA, Sodhro AH, Pirbhulal S, Groenli TM, Khokhar MS, Wang L. Cost-efficient service selection and execution and blockchain-enabled serverless network for internet of medical things. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2021; 18:7344-7362. [PMID: 34814252 DOI: 10.3934/mbe.2021363] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
These days, healthcare applications on the Internet of Medical Things (IoMT) network have been growing to deal with different diseases via different sensors. These healthcare sensors are connecting to the various healthcare fog servers. The hospitals are geographically distributed and offer different services to the patients from any ubiquitous network. However, due to the full offloading of data to the insecure servers, two main challenges exist in the IoMT network. (i) Data security of workflows healthcare applications between different fog healthcare nodes. (ii) The cost-efficient and QoS efficient scheduling of healthcare applications in the IoMT system. This paper devises the Cost-Efficient Service Selection and Execution and Blockchain-Enabled Serverless Network for Internet of Medical Things system. The goal is to choose cost-efficient services and schedule all tasks based on their QoS and minimum execution cost. Simulation results show that the proposed outperform all existing schemes regarding data security, validation by 10%, and cost of application execution by 33% in IoMT.
Collapse
Affiliation(s)
- Abdullah Lakhan
- Research Lab of AI and Information Security, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh Pakistan
- College of Computer Science and Artificial Intelligence, Wenzhou University, 325035, China
| | - Mazhar Ali Dootio
- Research Lab of AI and Information Security, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh Pakistan
| | - Ali Hassan Sodhro
- Department of Computer and System Science, Mid Sweden University, Ostersund, Sweden
- Department of Computer Science, Kristianstad University, SE-291 88 Kristianstad, Sweden
- Shenzhen Institues of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518000, China
| | - Sandeep Pirbhulal
- Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gjovik 2815, Norway
- Norwegian Computing Center, P.O. Box 114, Blindern, Oslo 0314, Norway
| | - Tor Morten Groenli
- Kristiania University College, Department of Technology, Mobile Technology Lab
| | - Muhammad Saddam Khokhar
- Research Lab of AI and Information Security, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh Pakistan
| | - Lei Wang
- Shenzhen Institues of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518000, China
| |
Collapse
|
28
|
Hybrid Workload Enabled and Secure Healthcare Monitoring Sensing Framework in Distributed Fog-Cloud Network. ELECTRONICS 2021. [DOI: 10.3390/electronics10161974] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
The Internet of Medical Things (IoMT) workflow applications have been rapidly growing in practice. These internet-based applications can run on the distributed healthcare sensing system, which combines mobile computing, edge computing and cloud computing. Offloading and scheduling are the required methods in the distributed network. However, a security issue exists and it is hard to run different types of tasks (e.g., security, delay-sensitive, and delay-tolerant tasks) of IoMT applications on heterogeneous computing nodes. This work proposes a new healthcare architecture for workflow applications based on heterogeneous computing nodes layers: an application layer, management layer, and resource layer. The goal is to minimize the makespan of all applications. Based on these layers, the work proposes a secure offloading-efficient task scheduling (SEOS) algorithm framework, which includes the deadline division method, task sequencing rules, homomorphic security scheme, initial scheduling, and the variable neighbourhood searching method. The performance evaluation results show that the proposed plans outperform all existing baseline approaches for healthcare applications in terms of makespan.
Collapse
|
29
|
Nsaif MK, Mahdi BA, Bahar Al-Mayouf YR, Mahdi OA, Aljaaf AJ, Khan S. An online COVID-19 self-assessment framework supported by IoMT technology. JOURNAL OF INTELLIGENT SYSTEMS 2021. [DOI: 10.1515/jisys-2021-0048] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/19/2022] Open
Abstract
Abstract
As COVID-19 pandemic continued to propagate, millions of lives are currently at risk especially elderly, people with chronic conditions and pregnant women. Iraq is one of the countries affected by the COVID-19 pandemic. Currently, in Iraq, there is a need for a self-assessment tool to be available in hand for people with COVID-19 concerns. Such a tool would guide people, after an automated assessment, to the right decision such as seeking medical advice, self-isolate, or testing for COVID-19. This study proposes an online COVID-19 self-assessment tool supported by the internet of medical things (IoMT) technology as a means to fight this pandemic and mitigate the burden on our nation’s healthcare system. Advances in IoMT technology allow us to connect all medical tools, medical databases, and devices via the internet in one collaborative network, which conveys real-time data integration and analysis. Our IoMT framework-driven COVID-19 self-assessment tool will capture signs and symptoms through multiple probing questions, storing the data to our COVID-19 patient database, then analyze the data to determine whether a person needs to be tested for COVID-19 or other actions may require to be taken. Further to this, collected data can be integrated and analyzed collaboratively for developing a national health policy and help to manage healthcare resources more efficiently. The IoMT framework-driven online COVID-19 self-assessment tool has a big potential to prevent our healthcare system from being overwhelmed using real-time data collection, COVID-19 databases, analysis, and management of people with COVID-19 concerns, plus providing proper guidance and course of action.
Collapse
Affiliation(s)
- Mohammed Kamal Nsaif
- Department of Computer Sciences, College of Education for Pure Sciences-Ibn Al-Haitham, University of Baghdad , Baghdad , Iraq
| | - Bilal Adil Mahdi
- Ministry of Education, General Directorate of Education Al-Kharkh/Al-Awala , Baghdad , Iraq
| | - Yusor Rafid Bahar Al-Mayouf
- Department of Computer Sciences, College of Education for Pure Sciences-Ibn Al-Haitham, University of Baghdad , Baghdad , Iraq
| | - Omar Adil Mahdi
- Department of Computer Sciences, College of Education for Pure Sciences-Ibn Al-Haitham, University of Baghdad , Baghdad , Iraq
| | | | - Suleman Khan
- Department of Computer and Information Sciences, Northumbria University , Newcastle upon Tyne NE1 8ST , United Kingdom
| |
Collapse
|
30
|
Multi-Layer Latency Aware Workload Assignment of E-Transport IoT Applications in Mobile Sensors Cloudlet Cloud Networks. ELECTRONICS 2021. [DOI: 10.3390/electronics10141719] [Citation(s) in RCA: 18] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
These days, with the emerging developments in wireless communication technologies, such as 6G and 5G and the Internet of Things (IoT) sensors, the usage of E-Transport applications has been increasing progressively. These applications are E-Bus, E-Taxi, self-autonomous car, E-Train and E-Ambulance, and latency-sensitive workloads executed in the distributed cloud network. Nonetheless, many delays present in cloudlet-based cloud networks, such as communication delay, round-trip delay and migration during the workload in the cloudlet-based cloud network. However, the distributed execution of workloads at different computing nodes during the assignment is a challenging task. This paper proposes a novel Multi-layer Latency (e.g., communication delay, round-trip delay and migration delay) Aware Workload Assignment Strategy (MLAWAS) to allocate the workload of E-Transport applications into optimal computing nodes. MLAWAS consists of different components, such as the Q-Learning aware assignment and the Iterative method, which distribute workload in a dynamic environment where runtime changes of overloading and overheating remain controlled. The migration of workload and VM migration are also part of MLAWAS. The goal is to minimize the average response time of applications. Simulation results demonstrate that MLAWAS earns the minimum average response time as compared with the two other existing strategies.
Collapse
|
31
|
Lakhan A, Abed Mohammed M, Kadry S, Hameed Abdulkareem K, Taha AL-Dhief F, Hsu CH. Federated learning enables intelligent reflecting surface in fog-cloud enabled cellular network. PeerJ Comput Sci 2021; 7:e758. [PMID: 34901423 PMCID: PMC8627228 DOI: 10.7717/peerj-cs.758] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/15/2021] [Accepted: 10/04/2021] [Indexed: 05/22/2023]
Abstract
The intelligent reflecting surface (IRS) is a ground-breaking technology that can boost the efficiency of wireless data transmission systems. Specifically, the wireless signal transmitting environment is reconfigured by adjusting a large number of small reflecting units simultaneously. Therefore, intelligent reflecting surface (IRS) has been suggested as a possible solution for improving several aspects of future wireless communication. However, individual nodes are empowered in IRS, but decisions and learning of data are still made by the centralized node in the IRS mechanism. Whereas, in previous works, the problem of energy-efficient and delayed awareness learning IRS-assisted communications has been largely overlooked. The federated learning aware Intelligent Reconfigurable Surface Task Scheduling schemes (FL-IRSTS) algorithm is proposed in this paper to achieve high-speed communication with energy and delay efficient offloading and scheduling. The training of models is divided into different nodes. Therefore, the trained model will decide the IRSTS configuration that best meets the goals in terms of communication rate. Multiple local models trained with the local healthcare fog-cloud network for each workload using federated learning (FL) to generate a global model. Then, each trained model shared its initial configuration with the global model for the next training round. Each application's healthcare data is handled and processed locally during the training process. Simulation results show that the proposed algorithm's achievable rate output can effectively approach centralized machine learning (ML) while meeting the study's energy and delay objectives.
Collapse
Affiliation(s)
- Abdullah Lakhan
- College of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou, China
| | - Mazin Abed Mohammed
- College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq
| | | | | | - Fahad Taha AL-Dhief
- Faculty of Engineering, School of Electrical Engineering, UniversitiTeknologi Malaysia (UTM), Johor Bahru, Malaysia
| | - Ching-Hsien Hsu
- Department of Computer Science and Information Engineering, Asia University, Taiwan
- Guangdong-Hong Kong-Macao Joint Laboratory for Intelligent Micro-Nano Optoelectronic Technology, School of Mathematics and Big Data, Foshan University, Foshan, China
- Department of Medical Research, China Medical University Hospital, China Medical University, Taiwan
| |
Collapse
|