scholarly journals Optimized Blockchain Model for Internet of Things based Healthcare Applications

Author(s):  
Ashutosh Dhar Dwivedi ◽  
Lukas Malina ◽  
Petr Dzurenda ◽  
Gautam Srivastava
Author(s):  
Lamya Alkhariji ◽  
Nada Alhirabi ◽  
Mansour Naser Alraja ◽  
Mahmoud Barhamgi ◽  
Omer Rana ◽  
...  

Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little conceptual understanding of what is meant by privacy. A vision is to develop an intelligent privacy assistant to whom developers can easily ask questions to learn how to incorporate different privacy-preserving ideas into their IoT application designs. This article lays the foundations toward developing such a privacy assistant by synthesising existing PbD knowledge to elicit requirements. It is believed that such a privacy assistant should not just prescribe a list of privacy-preserving ideas that developers should incorporate into their design. Instead, it should explain how each prescribed idea helps to protect privacy in a given application design context—this approach is defined as “Explainable Privacy.” A total of 74 privacy patterns were analysed and reviewed using ten different PbD schemes to understand how each privacy pattern is built and how each helps to ensure privacy. Due to page limitations, we have presented a detailed analysis in Reference [3]. In addition, different real-world Internet of Things (IoT) use-cases, including a healthcare application, were used to demonstrate how each privacy pattern could be applied to a given application design. By doing so, several knowledge engineering requirements were identified that need to be considered when developing a privacy assistant. It was also found that, when compared to other IoT application domains, privacy patterns can significantly benefit healthcare applications. In conclusion, this article identifies the research challenges that must be addressed if one wishes to construct an intelligent privacy assistant that can truly augment software developers’ capabilities at the design phase.


Author(s):  
Maria Pateraki ◽  
Konstantinos Fysarakis ◽  
Vangelis Sakkalis ◽  
Georgios Spanoudakis ◽  
Iraklis Varlamis ◽  
...  

Author(s):  
Harshit Bhardwaj ◽  
Pradeep Tomar ◽  
Aditi Sakalle ◽  
Taranjeet Singh ◽  
Divya Acharya ◽  
...  

Fog computing has latency, particularly for healthcare applications, which is of the utmost importance. This research aims to be a comprehensive literature analysis of healthcare innovations for fog computing. All of these components involved special abilities. In sequence, developers must be qualified to write stable, healthy IoT programs in four distinct fields of software production: embedded, server, tablet, and web-based. Furthermore, the distributed results, IoT structure essence, dispersed abilities in programming play a deciding position. This chapter discusses the difficulties in creating the IoT method and summarizing findings and observations. Experiences of the need for and co-presence of various kinds of skills in software creation in the construction of IoT applications are discussed.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 407 ◽  
Author(s):  
Omar A. Saraereh ◽  
Amer Alsaraira ◽  
Imran Khan ◽  
Bong Jun Choi

The Internet-of-things (IoT) has been gradually paving the way for the pervasive connectivity of wireless networks. Due to the ability to connect a number of devices to the Internet, many applications of IoT networks have recently been proposed. Though these applications range from industrial automation to smart homes, healthcare applications are the most critical. Providing reliable connectivity among wearables and other monitoring devices is one of the major tasks of such healthcare networks. The main source of power for such low-powered IoT devices is the batteries, which have a limited lifetime and need to be replaced or recharged periodically. In order to improve their lifecycle, one of the most promising proposals is to harvest energy from the ambient resources in the environment. For this purpose, we designed an energy harvesting protocol that harvests energy from two ambient energy sources, namely radio frequency (RF) at 2.4 GHz and thermal energy. A rectenna is used to harvest RF energy, while the thermoelectric generator (TEG) is employed to harvest human thermal energy. To verify the proposed design, extensive simulations are performed in Green Castalia, which is a framework that is used with the Castalia simulator in OMNeT++. The results show significant improvements in terms of the harvested energy and lifecycle improvement of IoT devices.


Sign in / Sign up

Export Citation Format

Share Document