Fog computing architectures for healthcare

2016 ◽  
Vol 14 (4) ◽  
pp. 334-349 ◽  
Author(s):  
Lisardo Prieto González ◽  
Corvin Jaedicke ◽  
Johannes Schubert ◽  
Vladimir Stantchev

Purpose The purpose of this study is to analyze how embedding of self-powered wireless sensors into cloud computing further enables such a system to become a sustainable part of work environment. Design/methodology/approach This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT project in Germany. A clearly outlined three-layer architecture, in the sense of Internet of Things, is presented. It provides the basis for integrating a broad range of sensors into smart healthcare infrastructure. More specifically, by making use of short-range communication sensors (sensing layer), gateways which implement data transmission and low-level computation (fog layer) and cloud computing for processing the data (application layer). Findings A technical in-depth analysis of the first two layers of the infrastructure is given to prove reliability and to determine the communication quality and availability in real-world scenarios. Furthermore, two example use-cases that directly apply to a healthcare environment are examined, concluding with the feasibility of the presented approach. Practical implications Finally, the next research steps, oriented towards the semantic tagging and classification of data received from sensors, and the usage of advanced artificial intelligence-based algorithms on this information to produce useful knowledge, are described together with the derived social benefits. Originality/value The work presents an innovative, extensible and scalable system, proven to be useful in healthcare environments.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Dengdeng Wanyan ◽  
Tong Shang

Purpose The purpose of this paper is to investigate the significant advantages of cloud technology in digital cultural heritage construction by analyzing public culture cloud platforms in China. The authors hope to provide references for other countries and regions on the applications of cloud computing techniques in digital cultural construction. Design/methodology/approach The primary research methods involved interview and case analysis. A comprehensive understanding of cloud technology and China’s culture cloud platforms were gained through research into extensive amounts of literature. Analyzing 21 culture cloud platforms offers a general understanding of culture clouds, while the Hunan Public Culture Cloud acts as a representative sample that gives detailed insight. Findings This paper explores the considerable advantages of cloud computing in digital cultural construction from four aspects: integration of decentralized heterogeneous resources, coordination and cooperation, accurately matching user needs and promotion of balanced service development. Originality/value Existing studies fall short of comprehensive investigations of culture cloud platforms and in-depth analysis of the advantages of cloud technology applications. This paper uses the construction of public culture cloud platforms in China as the research object. Further, this paper compares the construction status of different culture cloud platforms.


2019 ◽  
Vol 37 (2) ◽  
pp. 201-227 ◽  
Author(s):  
Abhinava Tripathi ◽  
Alok Dixit ◽  
Vipul Vipul

Purpose The purpose of this study is to systematically review and analyze the literature in the area of liquidity of financial markets. The study summarizes the key findings and approaches and highlights the research gaps in the extant literature. Design/methodology/approach A variety of reputed databases are utilized to select 100 research papers, from a large pool of nearly 3,000 research papers spanning between 1972 and 2018 using systematic literature review methodology. The selected research papers are organized to provide an in-depth analysis and an account of the ongoing research in the area of liquidity. The study uses bibliometric network visualization and word-cloud analyses to compile and analyze the literature. Findings The study summarizes the recent approaches in the liquidity research on aspects such as methodologies followed, variables applied, sub-areas covered, and the types of economies and markets covered. The article shows that the literature on liquidity in the emerging markets (e.g. China and India) is deficient. Overall, the following research areas related to liquidity need further exploration in the context of emerging markets: liquidity beyond the best bid-ask quotes, intraday return predictability using microstructure variables (e.g. order imbalances), impact of algorithmic-trading and volatility of liquidity. Originality/value To the best of authors’ knowledge, in the recent past, a detailed account of the literature on liquidity has not been published. It provides a comprehensive collection and classification of the literature on the liquidity of financial markets. This would be helpful to the future researchers, academics and practitioners in the area of financial markets.


2020 ◽  
Vol 30 (5) ◽  
pp. 1503-1520
Author(s):  
Taohua Ouyang ◽  
Xin Cao ◽  
Jun Wang ◽  
Sixuan Zhang

PurposeIn this study, the authors aim to address the following two research questions: (1) How do technology innovation paradoxes manifest themselves in technological changes? (2) How do incumbent firms manage technology innovation paradoxes through multi-level organizational ambidexterity? To do so, the authors examine technology innovation in cloud computing, which has taken shape and brought about changes to the information technology industry. Specifically, the authors examine how a traditional software company, China Standard Software Co., Ltd. (CS2C), successfully navigated the technological transition to cloud computing from its existing operating systems business by managing innovation paradoxes through multi-level ambidexterity capabilities.Design/methodology/approachThis study examines a single exploratory case and conducts an in-depth analysis of how technology innovation paradoxes manifest themselves in technological changes and how incumbent firms manage technology innovation paradoxes through multi-level organizational ambidexterity. The data collection and analysis occurred simultaneously through three phases. In Phase 1, one of the authors who had worked at CS2C for many years enabled the authors to obtain access to the company. The data analysis during this phase provided the authors with the history and current situation of CS2C, enabling them to understand the external circumstances, such as particular historical period, and internal conditions, such as cultural and technological changes, that would be relevant throughout the course of their study. It also helped the authors identify organizational ambidexterity capability as the guiding theoretical concept for their research. In Phase 2, the authors engaged in site visits and conducted detailed interviews with employees working at CS2C. In Phase 3, most of the data analysis was conducted. When the interview data were not sufficient to support the theoretical analysis, additional data were collected via phone calls and emails, to assure data-theory-model alignment.FindingsThe authors’ findings show that technology innovation paradoxes manifest themselves as contradictory relationships and mutual support relationships between exploitative and exploratory innovation. In addition, the authors identify three integration mechanisms as key to multi-level organizational ambidexterity capabilities in managing technology innovation paradoxes in technological changes.Originality/valueThree important theoretical implications can be drawn from our case analysis. First, this research contributes to the knowledge of innovation paradoxes during technological changes. Second, this research provides a model of multi-level organizational ambidexterity capability in technological changes. Third, this research proposes three integration mechanisms driven by three types of ambidexterity capability at different organizational levels.


2020 ◽  
Vol 28 (5) ◽  
pp. 763-800
Author(s):  
Mhamed Zineddine

Purpose Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing limitations. However, selecting a trustworthy node from the fog network still presents serious challenges. This paper aims to propose an algorithm intended to mitigate the trust and the security issues related to selecting a node of a fog network. Design/methodology/approach The proposed model/algorithm is based on two main concepts, namely, machine learning using fuzzy neural networks (FNNs) and the weighted weakest link (WWL) algorithm. The crux of the proposed model is to be trained, validated and used to classify the fog nodes according to their trust scores. A total of 2,482 certified computing products, in addition to a set of nodes composed of multiple items, are used to train, validate and test the proposed model. A scenario including nodes composed of multiple computing items is designed for applying and evaluating the performance of the proposed model/algorithm. Findings The results show a well-performing trust model with an accuracy of 0.9996. Thus, the end-users of FC services adopting the proposed approach could be more confident when selecting elected fog nodes. The trained, validated and tested model was able to classify the nodes according to their trust level. The proposed model is a novel approach to fog nodes selection in a fog network. Research limitations/implications Certainly, all data could be collected, however, some features are very difficult to have their scores. Available techniques such as regression analysis and the use of the experts have their own limitations. Experts might be subjective, even though the author used the fuzzy group decision-making model to mitigate the subjectivity effect. A methodical evaluation by specialized bodies such as the security certification process is paramount to mitigate these issues. The author recommends the repetition of the same study when data form such bodies is available. Originality/value The novel combination of FNN and WWL in a trust model mitigates uncertainty, subjectivity and enables the trust classification of complex FC nodes. Furthermore, the combination also allowed the classification of fog nodes composed of diverse computing items, which is not possible without the WWL. The proposed algorithm will provide the required intelligence for end-users (devices) to make sound decisions when requesting fog services.


Author(s):  
S. Vaithyasubramanian S. Vaithyasubramanian ◽  
R. Sundararajan

Purpose Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in all authentication process, as the usage of computing facilities and electronic devices have developed hugely to access networks. Over the years with the increase in numerous Web developments and internet applications, each platform needs ID and password validation for individual users. Design/methodology/approach In the technological development of cloud computing, in recent times, it is facing security issues. Data theft, data security, denial of service, patch management, encryption management, key management, storage security and authentication are some of the issues and challenges in cloud computing. Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password. Markov passwords – a rule-based password formation are created or generated by using Markov chain. Representation of Markov password formation can be done by state space diagram or transition probability matrix. State space classification of Markov chain is one of the basic and significant properties. The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper. Analysis on strength of obvious password of length eight has shown range of 7%–9% although the converted Markov password has shown more than 82%. As an effective methodology, this password authentication can be implemented in cloud portal and password login validation process. Findings The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper. Originality/value Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Juan Manuel Maqueira Marín ◽  
Diessica De Oliveira-Dias ◽  
Nima Jafari Navimipour ◽  
Bhaskar Gardas ◽  
Mehmet Unal

PurposeThis study aims to provide an overview of what characterizes the current state of research in the field of cloud computing use in human resource management (HRM) with the identification, analysis and classification of the existing literature and lines of research addressed and to provide guidance for future research.Design/methodology/approachThe systematic literature review (SLR) technique has been used to identify, select, analyze and evaluate the existing publications on cloud computing and HRM. A total of 35 papers published up to December 2020 have been obtained from the Web of Science (WoS) scientific database. The research design has allowed us to determine what characterizes the current state of research on the use of cloud computing in HRM and obtain a novel classification of the literature that identifies four lines of research and the contributions in each line and has allowed us to define the future research agenda.FindingsThe four groups into which the papers on the cloud computing-HRM relationship have been classified are: (1) studies focused on the development of cloud platforms for HRM that highlight technical aspects, (2) papers that focus on the concept of human resource elasticity, (3) papers on the adoption and/or implantation of cloud platforms for HRM and (4) studies that highlight the effects or implications of cloud platforms for HRM. This paper proposes some new opportunities for future research and presents some helpful implications from the theoretical and management perspectives.Research limitations/implicationsThis study uses only scientific articles in the WoS database with a Journal Citation Report (JCR) or SCImago Journal Rank (SJR) impact.Originality/valueThis paper provides an overview of the knowledge on cloud computing and HRM research and offers recommendations for future research.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mahak Sharma ◽  
Ruchita Gupta ◽  
Padmanav Acharya

Purpose The purpose of this paper is to presents an analysis of geographically and disciplinary scattered academic publications of cloud computing (CC) research in information systems. This review aims to understand the research methodology, research frameworks and models, geographical distribution, trends, critical factors and causal relationships associated with cloud computing adoption (CCA). Design/methodology/approach Systematic-literature-review using natural language processing is conducted to explore the phenomenon. The relevant research studies are extracted from various online databases using quality-assessment-criteria. Findings The study is a novel attempt to highlight the differences in critical factors for CCA in different country-settings. Further, the research explores the causal relationships among the identified factors. The findings of this 12-year systematic-review contribute by aiding the providers and potential adopters to devise context-specific strategies for the penetration of cloud services and sound adoption decisions (ADs), respectively. The findings also highlight the prospective avenues of research in the domain for researchers. Using the in-depth analysis, conceptual frameworks have been proposed that can assist in exploring the pre-adoption and post-adoption of CC. Originality/value This study contributes to CCA research by providing holistic insights into the methodology, research framework and models, geographical focus, critical factors and causal relationships influencing the AD or intention. The review highlights the unexplored emerging research topics in the field of CCA for future research directions.


2019 ◽  
Vol 8 (2) ◽  
pp. 6117-6122

From hairbrushes to scales, all devices have sensors embedded in them to collect and communicate data. Smart Healthcare is proving to be an exciting and dynamic area with lots of room for new innovations and the increasing consumer demand for proactive health monitoring devices. Having India poised to spend a lot on healthcare, recent innovations using IoT devices and big data analytics can propel the healthcare industry into the future. Smart healthcare providers are leveraging cloud computing with fog computing to optimize their healthcare services. These smart healthcare applications depend mainly on the raw sensor data collected, aggregated, and analyzed by the smart sensors. Smart sensors these days generate myriad amount of data like text, image, audio, and video that require real-time or batch processing. Aggregating these diverse data from various types of resources remains a dispute till date. To resolve this issue, we have proposed a softwarized infrastructure that integrates cloud computing and fog computing, message brokers, and Tor for supple, safe, viable, and a concealed IoT exploitation for smart healthcare applications and services. Our proposed platform employs machine-to-machine (M2M) messaging, data fusion and decision fusion, and uses rule-based beacons for seamless data management. Our proposed flexBeacon system provides an IoT infrastructure that is nimble, secure, flexible, private, and reasonable. We have also proposed an M2M transceiver and microcontroller for flawless data incorporation of smart healthcare applications and services. Based on the IoT devices’ technical capabilities and resource availability, some systems are capable of making use of homomorphic encryption and zero knowledge proofs. The proposed flexBeacon platform offers seamless management and data aggregation without loss of accuracy. The cost of implementing a softwarized IoT for smart healthcare is also greatly reduced.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Luca Ferri ◽  
Rosanna Spanò ◽  
Marco Maffei ◽  
Clelia Fiondella

PurposeThis paper aims to investigate the factors influencing chief executive officers’ (CEOs') intentions to implement cloud technology in Italian small and medium-sized enterprises (SMEs).Design/methodology/approachThe study proposes a model that integrates the theoretical construct of the technology acceptance model (TAM) with a classification of perceived benefits and risks related to cloud computing. The study employs a structural equation modeling approach to analyze data gathered through a Likert scale-based survey.FindingsThe findings indicate that risk perception has a strong negative effect on the intention to introduce cloud technology in firms. This effect is partially offset by the perceived ease of use of the technology.Originality/valueThe study provides a new theoretical framework that integrates the TAM and a classification of perceived risks to provide a clear view of management's cognitive processes during technological change. Moreover, the results show the main factors influencing decisions regarding the implementation of cloud computing in firms in light of the perception of risks. Finally, this study provides interesting findings for cloud service providers (CSPs) about their customers' decision-making processes.


Wireless sensor networks and internet of things are widely used in healthcare industry. In today’s scenario wearable sensors become very popular devices to monitor patients at high risk. Patients who are suffering from long lasting sickness visits hospital at multiple time for their regular check-up. Treatment from this kind of system increases the expenditure in overall for the patients. However, with recent technological innovation such as cloud and fog computing, with minimal expense on storage and computing facilities these problems are overcome. In this paper, we provide an analysis of fog computing role over cloud computing to monitor patient’s health to provide context aware services without delay to the end user when it required to patient and medical practitioner. Three layer architecture is proposed for real time domain data storage, processing and communication. This increase the capability of cloud computing with the integration to fog computing for current and future use application.


Sign in / Sign up

Export Citation Format

Share Document