scholarly journals Definition of a lightweight cryptographic solution to secure health data on IoT and cloud

2021 ◽  
Vol 10 (2) ◽  
pp. 54-60
Author(s):  
Akram Chhaybi ◽  
Saiida Lazaar

The Internet of Things (IoT) and the Cloud Computing are among the main technologies influencing the quality and efficiency of our social and economic activities. Their importance is quite notable in several areas such as remote medical care and healthcare monitoring systems. These later face difficulties most of them are the expensive costs for the chronic diseases and the hospitals charges specially during the pandemic time. All these issues have led to the creation of new solutions for enhancing the quality of the healthcare systems. In this paper, we focus on the network architecture security including healthcare monitoring systems based on IoT and Cloud Computing. We present a recent review on the research field and we propose a secure solution based on lightweight cryptography in accordance with the limited resource environments within which health data are exchanged. The proposed solution is guaranteeing data confidentiality and ensuring integrity and authenticity.

Author(s):  
Larysa Rybina

The education system is a significant basis for the development of both society and an individual. With the help of education, the future development potential of the state is formed, both in economic and spiritual terms. It was revealed that today the financing mechanism of the school is closely related to its management system, due to which the methods of administrative distribution of financial resources prevail at the local level, the planning of expenses for the maintenance of the school is carried out on the basis of last year's expenses, and only protected items of expenditure are mainly provided with full funding. All this prompts school leaders to solve a significant part of financial problems at the expense of parents or sponsorship, and not by conducting effective financial and economic activities of the institution, responsible spending of budgetary funds. It has been substantiated that it is efficient to finance the school with the help of the target-oriented format of the local budget execution, which is constantly being improved. When developing a budget program, the main administrators of budget funds need to clearly understand how to measure the results of its implementation. It is to measure such results that effective indicators of the implementation of budget programs are used - indicators, on the basis of which the assessment and analysis of the effectiveness of the use of budget funds provided for the implementation of the budget program (subprogram) is carried out to achieve the goal of the budget program (subprogram) and the implementation of its tasks. The introduction of a program-targeted method of forming a school budget, focused on the result, as a mechanism for financing the activities of budgetary institutions, eliminates the shortcomings of the estimated financing method. The target-oriented method assumes the definition of the goal to be achieved as a result of the use of budgetary funds, and provides information on the quality of service delivery, the resulting social effect. The program-target planning method is at the heart of the results-based budgeting model, it involves the formation of a program budget that combines the requirements for the planned result and for the allocation of resources.


Sensors ◽  
2010 ◽  
Vol 10 (4) ◽  
pp. 3243-3260 ◽  
Author(s):  
Malrey Lee ◽  
Thomas M. Gatton

2019 ◽  
Author(s):  
Кристина Кучерова ◽  
Kristina Kucherova ◽  
Сергей Мещеряков ◽  
Sergey Mescheryakov ◽  
Дмитрий Щемелинин ◽  
...  

Quality of IT Services (QoS), providing across all globally distributed regions via Internet, use modern cloud computing IT technologies having big data flow and, therefore, is actual. This paper briefly describes the methods of analysis and visualization of monitoring big data based on Key Performance Indicators (KPIs) of a cloud computing IT system using real world example of globally distributed infrastructure of the International IT Company. Implementation of proposed methods of visual analytics in worldwide leading IT companies – RingCentral (USA) and Zabbix (Latvia), – allowed improving of QoS and availability of IT services up to a worldwide level of 99.999% in 24/7 mode. Implementation of new solutions in IT companies is confirmed by corresponding documents and by publications in PhD and DSc thesis of the coauthors.


The development of smart health care monitoring systems, and services is driven by the development of the Internet of Things (IoT). IoT devices produce major role in todays healthcare monitoring systems large number of systems are in this field developing to track health data. The data generated by these devices has to face numerous security related requirements in order to be useful in real life. Among these one of the requirements is provide a detail approach to meet complete intelligent system to monitor health records, The theme proposed here is collect data from multiple sensor use and filter useful information about present state for identifying and integrating the health status of a person. Apart from this how to share health data in secure platform and authenticated architecture node in IoT. In proposed work describes the usage of IoT in health care data in a classical manner which in bounded in an architecture and system devices.


Author(s):  
Kangjuan Lyu ◽  
Miao Hao

This chapter summarizes the development of cities, in terms of structural tendencies and the essence and problem of traditional cities. Then the definition of smart cities and their characteristics are discussed. Therefore, the development of AI (artificial intelligence) is the origin and technical basis of smart cities. Through big data and cloud computing, AI will reinvent traditional cities. Finally, varied applications of artificial intelligence technology in smart cities are explored including basic infrastructures such as monitoring systems, urban transportation, urban planning, and public services, such as medical and health, security, and varied fields in life.


Author(s):  
J. Arockia Mary ◽  
P. Xavier Jeba ◽  
P. Mercy

In mobile device, the resources such as computation, storage, power are limited. Quality of Experience (QoE) of user in these limited resource mobile device is not satisfied. Mobile cloud computing is a new computation paradigm to increase Quality of Service (QoS) of mobile applications by scheduling the offloaded tasks into the cloud. The scheduling of tasks is done in four architectures of mobile cloud computing. Two types of scheduling are done with lot of constraints such as data transmission, task dependency and cost etc. Different scheduling techniques are developed to improve the QoE of mobile users.


2013 ◽  
Vol 2013 ◽  
pp. 1-13 ◽  
Author(s):  
Xianglin Wei ◽  
Jianhua Fan ◽  
Ziyi Lu ◽  
Ke Ding

Mobile cloud computing (MCC) enables the mobile devices to offload their applications to the cloud and thus greatly enriches the types of applications on mobile devices and enhances the quality of service of the applications. Under various circumstances, researchers have put forward several MCC architectures. However, how to reduce the response latency while efficiently utilizing the idle service capacities of the mobile devices still remains a challenge. In this paper, we firstly give a definition of MCC and divide the recently proposed architectures into four categories. Secondly, we present a Hybrid Local Mobile Cloud Model (HLMCM) by extending the Cloudlet architecture. Then, after formulating the application scheduling problems in HLMCM and bringing forward the Hybrid Ant Colony algorithm based Application Scheduling (HACAS) algorithm, we finally validate the efficiency of the HACAS algorithm by simulation experiments.


Computation ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 24 ◽  
Author(s):  
Vasiliki Liagkou ◽  
Vasileios Kavvadas ◽  
Spyridon K. Chronopoulos ◽  
Dionysios Tafiadis ◽  
Vasilis Christofilakis ◽  
...  

Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical transport networks related to optical fibers. Many hospitals are acquiring their own metro dark fiber networks for collaborating with other institutes as a way to maximize their capacity to meet patient needs, as sharing scarce and expensive assets, such as scanners, allows them to optimize their efficiency. The primary goal of this article is to develop of an attack detection model suitable for healthcare monitoring systems that uses internet protocol (IP) virtual private networks (VPNs) over optical transport networks. To this end, this article presents the vulnerabilities in healthcare monitoring system networks, which employ VPNs over optical transport layer architecture. Furthermore, a multilayer network architecture for closer integration of the IP and optical layers is proposed, and an application for detecting DoS attacks is introduced. The proposed application is a lightweight implementation that could be applied and installed into various remote healthcare control devices with limited processing and memory resources. Finally, an analytical and focused approach correlated to attack detection is proposed, which can also serve as a tutorial oriented towards even nonprofessionals for practical and learning purposes.


2012 ◽  
Vol 457-458 ◽  
pp. 102-107
Author(s):  
Tao Feng ◽  
Jun Bi ◽  
Hui Cao

With the rapid development and integration of the Internet, wireless communication network and the Internet of Things, the Internet faces many challenges as a bearer network: a large volume of information exchange, multi-level QoS and smoothly switching multiple access protocols. The Internet should be able to provide a variety of network capacity in a more dynamic and on-demand way, not just only limited network resources provision through virtualization. The elastic network is expected to adapt to network changes by enabling network protocols selection and combination dynamically. Cloud computing illustrates a new Internet-based model of IT resources (hardware, software, data) provision, delivery and consumption as a service. Therefore, network protocols as a service can provide guaranteed quality of service and good quality of experience to users who do not care about any network configuration and network management. In this paper, we proposes a novel idea of network capacity on demand by combining the service provision model of cloud computing with the openness of the network protocol. The related conception and stakeholders of network protocol as service are depicted. Cloud-based network architecture is design to present the provision, delivery and consumption of network capacity on demand and discuss the key features of cloud-based network. Finally, a prototype of cloud-based network is implemented by extending OpenFlow architecture.


2020 ◽  
Vol 8 (5) ◽  
pp. 2432-2436

Nowadays, Cloud Computing is a promising research field. With the advancement of modern technology, performance improvement of the cloud network has become the buzzword today. Here in this paper, we have proposed the new technique, called ‘Data Hibernation’ where service-oriented architecture plays the key role for the improvement of the cloud network. Moreover, we have designed our algorithm and demonstrated our work graphically that how the overall efficiency or the throughput has reached its apex level of Quality of Service with the subtle benefit of much higher degree of parallelism.


Sign in / Sign up

Export Citation Format

Share Document