11,324 research outputs found

    Internet of things in health: Requirements, issues, and gaps

    Get PDF
    Background and objectives: The Internet of Things (IoT) paradigm has been extensively applied to several sectors in the last years, ranging from industry to smart cities. In the health domain, IoT makes possible new scenarios of healthcare delivery as well as collecting and processing health data in real time from sensors in order to make informed decisions. However, this domain is complex and presents several tech- nological challenges. Despite the extensive literature about this topic, the application of IoT in healthcare scarcely covers requirements of this sector. Methods: A literature review from January 2010 to February 2021 was performed resulting in 12,108 articles. After filtering by title, abstract, and content, 86 were eligible and examined according to three requirement themes: data lifecycle; trust, security, and privacy; and human-related issues. Results: The analysis of the reviewed literature shows that most approaches consider IoT application in healthcare merely as in any other domain (industry, smart cities…), with no regard of the specific requirements of this domain. Conclusions: Future effort s in this matter should be aligned with the specific requirements and needs of the health domain, so that exploiting the capabilities of the IoT paradigm may represent a meaningful step forward in the application of this technology in healthcare.Consejería de Conocimiento, Investigación y Universidad, Junta de Andalucía P18-TPJ - 307

    The Intersection of Cloud Computing and Smart Cities: An Exploratory Review of Applications and Challenges in Deployment

    Get PDF
    This research addressed the intersection of cloud computing and smart cities. Cloud computing and smart cities are two areas that are seeing fast expansion and have the potential to transform the manner in which we work and live. Cloud computing facilitates the supply of on-demand computing resources, including storage, networking, and software, via the internet; and smart cities use technology to improve the quality of life for inhabitants and the efficiency of municipal services. According to the findings of the research, cloud computing has the potential to be used in diverse applications within smart cities. Some examples of these applications include smart transportation, smart lighting, smart buildings, smart waste management, smart healthcare, smart parking, and smart citizen services. This study also drew attention to a number of obstacles that need to be overcome before cloud computing may be properly implemented. Concerns around data security and privacy, network and connection, interoperability, dependency on internet access, cost and scalability, and the need for successful cooperation between municipal authorities, technology suppliers, and residents are examples of these problems. The findings of the research indicate that the potential for cloud computing to significantly improve the capabilities of smart cities should not be underestimated, despite the fact that there are considerable obstacles to be addressed. It will be vital for municipal authorities, technology providers, and residents to collaborate to overcome the problems and establish successful methods for adopting cloud computing in smart cities if this promise is going to be realized

    Chapter 9: The need for big data standardization

    Get PDF

    Enhancing healthcare services through cloud service: a systematic review

    Get PDF
    Although cloud-based healthcare services are booming, in-depth research has not yet been conducted in this field. This study aims to address the shortcomings of previous research by analyzing all journal articles from the last five years using the preferred reporting items for systematic reviews and meta-analyses (PRISMA) systematic literature review methodology. The findings of this study highlight the benefits of cloud-based healthcare services for healthcare providers and patients, including enhanced healthcare services, data security, privacy issues, and innovative information technology (IT) service delivery models. However, this study also identifies challenges associated with using cloud services in healthcare, such as security and privacy concerns, and proposes solutions to address these issues. This study concludes by discussing future research directions and the need for a complete solution that addresses the conflicting requirements of the security, privacy, efficiency, and scalability of cloud technologies in healthcare

    Blockcloud: Merger of two Big Technologies Blockchain & Cloud Computing

    Get PDF
    A Blockchain is a continuous list - a structure like a file containing blocks connected by links, and the storage of blocks is done with the help of cryptography whereas Cloud computing is the need for computing resources, especially data storage (cloud storage) and computing power, without the direct control of users. Large cloud operations are often distributed across multiple locations, each with a data center. Both these technologies have their individual working and responsibilities and plays their roles very perfectly which makes them high demanding in today’s world but if they both work together then it will upgrade the future of IT market because Blockchain makes a difference in cloud storage which keeps information secure and tamper-proof. Companies can be certain that their information is secure; erasing information from a computer does not erase information held on other blockchain arrange gadgets. In this way, information put away within the cloud utilizing blockchain innovation is secure and secure. In cloud computing, blockchain can make an organize of hubs that share data and handle vitality. This guarantees that companies don't require a central benefit supplier. Instep, they can depend on organized computers that are not controlled by a single company which is beneficial in all aspect. This paper showcase all benefits by merging these two big technologies Blockchain and Cloud computing and propose new term for this Merger as “BlockCloud”

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    A Survey on Intrusion Detection Systems for Fog and Cloud Computing

    Get PDF
    The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area
    corecore