Search results

1 – 10 of 219
Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran and Kamal Gulati

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…

Abstract

Purpose

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with multiple gateways. It entails IoMT devices and wearables connecting to exchange sensitive data with a sensor node which performs the aggeration process and then communicates the data using a Fog server. If the aggregator sensor loses the connection from the Fog server, it will be unable to submit data directly to the Fog server. The node transmits encrypted information with a neighboring sensor and sends it to the Fog server integrated with federated learning, which encrypts data to the existing data. The fog server performs the operations on the measured data, and the values are stored in the local storage area and later it is updated to the cloud server.

Design/methodology/approach

SHDCT uses an Internet-of-things (IoT)-based monitoring network, making it possible for smart devices to connect and interact with each other. The main purpose of the monitoring network has been in the collection of biological data and additional information from mobile devices to the patients. The monitoring network is composed of three different types of smart devices that is at the heart of the IoT.

Findings

It has been addressed in this work how to design an architecture for safe data aggregation in heterogeneous IoT-federated learning-enabled wireless sensor networks (WSNs), which makes use of basic encoding and data aggregation methods to achieve this. The authors suggest that the small gateway node (SGN) captures all of the sensed data from the SD and uses a simple, lightweight encoding scheme and cryptographic techniques to convey the data to the gateway node (GWN). The GWN gets all of the medical data from SGN and ensures that the data is accurate and up to date. If the data obtained is trustworthy, then the medical data should be aggregated and sent to the Fog server for further processing. The Java programming language simulates and analyzes the proposed SHDCT model for deployment and message initiation. When comparing the SHDCT scheme to the SPPDA and electrohydrodynamic atomisation (EHDA) schemes, the results show that the SHDCT method performs significantly better. When compared with the SPPDA and EHDA schemes, the suggested SHDCT plan necessitates a lower communication cost. In comparison to EHDA and SPPDA, SHDCT achieves 4.72% and 13.59% less, respectively. When compared to other transmission techniques, SHDCT has a higher transmission ratio. When compared with EHDA and SPPDA, SHDCT achieves 8.47% and 24.41% higher transmission ratios, respectively. When compared with other ways it uses less electricity. When compared with EHDA and SPPDA, SHDCT achieves 5.85% and 18.86% greater residual energy, respectively.

Originality/value

In the health care sector, a series of interconnected medical devices collect data using IoT networks in the health care domain. Preventive, predictive, personalized and participatory care is becoming increasingly popular in the health care sector. Safe data collection and transfer to a centralized server is a challenging scenario. This study presents a mechanism for SHDCT. The mechanism consists of Smart healthcare IoT devices working on federated learning that link up with one another to exchange health data. Health data is sensitive and needs to be exchanged securely and efficiently. In the mechanism, the sensing devices send data to a SGN. This SGN uses a lightweight encoding scheme and performs cryptography techniques to communicate the data with the GWN. The GWN gets all the health data from the SGN and makes it possible to confirm that the data is validated. If the received data is reliable, then aggregate the medical data and transmit it to the Fog server for further process. The performance parameters are compared with the other systems in terms of communication costs, transmission ratio and energy use.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 September 2018

Mohan Liyanage, Chii Chang and Satish Narayana Srirama

The distant data centre-centric Internet of Things (IoT) systems face the latency issue especially in the real-time-based applications, such as augmented reality, traffic…

Abstract

Purpose

The distant data centre-centric Internet of Things (IoT) systems face the latency issue especially in the real-time-based applications, such as augmented reality, traffic analytics and ambient assisted living. Recently, Fog computing models have been introduced to overcome the latency issue by using the proximity-based computational resources, such as the computers co-located with the cellular base station, grid router devices or computers in local business. However, the increasing users of Fog computing servers cause bottleneck issues and consequently the latency issue arises again. This paper aims to introduce the utilisation of Mist computing (Mist) model, which exploits the computational and networking resources from the devices at the very edge of the IoT networks.

Design/methodology/approach

This paper proposes a service-oriented mobile-embedded Platform as a Service (mePaaS) framework that allows the mobile device to provide a flexible platform for proximal users to offload their computational or networking program to mePaaS-based Mist computing node.

Findings

The prototype has been tested and performance has been evaluated on the real-world devices. The evaluation results have shown the promising nature of mePaaS.

Originality/value

The proposed framework supports resource-aware autonomous service configuration that can manage the availability of the functions provided by the Mist node based on the dynamically changing hardware resource availability. In addition, the framework also supports task distribution among a group of Mist nodes.

Details

International Journal of Pervasive Computing and Communications, vol. 14 no. 3/4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 December 2021

Jiuhong Yu, Mengfei Wang, Yu J.H. and Seyedeh Maryam Arefzadeh

This paper aims to offer a hybrid genetic algorithm and the ant colony optimization (GA-ACO) algorithm for task mapping and resource management. The paper aims to reduce the…

Abstract

Purpose

This paper aims to offer a hybrid genetic algorithm and the ant colony optimization (GA-ACO) algorithm for task mapping and resource management. The paper aims to reduce the makespan and total response time in fog computing- medical cyber-physical system (FC-MCPS).

Design/methodology/approach

Swift progress in today’s medical technologies has resulted in a new kind of health-care tool and therapy techniques like the MCPS. The MCPS is a smart and reliable mechanism of entrenched clinical equipment applied to check and manage the patients’ physiological condition. However, the extensive-delay connections among cloud data centers and medical devices are so problematic. FC has been introduced to handle these problems. It includes a group of near-user edge tools named fog points that are collaborating until executing the processing tasks, such as running applications, reducing the utilization of a momentous bulk of data and distributing the messages. Task mapping is a challenging problem for managing fog-based MCPS. As mapping is an non-deterministic pol ynomial-time-hard optimization issue, this paper has proposed a procedure depending on the hybrid GA-ACO to solve this problem in FC-MCPS. ACO and GA, that is applied in their standard formulation and combined as hybrid meta-heuristics to solve the problem. As such ACO-GA is a hybrid meta-heuristic using ACO as the main approach and GA as the local search. GA-ACO is a memetic algorithm using GA as the main approach and ACO as local search.

Findings

MATLAB is used to simulate the proposed method and compare it to the ACO and MACO algorithms. The experimental results have validated the improvement in makespan, which makes the method a suitable one for use in medical and real-time systems.

Research limitations/implications

The proposed method can achieve task mapping in FC-MCPS by attaining high efficiency, which is very significant in practice.

Practical implications

The proposed approach can achieve the goal of task scheduling in FC-MCPS by attaining the highest total computational efficiency, which is very significant in practice.

Originality/value

This research proposes a GA-ACO algorithm to solve the task mapping in FC-MCPS. It is the most significant originality of the paper.

Details

Circuit World, vol. 49 no. 3
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 28 February 2023

Tulsi Pawan Fowdur, M.A.N. Shaikh Abdoolla and Lokeshwar Doobur

The purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality…

Abstract

Purpose

The purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality assessment (VQA) and a phishing detection application by using the edge, fog and cloud computing paradigms.

Design/methodology/approach

The VQA algorithm was developed using Android Studio and run on a mobile phone for the edge paradigm. For the fog paradigm, it was hosted on a Java server and for the cloud paradigm on the IBM and Firebase clouds. The phishing detection algorithm was embedded into a browser extension for the edge paradigm. For the fog paradigm, it was hosted on a Node.js server and for the cloud paradigm on Firebase.

Findings

For the VQA algorithm, the edge paradigm had the highest response time while the cloud paradigm had the lowest, as the algorithm was computationally intensive. For the phishing detection algorithm, the edge paradigm had the lowest response time, and the cloud paradigm had the highest, as the algorithm had a low computational complexity. Since the determining factor for the response time was the latency, the edge paradigm provided the smallest delay as all processing were local.

Research limitations/implications

The main limitation of this work is that the experiments were performed on a small scale due to time and budget constraints.

Originality/value

A detailed analysis with real applications has been provided to show how the complexity of an application can determine the best computing paradigm on which it can be deployed.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 29 October 2020

Abdulrahman Alamer

Employing a fog computing (FC) network system in the robotic network system is an effective solution to support robotic application issues. The interconnection between robotic…

Abstract

Purpose

Employing a fog computing (FC) network system in the robotic network system is an effective solution to support robotic application issues. The interconnection between robotic devices through an FC network can be referred as the Internet of Robotic Things (IoRT). Although the FC network system can provide number of services closer to IoRT devices, it still faces significant challenges including real-time tracing services and a secure tracing services. Therefore, this paper aims to provide a tracking mobile robot devices in a secure and private manner, with high efficiency performance, is considered essential to ensuring the success of IoRT network applications.

Design/methodology/approach

This paper proposes a secure anonymous tracing (SAT) method to support the tracing of IoRT devices through a FC network system based on the Counting Bloom filter (CBF) and elliptic curve cryptography techniques. With the proposed SAT mechanism, a fog node can trace a particular robot device in a secure manner, which means that the fog node can provide a service to a particular robot device without revealing any private data such as the device's identity or location.

Findings

Analysis shows that the SAT mechanism is both efficient and resilient against tracing attacks. Simulation results are provided to show that the proposed mechanism is beneficial to support IoRT applications over an FC network system.

Originality/value

This paper represents a SAT method based on CBF and elliptic curve cryptography techniques as an efficient mechanism that is resilient against tracing attacks.

Details

Library Hi Tech, vol. 40 no. 4
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 3 March 2020

Xin Yang and Nazanin Rahmani

In the past, with the development of the internet of things (IoT), this paper aims to consider fog computing (FC) as an efficient accompaniment to the cloud to control the IoT’s…

Abstract

Purpose

In the past, with the development of the internet of things (IoT), this paper aims to consider fog computing (FC) as an efficient accompaniment to the cloud to control the IoT’s information and relation requirements. Wholly, FC is placed carefully around the IoT systems/sensors and develops cloud-based computing, memory and networking devices. Fog shares many similarities with the cloud, but the only difference between them is its location, in which fog devices are very close to end-users to process and respond to the client in less time. On the other hand, this system is useful for real-time flowing programs, sensor systems, and IoT that need high speed and reliable internet connectivity. However, there are many applications such as remote healthcare and medical cyber-physical systems, where low latency is needed. To reduce the latency of FC, the task scheduler plays a vital role. The task scheduling means to devote the task to fog resources in an efficient way. Yet, according to the findings, in spite of the preference of task scheduling techniques in the FC, there is not any review and research in this case. So, this paper offers systematic literature research about the available task scheduling techniques. In addition, the advantages and disadvantages associated with different task scheduling processes are considered, and the main challenges of them are addressed to design a more efficient task scheduler in the future. Additionally, according to the seen facts, future instructions are provided for these studies.

Design/methodology/approach

The paper complies with the methodological requirements of systematic literature reviews (SLR). The present paper investigates the newest systems and studies their practical techniques in detail. The applications of task scheduling mechanisms in FC have been categorized into two major groups, including heuristic and meta-heuristic.

Findings

Particularly, the replies to the project problem analyzed task scheduling are principal aim, present problems, project terminologies, methods and approaches in the fog settings. The authors tried to design his systematic discussion as precisely as possible. However, it might have still endured various confidence risks.

Research limitations/implications

This study aimed to be comprehensive but there were some limitations. First, the usage of affair scheduling in fog settings are contained in many places such as editorial notes, academic publications, technical writings, Web pages and so on. The published papers in national magazines were omitted. Also, the papers with the purpose of a special task scheduling issue, which probably consider other subjects rather than affair planning issue are omitted. So, in the competence of this study, this systematic analysis must be considered as the studies published in the central international FC journals. Second, the given issues might not have considered the general task scheduling area, which points to the possibility of describing more related questions that could be described. Third, research and publication bias: five confident electronic databases were chosen based on past study experiments. Finally, the numbers show that these five electronic databases must suggest the most related and reliable projects. Yet, selecting all main performing projects has not been confirmed. Probably some effective projects were omitted throughout the processes in Section 3. Different from the conclusion, changing from the search string to the information extraction exists, and the authors tried to exclude this by satisfying the source in central projects.

Practical implications

The results of this survey will be valuable for academicians, and it can provide visions into future research areas in this domain. Moreover, the disadvantages and advantages of the above systems have been studied, and their key issues have been emphasized to develop a more effective task scheduling mechanisms in the FC mechanisms.

Originality/value

It is useful to show the authors the state-of-the-art in the fog task scheduling area. The consequences of this project make researchers provide a more effective task planning approach in fog settings.

Details

Kybernetes, vol. 50 no. 1
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 29 January 2020

Chao Fu, Qing Lv and Reza G. Badrnejad

Fog computing (FC) is a new field of research and has emerged as a complement to the cloud, which can mitigate the problems inherent to the cloud computing (CC) and internet of…

Abstract

Purpose

Fog computing (FC) is a new field of research and has emerged as a complement to the cloud, which can mitigate the problems inherent to the cloud computing (CC) and internet of things (IoT) model such as unreliable latency, bandwidth constraints, security and mobility. Because there is no comprehensive study on the FC in health management processing systems techniques, this paper aims at surveying and analyzing the existing techniques systematically as well as offering some suggestions for upcoming works.

Design/methodology/approach

The paper complies with the methodological requirements of systematic literature reviews (SLR). The present paper investigates the newest systems and studies their practical techniques in detail. The applications of FC in health management systems have been categorized into three major groups, including review articles, data analysis, frameworks and models mechanisms.

Findings

The results have indicated that despite the popularity of FC as having real-time processing, low latency, dynamic configuration, scalability, low reaction time (less than a second), high bandwidth, battery life and network traffic, a few issues remain unanswered, such as security. The most recent research has focused on improvements in remote monitoring of the patients, such as less latency and rapid response. Also, the results have shown the application of qualitative methodology and case study in the use of FC in health management systems. While FC studies are growing in the clinical field, CC studies are decreasing.

Research limitations/implications

This study aims to be comprehensive, but there are some limitations. This research has only surveyed the articles that are mined, according to a keyword exploration of FC health, FC health care, FC health big data and FC health management system. Fog-based applications in the health management system may not be published with determined keywords. Moreover, the publications written in non-English languages have been ignored. Some important research studies may be printed in a language other than English.

Practical implications

The results of this survey will be valuable for academicians, and these can provide visions into future research areas in this domain. This survey helps the hospitals and related industries to identify FC needs. Moreover, the disadvantages and advantages of the above systems have been studied, and their key issues have been emphasized to develop a more effective FC in health management processing mechanisms over IoT in the future.

Originality/value

Previous literature review studies in the field of SLR have used a simple literature review to find the tasks and challenges in the field. In this study, for the first time, the FC in health management processing systems is applied in a systematic review focused on the mediating role of the IoT and thereby provides a novel contribution. An SLR is conducted to find more specific answers to the proposed research questions. SLR helps to reduce implicit researcher bias. Through the adoption of broad search strategies, predefined search strings and uniform inclusion and exclusion criteria, SLR effectively forces researchers to search for studies beyond their subject areas and networks.

Details

Kybernetes, vol. 49 no. 12
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 18 April 2023

Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…

Abstract

Purpose

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.

Design/methodology/approach

Design Science Research (DSR) is the research method implemented in this study.

Findings

General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.

Research limitations/implications

The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.

Practical implications

Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.

Originality/value

The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Article
Publication date: 3 July 2020

Mohammad Khalid Pandit, Roohie Naaz Mir and Mohammad Ahsan Chishti

The intelligence in the Internet of Things (IoT) can be embedded by analyzing the huge volumes of data generated by it in an ultralow latency environment. The computational…

Abstract

Purpose

The intelligence in the Internet of Things (IoT) can be embedded by analyzing the huge volumes of data generated by it in an ultralow latency environment. The computational latency incurred by the cloud-only solution can be significantly brought down by the fog computing layer, which offers a computing infrastructure to minimize the latency in service delivery and execution. For this purpose, a task scheduling policy based on reinforcement learning (RL) is developed that can achieve the optimal resource utilization as well as minimum time to execute tasks and significantly reduce the communication costs during distributed execution.

Design/methodology/approach

To realize this, the authors proposed a two-level neural network (NN)-based task scheduling system, where the first-level NN (feed-forward neural network/convolutional neural network [FFNN/CNN]) determines whether the data stream could be analyzed (executed) in the resource-constrained environment (edge/fog) or be directly forwarded to the cloud. The second-level NN ( RL module) schedules all the tasks sent by level 1 NN to fog layer, among the available fog devices. This real-time task assignment policy is used to minimize the total computational latency (makespan) as well as communication costs.

Findings

Experimental results indicated that the RL technique works better than the computationally infeasible greedy approach for task scheduling and the combination of RL and task clustering algorithm reduces the communication costs significantly.

Originality/value

The proposed algorithm fundamentally solves the problem of task scheduling in real-time fog-based IoT with best resource utilization, minimum makespan and minimum communication cost between the tasks.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 13 no. 3
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 5 August 2019

Mohammad Irfan Bala and Mohammad Ahsan Chishti

Fog computing is a new field of research and has emerged as a complement to the cloud which can mitigate the problems inherent to the cloud computing model such as unreliable…

Abstract

Purpose

Fog computing is a new field of research and has emerged as a complement to the cloud which can mitigate the problems inherent to the cloud computing model such as unreliable latency, bandwidth constraints, security and mobility. This paper aims to provide detailed survey in the field of fog computing covering the current state-of-the-art in fog computing.

Design/methodology/approach

Cloud was developed for IT and not for Internet of Things (IoT); as a result, cloud is unable to meet the computing, storage, control and networking demands of the IoT applications. Fog is a companion for the cloud and aims to extend the cloud capabilities to the edge of the network.

Findings

Lack of survey papers in the area of fog computing was an important motivational factor for writing this paper. This paper highlights the capabilities of the fog computing and where it fits in between IoT and cloud. This paper has also presented architecture of the fog computing model and its characteristics. Finally, the challenges in the field of fog computing have been discussed in detail which need to be overcome to realize its full potential.

Originality/value

This paper presents the current state-of-the-art in fog computing. Lack of such papers increases the importance of this paper. It also includes challenges and opportunities in the fog computing and various possible solutions to overcome those challenges.

Details

International Journal of Pervasive Computing and Communications, vol. 15 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 219