Cloud computing; cyber physical systems; deep learning; healthcare; Internet of Things (IoT); task scheduling; Cloud-computing; Cybe-physical systems; Cyber-physical systems; Deep learning; Features extraction; Healthcare; Internet of thing; Resources utilizations; Social media; Tasks scheduling; Control and Systems Engineering; Computer Science Applications; Computer Networks and Communications; Medical services; Task analysis; Costs; Security; Feature extraction; Sensors
Abstract :
[en] Cyber-physical systems (CPS) based on cloud computing provides resources over the Internet and allow a variety of applications to be deployed to provide services for various industries. We proposed IoT-based healthcare cyber-physical system that provides effective resource utilization at fog and cloud levels with minimum execution cost. In addition, we also consider data from social media networking and drug review for the analysis. Furthermore, two different feature extraction approaches were applied based on data collection. Homogeneity score-based K-means clustering is used as a feature extraction and selection method for sensor data features, while text mining and sentiment analysis approach is used for social media networking and drug review data feature extraction. We proposed efficient resource utilization and cost-effective task scheduling at the Fog level and multi-objective heuristic approach Ant colony optimization task scheduling (MOHACO-TS) at cloud level. Both task scheduling algorithms focus on executing maximum task tasks in minimum time with effective resource utilization. We consider five different datasets and existing task scheduling and classification approaches for performance evaluation of the proposed IoT-HCPS framework. From the results, it is evident that the proposed work IoT-HCPS outperformed the exisitng techniques and algorithms.
Disciplines :
Computer science
Author, co-author :
NAGARAJAN, Senthil Murugan ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Mathematics (DMATH)
Devarajan, Ganesh Gopal ; SRM Institute of Science and Technology, Department of Computer Science and Engineering, Ghaziabad, India
Mohammed, Amin Salih; Salahaddin University, Department of Software and Informatics Engineering, Erbil, Iraq ; Lebanese French University, Department of Computer Engineering, Erbil, Iraq
Z. Pang, G. Yang, R. Khedri, and Y.-T. Zhang, "Introduction to the special section: Convergence of automation technology, biomedical engineering, and health informatics toward the healthcare 4.0," IEEE Rev. Biomed. Eng., vol. 11, pp. 249-259, 2018.
J. Wan et al., "Reconfigurable smart factory for drug packing in healthcare industry 4.0," IEEE Trans. Ind. Informat., vol. 15, no. 1, pp. 507-516, Jan. 2019.
K. Wang, Y. Shao, L. Xie, J. Wu, and S. Guo, "Adaptive and fault-tolerant data processing in healthcare IoT based on fog computing," IEEE Trans. Netw. Sci. Eng., vol. 7, no. 1, pp. 263-273, Jan.-Mar. 2020.
H. Yi, "Secure social Internet of Things based on post-quantum blockchain," IEEE Trans. Netw. Sci. Eng., vol. 9, no. 3, pp. 950-957, May/Jun. 2022.
Z. Pang, L. Zheng, J. Tian, S. K.-Walter, E. Dubrova, and Q. Chen, "Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things," Enterprise Inf. Syst., vol. 9, no. 1, pp. 86-116, 2015.
P. Kumar et al., "PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities," IEEE Trans. Netw. Sci. Eng., vol. 8, no. 3, pp. 2326-2341, Jul.-Sep. 2021.
Z. Guo, K. Yu, Y. Li, G. Srivastava, and J. C.-W. Lin, "Deep learningembedded social Internet of Things for ambiguity-aware social recommendations," IEEE Trans. Netw. Sci. Eng., vol. 9, no. 3, pp. 1067-1081, May/Jun. 2022.
Y. Han, R. Wang, and J. Wu, "Random caching optimization in largescale cache-enabled Internet of Things networks," IEEE Trans. Netw. Sci. Eng., vol. 7, no. 1, pp. 385-397, Jan.-Mar. 2020.
M. G. Kibria, K. Nguyen, G. P. Villardi, O. Zhao, K. Ishizu, and F. Kojima, "Big data analytics, machine learning, and artificial intelligence in next-generation wireless networks," IEEE Access, vol. 6, pp. 32328-32338, 2018.
H. Tao, M. Z. A. Bhuiyan, A. N. Abdalla, M. M. Hassan, J. M. Zain, and T. Hayajneh, "Secured data collection with hardware-based ciphers for IoT-based healthcare," IEEE Internet Things J., vol. 6, no. 1, pp. 410-420, Feb. 2019.
A. Gupta, M. Tripathi, T. J. Shaikh, and A. Sharma, "A lightweight anonymous user authentication and key establishment scheme for wearable devices," Comput. Netw., vol. 149, pp. 29-42, 2019.
Y. Liu, M. Ma, X. Liu, N. N. Xiong, A. Liu, and Y. Zhu, "Design and analysis of probing route to defense sink-hole attacks for Internet of Things security," IEEE Trans. Netw. Sci. Eng., vol. 7, no. 1, pp. 356-372, Jan.-Mar. 2020.
J. Srinivas, A. K. Das, N. Kumar, and J. J. Rodrigues, "Cloud centric authentication for wearable healthcare monitoring system," IEEE Trans. Dependable Secure Comput., vol. 17, no. 5, pp. 942-956, Sep.-Oct. 2020.
C.-C. Chang and H.-D. Le, "A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks," IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 357-366, Jan. 2016.
S. R. Moosavi et al., "End-to-end security scheme for mobility enabled healthcare Internet of Things," Future Gener. Comput. Syst., vol. 64, pp. 108-124, 2016.
J. Liu, Z. Zhang, X. Chen, and K. S. Kwak, "Certificateless remote anonymous authentication schemes for wirelessbody area networks," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 332-342, Feb. 2014.
M. Chen, Y. Ma, S. Ullah, W. Cai, and E. Song, "ROCHAS: Robotics and cloud-assisted healthcare system for empty nester," in Proc. 8th Int. Conf. Body Area Netw., 2013, pp. 217-220.
M. Chen, "NDNC-BAN: Supporting rich media healthcare services via named data networking in cloud-assisted wireless body area networks," Inf. Sci., vol. 284, pp. 142-156, 2014.
M. Chen, S. Mao, and Y. Liu, "Big data: A survey," Mobile networks and applications, vol. 19, no. 2, pp. 171-209, 2014.
X. Ling, J. Gong, R. Li, S. Yu, Q. Ma, and X. Chen, "Dynamic age minimization with real-time information preprocessing for edge-assisted IoT devices with energy harvesting," IEEE Trans. Netw. Sci. Eng., vol. 8, no. 3, pp. 2288-2300, Jul.-Sep. 2021.
J. Wan, H. Yan, H. Suo, and F. Li, "Advances in cyber-physical systems research," KSII Trans. Internet Inf. Syst., vol. 5, no. 11, pp. 1891-1908, 2011.
J.Wan, D. Zhang, S. Zhao, L. T. Yang, and J. Lloret, "Context-aware vehicular cyber-physical systems with cloud support: Architecture, challenges, and solutions," IEEE Commun. Mag., vol. 52, no. 8, pp. 106-113, Aug. 2014.
M. Chen, Y. Hao, Y. Li, C.-F. Lai, and D. Wu, "On the computation offloading at ad hoc cloudlet: Architecture and service modes," IEEE Commun. Mag., vol. 53, no. 6, pp. 18-24, Jun. 2015.
Y. Wang et al., "A framework of energy efficient mobile sensing for automatic user state recognition," in Proc. 7th Int. Conf. Mobile Syst., Appl., Serv., 2009, pp. 179-192.
Y. Cui, X. Ma, H. Wang, I. Stojmenovic, and J. Liu, "A survey of energy efficient wireless transmission and modeling in mobile cloud computing," Mobile Netw. Appl., vol. 18, no. 1, pp. 148-155, 2013.
H. Xiong, D. Zhang, G. Chen, L. Wang, and V. Gauthier, "Crowdtasker: Maximizing coverage quality in piggyback crowdsensing under budget constraint," in Proc. IEEE Int. Conf. Pervasive Comput. Commun., 2015, pp. 55-62.
H. Li, T. Li, and Y. Wang, "Dynamic participant recruitment of mobile crowd sensing for heterogeneous sensing tasks," in Proc. IEEE 12th Int. Conf. Mobile Ad Hoc Sensor Syst., 2015, pp. 136-144.
P. Foremski, M. Gorawski, K. Grochla, and K. Polys, "Energy-efficient crowdsensing of human mobility and signal levels in cellular networks," Sensors, vol. 15, no. 9, pp. 22060-22088, 2015.
K. Micinski, P. Phelps, and J. S. Foster, "An empirical study of location truncation on android," Weather, vol. 2, 2013, Art. no. 21.
R. Chow and P. Golle, "Faking contextual data for fun, profit, and privacy," in Proc. 8th ACM Workshop Privacy Electron. Soc., 2009, pp. 105-108.
A. Razaque et al., "A mobility-aware human-centric cyber-physical system for efficient and secure smart healthcare," IEEE Internet Things J., vol. 9, no. 22, pp. 22434-22452, Nov. 2022.
M. Wazid, S. Thapliyal, D. P. Singh, A. K. Das, and S. Shetty, "Design and testbed experiments of user authentication and key establishment mechanism for smart healthcare cyber physical systems," IEEE Trans. Netw. Sci. Eng., vol. 10, no. 5, pp. 2697-2709, Sep.-Oct. 2023.
D. K. Mahmood et al., "Cloud-assisted secure and cost-effective authenticated solution for remote wearable health monitoring system," IEEE Trans. Netw. Sci. Eng., vol. 10, no. 5, pp. 2710-2718, Sep.-Oct. 2023.
K. Fawaz, H. Feng, and K. G. Shin, "Anatomization and protection of mobile apps' location privacy threats," in Proc. 24th USENIX Secur. Symp., 2015, pp. 753-768.
W. Wang and Q. Zhang, "A stochastic game for privacy preserving context sensing on mobile phone," in Proc. IEEE Conf. Comput. Commun., 2014, pp. 2328-2336.