2,637 research outputs found

    Mechatronics & the cloud

    Get PDF
    Conventionally, the engineering design process has assumed that the design team is able to exercise control over all elements of the design, either directly or indirectly in the case of sub-systems through their specifications. The introduction of Cyber-Physical Systems (CPS) and the Internet of Things (IoT) means that a design team’s ability to have control over all elements of a system is no longer the case, particularly as the actual system configuration may well be being dynamically reconfigured in real-time according to user (and vendor) context and need. Additionally, the integration of the Internet of Things with elements of Big Data means that information becomes a commodity to be autonomously traded by and between systems, again according to context and need, all of which has implications for the privacy of system users. The paper therefore considers the relationship between mechatronics and cloud-basedtechnologies in relation to issues such as the distribution of functionality and user privacy

    A case study in open source innovation: developing the Tidepool Platform for interoperability in type 1 diabetes management.

    Get PDF
    OBJECTIVE:Develop a device-agnostic cloud platform to host diabetes device data and catalyze an ecosystem of software innovation for type 1 diabetes (T1D) management. MATERIALS AND METHODS:An interdisciplinary team decided to establish a nonprofit company, Tidepool, and build open-source software. RESULTS:Through a user-centered design process, the authors created a software platform, the Tidepool Platform, to upload and host T1D device data in an integrated, device-agnostic fashion, as well as an application ("app"), Blip, to visualize the data. Tidepool's software utilizes the principles of modular components, modern web design including REST APIs and JavaScript, cloud computing, agile development methodology, and robust privacy and security. DISCUSSION:By consolidating the currently scattered and siloed T1D device data ecosystem into one open platform, Tidepool can improve access to the data and enable new possibilities and efficiencies in T1D clinical care and research. The Tidepool Platform decouples diabetes apps from diabetes devices, allowing software developers to build innovative apps without requiring them to design a unique back-end (e.g., database and security) or unique ways of ingesting device data. It allows people with T1D to choose to use any preferred app regardless of which device(s) they use. CONCLUSION:The authors believe that the Tidepool Platform can solve two current problems in the T1D device landscape: 1) limited access to T1D device data and 2) poor interoperability of data from different devices. If proven effective, Tidepool's open source, cloud model for health data interoperability is applicable to other healthcare use cases

    Exploring the Interrelationship of Risk Factors for Supporting eHealth Knowledge-Based System

    Get PDF
    In developing countries like Africa, the physician-to-population ratio is below the World Health Organization (WHO) minimum recommendation. Because of the limited resource setting, the healthcare services did not get the equity of access to the use of health services, the sustainable health financing, and the quality of healthcare service provision. Efficient and effective teaching, alerting, and recommendation system are required to support the activities of the healthcare service. To alleviate those issues, creating a competitive eHealth knowledge-based system (KBS) will bring unlimited benefit. In this study, Apriori techniques are applied to malaria dataset to explore the degree of the association of risk factors. And then, integrate the output of data mining (i.e., the interrelationship of risk factors) with knowledge-based reasoning. Nearest neighbor retrieval algorithms (for retrieval) and voting method (to reuse tasks) are used to design and deliver personalized knowledge-based system

    Providing security and fault tolerance in P2P connections between clouds for mHealth services

    Full text link
    [EN] The mobile health (mHealth) and electronic health (eHealth) systems are useful to maintain a correct administration of health information and services. However, it is mandatory to ensure a secure data transmission and in case of a node failure, the system should not fall down. This fact is important because several vital systems could depend on this infrastructure. On the other hand, a cloud does not have infinite computational and storage resources in its infrastructure or would not provide all type of services. For this reason, it is important to establish an interrelation between clouds using communication protocols in order to provide scalability, efficiency, higher service availability and flexibility which allow the use of services, computing and storage resources of other clouds. In this paper, we propose the architecture and its secure protocol that allows exchanging information, data, services, computing and storage resources between all interconnected mHealth clouds. The system is based on a hierarchic architecture of two layers composed by nodes with different roles. The routing algorithm used to establish the connectivity between the nodes is the shortest path first (SPF), but it can be easily changed by any other one. Our architecture is highly scalable and allows adding new nodes and mHealth clouds easily, while it tries to maintain the load of the cloud balanced. Our protocol design includes node discovery, authentication and fault tolerance. We show the protocol operation and the secure system design. Finally we provide the performance results in a controlled test bench.Lloret, J.; Sendra, S.; Jimenez, JM.; Parra-Boronat, L. (2016). Providing security and fault tolerance in P2P connections between clouds for mHealth services. Peer-to-Peer Networking and Applications. 9(5):876-893. doi:10.1007/s12083-015-0378-3S87689395The Fifty-eighth World Health Assembly, Resolutions and Decisions. Document: A58/21. Available at: http://www.who.int/healthacademy/media/WHA58-28-en.pdf . [Last access: Dec. 30, 2014]World Health organization. Topics of eHealth. In WHO website. Available at: http://www.who.int/topics/eHealth/en/ . [Last access: Dec. 30, 2014]Pickup JC, Freeman SC, Sutton AJ (2011) Glycaemic control in type 1 diabetes during real time continuous glucose monitoring compared with self monitoring of blood glucose: meta-analysis of randomised controlled trials using individual patient data. BMJ 343:d3805Promotional Material Digital health: working in partnership. Department of Health. UK. (2014) Available at: https://www.gov.uk/government/publications/digital-health-working-in-partnership/digital-health-working-in-partnerships#digital-health---harnessing-technology-for-patient-benefit . [Last access: Dec. 30, 2014]eHealth for a Healthier Europe!– opportunities for a better use of healthcare resources. Available at: https://joinup.ec.europa.eu/sites/default/files/files_epractice/sites/eHealth%20for%20a%20Healthier%20Europe %20-%20Opportunities%20for%20a%20better%20use%20of%20healthcare%20resources.pdf. [Last access: Dec. 30, 2014]Adibi S (2012) Link technologies and BlackBerry mobile health (mHealth) solutions: a review. IEEE Trans Inf Technol Biomed 16(4):586–597Chiarini G, Ray P, Akter S, Masella C, Ganz A (2013) mHealth technologies for chronic diseases and elders: a systematic review. IEEE J Sel Areas Commun 31(9):6–18Lopes IM, Silva BM, Rodrigues JJ, Lloret J, Proenca ML (2011) A mobile health monitoring solution for weight control. In proceedings of the 2011 International Conference on Wireless Communications and Signal Processing (WCSP 2011), Nanjing, pp 1–5Lopes IM, Silva BM, Rodrigues JJPC, Lloret J (2012) Performance evaluation of cooperation mechanisms for m-health applications. In proceedings of the 2012 I.E. Global Communications Conference (GLOBECOM 2012), AnaheimKyriacou EC, Pattichis CS, Pattichis MS (2009) An overview of recent health care support systems for eEmergency and mHealth applications. In proceedings of the 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2009), Hilton Minneapolis, pp 1246–1249Nkosi MT, Mekuria F (2010) Cloud computing for enhanced mobile health applications. In proceedings of the 2010 I.E. Second International Conference on Cloud Computing Technology and Science (CloudCom 2010), Indianapolis, pp 629–633Sultan N (2014) Making use of cloud computing for healthcare provision: opportunities and challenges. Int J Inf Manag 34(2):177–184Pandey S, Voorsluys W, Niu S, Khandoker A, Buyya R (2012) An autonomic cloud environment for hosting ECG data analysis services. Futur Gener Comput Syst 28(1):147–154Xia H, Asif I, Zhao X (2013) Cloud-ECG for real time ECG monitoring and analysis. Comput Methods Prog Biomed 110(3):253–259Bourouis A, Feham M, Bouchachia A (2012) A new architecture of a ubiquitous health monitoring system: a prototype of cloud mobile health monitoring system. arXiv preprint. Reference: arXiv:1205.6910Chen KR, Lin YL, Huang MS (2011) A mobile biomedical device by novel antenna technology for cloud computing resource toward pervasive healthcare. In proceedings of the 11th International Conference on Bioinformatics and Bioengineering (BIBE 2011), Taichung, pp 133–136Lacuesta R, Lloret J, Sendra S, Peñalver L (2014), Spontaneous ad hoc mobile cloud computing network. Sci World J (Article ID 232419): 1–19Ghafoor KZ, Bakar KA, Mohammed MA, Lloret J (2013) Vehicular cloud computing: trends and challenges (Chapter 14). In Mobile Networks and Cloud computing Convergence for Progressive Services and Applications. IGI Global. pp. 262–274. DOI: 10.4018/978-1-4666-4781-7.ch014Wan J, Zhang D, Zhao S, Yang LT, Lloret J (2014) Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges and solutions. IEEE Commun Mag 52(8):106–113. doi: 10.1109/MCOM.2014.6871677Rodrigues JJPC, Zhou L, Mendes LDP, Lin K, Lloret J (2012) Distributed media-aware flow scheduling in cloud computing environment. Comput Commun 35(15):1819–1827Dutta R, Annappa B (2014) Protection of data in unsecured public cloud environment with open, vulnerable networks using threshold-based secret sharing. Netw Protoc Algoritm 6(1):58–75Modares H, Lloret J, Moravejosharieh A, Salleh R (2013) Security in mobile cloud computing (Chapter 5). In Mobile Networks and Cloud computing Convergence for Progressive Services and Applications. IGI Global. pp. 79–91Mehmood A, Song H, Lloret J (2014) Multi-agent based framework for secure and reliable communication among open clouds. Netw Protoc Algoritm 6(4):60–76Mendes LDP, Rodrigues JJPC, Lloret J, Sendra S (2014) Cross-layer dynamic admission control for cloud-based multimedia sensor networks. IEEE Syst J 8(1):235–246Xiong J, Li F, Ma J, Liu X, Yao Z, Chen PS (2014) A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Netw Appl 1–13Yang H, Kim H, Mtonga K (2014) An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Netw Appl 1–11Silva BM, Rodrigues JJ, Canelo F, Lopes IM, Lloret J (2014) Towards a cooperative security system for mobile-health applications. Electron Commer Re 1–27Flynn D, Gregory P, Makki H, Gabbay M (2009) Expectations and experiences of eHealth in primary care: a qualitative practice-based investigation. Int J Med Inform 78(9):588–604Thampi SM (2010) Survey of search and replication schemes in unstructured P2P networks. Netw Protoc Algoritm 2(1):93–131Khan SM, Mallesh N, Nambiar A, Wright M (2010) The dynamics of salsa: a robust structured P2P system. Netw Protoc Algoritm 2(4):40–60Garcia M, Hammoumi M, Canovas A, Lloret J (2011) Controlling P2P file-sharing networks’ traffic. Netw Protoc Algoritm 3(4):54–92Lloret J, Garcia M, Tomas J, Rodrigues JJPC (2014) Architecture and protocol for InterCloud communication. Inf Sci 258:434–451Chowdhury CR (2014) A survey of cloud based health care system. Int J Innov Res Comput Commun Eng 2(8):5477–5481Ghosh R, Papapanagiotou I, Boloor KA (2014) Survey on research initiatives for healthcare clouds. Cloud Computing Applications for Quality Health Care Delivery. IGI Global 1–18Donahue S (2010) Can cloud computing help fix health care? Cloudbook J 1(6):1–6Deng M, Petkovic M, Nalin M, Baroni IA (2011) Home healthcare system in the cloud--addressing security and privacy challenges. In proceedings of the 2011 I.E. International Conference on Cloud Computing (CLOUD 2011), Washington, pp 549–556Wang X, Gui Q, Liu B, Chen Y, Jin Z (2013) Leveraging mobile cloud for telemedicine: a performance study in medical monitoring. In proceedings of the 39th Annual Northeast Bioengineering Conference (NEBEC 2013), Syracuse, pp 49–50Alamri A (2012) Cloud-based e-health multimedia framework for heterogeneous network. In proceedings of the 2012 I.E. International Conference on Multimedia and Expo Workshops (ICMEW 2012), Melbourne, pp 447–452Constantinescu L, Kim J, Feng DD (2012) Sparkmed: a framework for dynamic integration of multimedia medical data into distributed m-health systems. IEEE Trans Inf Technol Biomed 16(1):40–52Botts N, Thoms B, Noamani A, Horan TA (2010) Cloud computing architectures for the underserved: public health cyberinfrastructures through a network of healthatms. In proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS 2010), Honolulu, pp 1–10Fan L, Buchanan W, Thummler C, Lo O, Khedim A, Uthmani O, Lawson A, Bell D (2011) DACAR platform for eHealth services cloud. In proceedings of the 2011 I.E. International Conference on Cloud Computing (CLOUD 2011), Washington, pp 219–226Ruiz-Zafra A, Benghazi K, Noguera M, Garrido JL (2013) Zappa: An Open Mobile Platform to Build Cloud-Based m-Health Systems. In proceedings of the 4th International Symposium on Ambient Intelligence (ISAmI 2013), Salamanca, pp 87–94Nijon S, Dickerson RF, Asare P, Li Q, Hong D, Stankovic JA, Hu P, Shen G, Jiang X (2013) Auditeur: a mobile-cloud service platform for acoustic event detection on smartphones. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, Taipei, pp 403–416Lloret J, Diaz JR, Boronat F, Jiménez JM (2006) A fault-tolerant P2P-based protocol for logical networks interconnection. In proceedings of the International Conference on Networking and Services (ICNS’06), Silicon ValleyLloret J, Palau C, Boronat F, Tomas J (2008) Improving networks using group-based topologies. Comput Commun 31(14):3438–3450Lloret J, Boronat Segui F, Palau C, Esteve M (2005) Two levels SPF-based system to interconnect partially decentralized P2P file sharing networks. In proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services.(ICAS-ICNS 2005), Papeete, p 39Cramer C, Kutzner K, Fuhrmann T (2004) Bootstrapping locality-aware P2P networkS. In proceedings of the 12th IEEE International Conference on Networks (ICON 2004), Singapore, pp 357–361FIPS 180-1 - Secure Hash Standard, SHA-1. National Institute of Standards and Technology. http://www.itl.nist.gov/fipspubs/fip180-1.htm [Last access: Dec. 30, 2014]Eastlake D., Jones P., US Secure Hash Algorithm 1 (SHA1),(2001). In IETF website, Available at: http://www.ietf.org/rfc/rfc3174.txt [Last access: March 20, 2015]Lacuesta R, Lloret J, Garcia M, Peñalver L (2011) Two secure and energy-saving spontaneous Ad-Hoc protocol for wireless mesh client networks. J Netw Comput Appl 3(2):492–50

    Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources.

    Get PDF
    Ubiquitous devices comprising several resource-constrained nodes with sensors, actuators, and networking capabilities are becoming part of many solutions that seek to enhance user's environment smartness and quality of living, prominently including enhanced healthcare services. In such an environment, security issues are of primary concern as a potential resource misuse can severely impact user's privacy or even become life threatening. Access to these resources should be appropriately controlled to ensure that eHealth nodes are adequately protected and the services are available to authorized entities. The intrinsic resource limitations of these nodes, however, make satisfying these requirements a great challenge. This paper proposes and analyzes a service-oriented architecture that provides a policy-based, unified, cross-platform, and flexible access control mechanism, allowing authorized entities to consume services provided by eHealth nodes while protecting their valuable resources. The scheme is XACML driven, although modifications to the related standardized architecture are proposed to satisfy the requirements imposed by nodes that comprise low-power and lossy networks (LLNs). A proof-of-concept implementation is presented, along with the associated performance evaluation, confirming the feasibility of the proposed approach

    Service and device discovery of nodes in a wireless sensor network

    Get PDF
    Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor\ud nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device and the resources can be described as services, and in this paper, we review a number of well-known service discovery protocols. Bonjour stands out with its auto-configuration, distributed architecture, and sharing of resources. We also present a lightweight implementation in order to demonstrate that an emerging standards-based device and service discovery protocol can actually be deployed on small wireless sensor nodes
    corecore