29,040 research outputs found

    A systematic literature review of cloud computing in eHealth

    Full text link
    Cloud computing in eHealth is an emerging area for only few years. There needs to identify the state of the art and pinpoint challenges and possible directions for researchers and applications developers. Based on this need, we have conducted a systematic review of cloud computing in eHealth. We searched ACM Digital Library, IEEE Xplore, Inspec, ISI Web of Science and Springer as well as relevant open-access journals for relevant articles. A total of 237 studies were first searched, of which 44 papers met the Include Criteria. The studies identified three types of studied areas about cloud computing in eHealth, namely (1) cloud-based eHealth framework design (n=13); (2) applications of cloud computing (n=17); and (3) security or privacy control mechanisms of healthcare data in the cloud (n=14). Most of the studies in the review were about designs and concept-proof. Only very few studies have evaluated their research in the real world, which may indicate that the application of cloud computing in eHealth is still very immature. However, our presented review could pinpoint that a hybrid cloud platform with mixed access control and security protection mechanisms will be a main research area for developing citizen centred home-based healthcare applications

    Cloud Storage and Bioinformatics in a private cloud deployment: Lessons for Data Intensive research

    No full text
    This paper describes service portability for a private cloud deployment, including a detailed case study about Cloud Storage and bioinformatics services developed as part of the Cloud Computing Adoption Framework (CCAF). Our Cloud Storage design and deployment is based on Storage Area Network (SAN) technologies, details of which include functionalities, technical implementation, architecture and user support. Experiments for data services (backup automation, data recovery and data migration) are performed and results confirm backup automation is completed swiftly and is reliable for data-intensive research. The data recovery result confirms that execution time is in proportion to quantity of recovered data, but the failure rate increases in an exponential manner. The data migration result confirms execution time is in proportion to disk volume of migrated data, but again the failure rate increases in an exponential manner. In addition, benefits of CCAF are illustrated using several bioinformatics examples such as tumour modelling, brain imaging, insulin molecules and simulations for medical training. Our Cloud Storage solution described here offers cost reduction, time-saving and user friendliness

    Icmapen: an icmetric based security framework for sleep apnea monitoring

    Get PDF
    Smart devices are becoming increasingly powerful which is why they are being used for point of care health services. Wearable devices can be purchased which allow continuous monitoring of a wearers vital signs. The data is generated, processed and stored remotely where it can be readily accessible to health professionals. Recent attacks on healthcare systems and health data shows that the systems are insecure and that security is a major hurdle in their wide adoption. Conventional cryptographic systems rely on stored keys for the provision of security. The stored keys can be captured in many ways which leads to the system being exposed. The ICMetric technology remedies this by eliminating the need for stored keys. Thus, the ICMetric technology functions as a key theft deterrent and as a basis for cryptographic services. This paper studies the design and implementation of an ICMetric based health monitoring system for people diagnosed with sleep apnea. The proposed system provides key generation, authentication and confidentiality by using the novel ICMetric technology. The proposed scheme is constituent of a cloud computing component which enables remote monitoring and data storage for access by health professionals.  This paper studies the performance of the proposed schemes by studying the running time. The security of the scheme has also been studied to show that the system provides high levels of security without resource compromise.Keywords: ICMetric; Sleep apnea; Cloud computing; Authentication; Confidentialit

    Cloud Bioinformatics in a private cloud deployment

    No full text

    Medical data processing and analysis for remote health and activities monitoring

    Get PDF
    Recent developments in sensor technology, wearable computing, Internet of Things (IoT), and wireless communication have given rise to research in ubiquitous healthcare and remote monitoring of human\u2019s health and activities. Health monitoring systems involve processing and analysis of data retrieved from smartphones, smart watches, smart bracelets, as well as various sensors and wearable devices. Such systems enable continuous monitoring of patients psychological and health conditions by sensing and transmitting measurements such as heart rate, electrocardiogram, body temperature, respiratory rate, chest sounds, or blood pressure. Pervasive healthcare, as a relevant application domain in this context, aims at revolutionizing the delivery of medical services through a medical assistive environment and facilitates the independent living of patients. In this chapter, we discuss (1) data collection, fusion, ownership and privacy issues; (2) models, technologies and solutions for medical data processing and analysis; (3) big medical data analytics for remote health monitoring; (4) research challenges and opportunities in medical data analytics; (5) examples of case studies and practical solutions
    • …
    corecore