Skip to main content

Assisted Fog Computing Approach for Data Privacy Preservation in IoT-Based Healthcare

  • Chapter
  • First Online:
Security and Privacy Preserving for IoT and 5G Networks

Part of the book series: Studies in Big Data ((SBD,volume 95))

Abstract

Recently, the internet of things (IoT) technologies plays a very important role in various important sectors such as healthcare, education and industry. It has changed the conventional way of diagnosing some diseases and accelerating the check-up process through using IoT medical devices. Many IoT devices are available for measuring the biomarkers such as heart rate, sugar level and blood pressure, etc. However, the privacy of these data collected via IoT medical devices remains a challenge that hinders the use of these devices in clinical practice. The massive data collected by these devices vary in their sensitivity to patients. The more sensitive data requires fast computation and processing to avoid any delay that may occur. The processing of such data in the cloud may lead to operations delay which is needed by a real-time monitoring application. Therefore, this research intends to provide Healthcare Internet of Thing (H-IoT)-based framework for the classification of streamed data according to their criticality level. After the classification, the more crucial data will be computed in fog rather than in the cloud to avoid latency. Future work will extend this work by implementing the proposed framework and evaluating its outcomes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alshohoumi, F., Sarrab, M., Al-Abri, D., Al Hamadani, A.: Systematic review of existing IoT architectures security and privacy issues and concerns. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 10(7), 232–251 (2019)

    Google Scholar 

  2. Alhazmi, O.H., Aloufi, K.S.: Fog-based internet of things: a security scheme. In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6 (2019). https://doi.org/10.1109/CAIS.2019.8769506

  3. Sood, S.K., Mahajan, I.: IoT-fog-based healthcare framework to identify and control hypertension attack. IEEE Internet Things J. 6(2), 1920–1927 (2019). https://doi.org/10.1109/JIOT.2018.2871630

    Article  Google Scholar 

  4. Macdermott, A., Kendrick, P., Idowu, I., Ashall, M., Shi, Q.: Securing things in the healthcare internet of things. In: 2019 Global IoT Summit (GIoTS) (2019). https://doi.org/10.1109/GIOTS.2019.8766383

  5. Alharam, A.K., El-Madany, W.: Complexity of cybersecurity architecture for IoT healthcare industry: a comparative study. In: 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 246–250 (2017). https://doi.org/10.1109/FiCloudW.2017.100

  6. Baker, S.B., Xiang, W., Atkinson, I.: Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE Access 5, 26521–26544 (2017). https://doi.org/10.1109/ACCESS.2017.2775180

    Article  Google Scholar 

  7. Pulkkis, G., Westerlund, M., Karlsson, J., Tana, J.: Secure and reliable internet of things systems for healthcare, pp. 169–176 (2017). https://doi.org/10.1109/FiCloud.2017.50

  8. Ozcan, K., Velipasalar, S., Varshney, P.K.: Autonomous fall detection with wearable cameras by using relative entropy distance measure. IEEE Trans. Hum.-Mach. Syst. (2017). https://ieeexplore.ieee.org/iel7/6221037/6340045/07740939.pdf. Accessed 13 Jan 2019

  9. Islam, S.M.R., Kwak, D., Kabir, M.D.H., Hossain, M., Kwak, K.-S.: The internet of things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)

    Article  Google Scholar 

  10. Yeole, A.S., Kalbande, D.R.: Use of internet of things (IoT) in healthcare, pp. 71–76 (2016). https://doi.org/10.1145/2909067.2909079

  11. Torre, I., Koceva, F., Sanchez, O.R., Adorni, G.: A framework for personal data protection in the IoT. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 384–391 (2017). https://doi.org/10.1109/ICITST.2016.7856735

  12. Nahapetian, A.: Side-channel attacks on mobile and wearable systems. In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 243–247 (2016)

    Google Scholar 

  13. Bahirat, P., He, Y., Menon, A., Knijnenburg, B.: A data-driven approach to developing IoT privacy-setting interfaces. In: 23rd International Conference on Intelligent User Interfaces, pp. 165–176 (2018)

    Google Scholar 

  14. Sarrab, M., Alshohoumi, F.: Privacy concerns in IoT a deeper insight into privacy concerns in IoT based healthcare. Int. J. Comput. Digit. Syst. 9(3), 399–418 (2020)

    Article  Google Scholar 

  15. Chen, D., Kalra, S., Irwin, D., Shenoy, P., Albrecht, J.: Preventing occupancy detection from smart meters. IEEE Trans. Smart Grid 6(5), 2426–2434 (2015)

    Article  Google Scholar 

  16. Barker, S., Kalra, S., Irwin, D., Shenoy, P.: Powerplay: creating virtual power meters through online load tracking. In: Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings, pp. 60–69 (2014)

    Google Scholar 

  17. Chen, D., Bovornkeeratiroj, P., Irwin, D., Shenoy, P.: Private memoirs of IoT devices: safeguarding user privacy in the IoT Era. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1327–1336 (2018). https://doi.org/10.1109/ICDCS.2018.00133.

  18. Djenna, A., Saidouni, D.E.: Cyber attacks classification in IoT-based-healthcare infrastructure. In: 2018 2nd Cyber Security in Networking Conference (CSNet), pp. 7471–7474 (2019). https://doi.org/10.1109/CSNET.2018.8602974

  19. Andriopoulou, F., Dagiuklas, T., Orphanoudakis, T.: Integrating IoT and fog computing for healthcare service delivery. In: Components and Services for IoT Platforms, pp. 213–232. Springer (2017)

    Google Scholar 

  20. Gill, S.S., Arya, R.C., Wander, G.S., Buyya, R.: Fog-based smart healthcare as a big data and cloud service for heart patients using IoT. vol. 1, pp. 1376–1383 (2019). https://doi.org/10.1007/978-3-030-03146-6_161

  21. Farahani, B., Firouzi, F., Chang, V., Badaroglu, M., Constant, N., Mankodiya, K.: Towards fog-driven IoT eHealth: promises and challenges of IoT in medicine and healthcare. Future Gener. Comput. Syst. 78, 659–676 (2018)

    Article  Google Scholar 

  22. Muniz, J., Lakhani, A.: Investigating The Cyber Breach: the Digital Forensics Guide for the Network Engineer. Cisco Press (2018)

    Google Scholar 

  23. Alrawais, A., Alhothaily, A., Hu, C., Cheng, X.: Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017). https://doi.org/10.1109/MIC.2017.37

    Article  Google Scholar 

  24. Elgendy, I.A., Zhang, W., Tian, Y.C., Li, K.: Resource allocation and computation offloading with data security for mobile edge computing. Future Gener. Comput. Syst. (2019). https://doi.org/10.1016/j.future.2019.05.037

    Article  Google Scholar 

  25. Abou-Nassar, E.M., Iliyasu, A.M., El-Kafrawy, P.M., Song, O.Y., Bashir, A.K., El-Latif, A.A.A.: DITrust chain: towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access (2020). https://doi.org/10.1109/ACCESS.2020.2999468

    Article  Google Scholar 

  26. Elgendy, I.A., Muthanna, A., Hammoudeh, M., Shaiba, H., Unal, D., Khayyat, M.: Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing. Big Data (2021). https://doi.org/10.1089/big.2020.0284

    Article  Google Scholar 

  27. Sarrab, M., Alshohoumi, F.: Assisted-fog-based framework for IoT-based healthcare data preservation. Int. J. Cloud Appl. Comput. (IJCAC) 11(2), 1–16 (2021)

    Google Scholar 

  28. Azimi, I., et al.: HiCH: hierarchical fog-assisted computing architecture for healthcare IoT. ACM Trans. Embed. Comput. Syst. 16(5s), 1–20 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This work is funded by Omantel under the project code [EG/SQU-OT /1802]. This work is as a part of project title “Internet of Things (IoT) security and privacy aspects related to architecture, connectivity, and collected data”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Sarrab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sarrab, M., Alshohoumi, F. (2022). Assisted Fog Computing Approach for Data Privacy Preservation in IoT-Based Healthcare. In: Abd El-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E., Mazurczyk, W., Gupta, B.B. (eds) Security and Privacy Preserving for IoT and 5G Networks. Studies in Big Data, vol 95. Springer, Cham. https://doi.org/10.1007/978-3-030-85428-7_8

Download citation

Publish with us

Policies and ethics