Fog computing system for monitoring Mild Dementia and COPD patients - Romanian case study

Author(s):  
Octavian Fratu ◽  
Catalina Pena ◽  
Razvan Craciunescu ◽  
Simona Halunga
Author(s):  
А.Н. ВОЛКОВ

Одним из направлений развития сетей связи 5G и сетей связи 2030 является интегрирование в сеть распределенных вычислительных структур, таких как системы пограничных и туманных вычислений (Fog), которые призваны выполнить децентрализацию вычислительной части сетей. В связи с этим необходимо исследовать и определить принципы предоставления услуг на основе распределенной вычислительной инфраструктуры, в том числе в условиях ограниченности ресурсов отдельно взятых составных частей (Fog-устройства). Предлагается новый фреймворк распределенной динамической вычислительной системы туманных вычислений на основе микросервисного архитектурного подхода к реализации, развертыванию и миграции программного обеспечения предоставляемых услуг. Исследуется типовая архитектура микросервисного подхода и ее имплементация в туманные вычисления, а также рассматриваются два алгоритма: алгоритм K-средних для нахождения центра пользовательской нагрузки и алгоритм роевой оптимизации для определения устройства тумана с необходимыми характеристиками для последующей миграции микросервиса. One of the directions of 5G and 2030 communications networks development is the network-integrated distributed structures, such as edge computing (MEC) and Fog computing, which are designed to decentralize the computing part of networks. In this regard, it is necessary to investigate and determine the principles of providing services based on a distributed computing infrastructure, including in conditions of limited resources of individual components (Fog devices). This article proposes a new framework for a distributed dynamic computing system of fog computing based on a microservice architectural approach to the implementation, deployment, and software migration of the services. The article examines the typical architecture of the microservice approach and its implementation in fog computing, and also investigates two algorithms: K-means for finding the center of user load, swarm optimization (PSO) to determine the fog device with the necessary characteristics for the subsequent migration of the microservice.


2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Cícero A. Silva ◽  
Gibeon S. Aquino ◽  
Sávio R. M. Melo ◽  
Dannylo J. B. Egídio

The aging of the world’s population and the growth in the number of people with chronic diseases have increased expenses with medical care. Thus, the use of technological solutions has been widely adopted in the medical field to improve the patients’ health. In this context, approaches based on Cloud Computing have been used to store and process the information generated in these solutions. However, using Cloud can create delays that are intolerable for medical applications. Thus, the Fog Computing paradigm emerged as an alternative to overcome this problem, bringing computation and storage closer to the data sources. However, managing medical data stored in Fog is still a challenge. Moreover, characteristics of availability, performance, interoperability, and privacy need to be considered in approaches that aim to explore this problem. So, this article shows a software architecture based on Fog Computing and designed to facilitate the management of medical records. This architecture uses Blockchain concepts to provide the necessary privacy features and to allow Fog Nodes to carry out the authorization process in a distributed way. Finally, this paper describes a case study that evaluates the performance, privacy, and interoperability requirements of the proposed architecture in a home-centered healthcare scenario.


2020 ◽  
Vol 10 (24) ◽  
pp. 8904
Author(s):  
Ana Isabel Montoya-Munoz ◽  
Oscar Mauricio Caicedo Rendon

The reliability in data collection is essential in Smart Farming supported by the Internet of Things (IoT). Several IoT and Fog-based works consider the reliability concept, but they fall short in providing a network’s edge mechanisms for detecting and replacing outliers. Making decisions based on inaccurate data can diminish the quality of crops and, consequently, lose money. This paper proposes an approach for providing reliable data collection, which focuses on outlier detection and treatment in IoT-based Smart Farming. Our proposal includes an architecture based on the continuum IoT-Fog-Cloud, which incorporates a mechanism based on Machine Learning to detect outliers and another based on interpolation for inferring data intended to replace outliers. We located the data cleaning at the Fog to Smart Farming applications functioning in the farm operate with reliable data. We evaluate our approach by carrying out a case study in a network based on the proposed architecture and deployed at a Colombian Coffee Smart Farm. Results show our mechanisms achieve high Accuracy, Precision, and Recall as well as low False Alarm Rate and Root Mean Squared Error when detecting and replacing outliers with inferred data. Considering the obtained results, we conclude that our approach provides reliable data collection in Smart Farming.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Sign in / Sign up

Export Citation Format

Share Document