Abstract
Wireless computing has revolutionized our life with the technological advancement from the traditional networking into a new epoch for communication in ad hoc decorum. An energy efficient network of sensors based on wireless communication and networking principles can enhance the effectiveness of computing during unpredictable circumstances. If a computable required resource is readily available within the reachable region and it is identified to be idle and it is ready to share the corresponding information from its end without affecting the normal behavior of the device or the node, then there exists an opportunity to utilize those resources for computing. Opportunistic computing has a great potential of growth in the field of wireless ad hoc network computing. In traditional network computing technology, mobile computing, grid computing, distributed computing, ubiquitous computing and cloud computing, formerly ensues the communication with minimal resources currently available at the terminal point. This paper proposes a novel framework for an effective utilization of sharable resources, which are available within the reachable region, by creating an opportunity to frame an opportunistic computing while preserving the user’s privacy. The proposed framework adopts a bio-inspired technique for identifying and collecting resources information, and thereby recognizes which resource is ready to participate in the opportunistic computing. Experimental results of a system that implements the bio-inspired technique along with the natural behavior of the bee colony approach was analyzed and found that the proposed system shows comparatively high performance in terms of computation resource searching, identifying, emergency data transfer, and participative node privacy preserving.














Similar content being viewed by others
References
Karaboga D (2005) An idea based on honey bee swarm for numerical optimization. Technical report-TR06, Erciyes University, Engineering Faculty, Computer Engineering Department
Ding G, Wu X, Bhargava B (2008) Performance evaluation of multiple-rate mobile ad hoc networks. Perform Evaluat 63:1110–1126
Huang Y-F, Lin K-H (2009) Global data allocation based on user behaviors in mobile computing environments. ComputCommun 31:2420–2427
Chan E, Li W, Chen D (2010) Energy saving strategies for cooperative cache replacement in mobile ad hoc networks. Perv Mobile Comput 5:77–92
Kurkovsky S (2010) Multimodality in mobile computing and mobile devices: methods for adaptable usability. Springer, New York, ISBN 978–1–60566–978–6
Whitbeck J, Conan V, de Amorim MD (2012) Push-and-track: Saving infrastructure bandwidth through opportunistic forwarding. Perv Mobile Comput 8:682–697
Babu D, Venkata Krishna P (2013) Honey bee behavior inspired load balancing of tasks in cloud computing environments. Appl Soft Comput 13:2292–2303
Meng S, Qi L, Li Q et al (2019) Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems. FutGenerComputSyst. https://doi.org/10.1016/j.future.2019.02.016
Wen X-Y, Sang H-Y (2013) Honey bees mating optimization algorithm for process planning problem. J Intel Manuf 25(3):459–472
Chandramohan D (2015) Bio-comp: a bio-inspired opportunistic computing framework for cooperative problem solving environments. Pondicherry University, Diss
Boussada R, Hamdane B, Elhdhili ME, Saidane LA (2019) Privacy-preserving aware data transmission for IoT-based E-health. ComputNetw. https://doi.org/10.1016/j.comnet.2019.106866
Feng J, Yang LT, Gati NJ, Xie X, Gavuna BS (2019) Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives. InfSci. https://doi.org/10.1016/j.ins.2019.07.036
Zhao H, Yao X, Zheng X, Qiu T, Ning H (2019) User stateless privacy preserving TPA auditing scheme for cloud storage. J NetwComputAppl. https://doi.org/10.1016/j.jnca.2019.01.005
Yao Z, Ge J, Wu Y, Jian L (2019) A privacy preserved and credible network protocol. J ParallDistribComput. https://doi.org/10.1016/j.jpdc.2019.06.002
Li S, Mu N, Le J, Liao X (2019) Privacy preserving frequent itemset mining: maximizing data utility based on database reconstruction. Comput Sec. https://doi.org/10.1016/j.cose.2019.03.008
Dargie W, Poellabauer C (2010) Fundamentals of wireless sensor networks theory and practice. Wiley, Hoboken, ISBN 978–0–470–99765–9
Chen X, Kim Y-A, Wang B (2011) Fault-tolerant monitor placement for out-of-band wireless sensor network monitoring. Ad Hoc Netw 10:62–74
Lu R, Lin X, Shen X (2011) SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. Trans ParallDistribSyst IEEE 24(3):614–624
Papageorgiou C, Birkos K, Dagiuklas T, Kotsopoulos S (2012) Modeling human mobility in obstacle-constrained ad hoc networks. Ad Hoc Netw 10:421–434
privacy-preserving data outsourcing framework with differential privacy (2020) Dagher, G.G., Fung, B.C.M., Mohammed, N, et al. SecDM. KnowlInfSyst 62:1923–1960. https://doi.org/10.1007/s10115-019-01405-7
Dilip G (2020) An efficient privacy preserving on high-order heterogeneous data using fuzzy K-prototype clustering. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01987-z
Patel T, Patel V (2020) Data privacy in construction industry by privacy-preserving data mining (PPDM) approach. Asian J CivEng 21:505–515. https://doi.org/10.1007/s42107-020-00225-3
Liu J, Tian Y, Zhou Y, Xiao Y, Ansari N (2020) Privacy preserving distributed data mining based on secure multi-party computation. ComputCommun. https://doi.org/10.1016/j.comcom.2020.02.014
Chamikara MAP, Bertok P, Khalil I, Liu D, Camtepe S (2020) Privacy preserving face recognition utilizing differential privacy. Comput Sec. https://doi.org/10.1016/j.cose.2020.101951
Rahman MS, Khalil I, Atiquzzaman M, Yi X (2020) Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption. EngApplArtif Intel. https://doi.org/10.1016/j.engappai.2020.103737
Gonçalves C, Bessa RJ, Pinson P (2020) A critical overview of privacy-preserving approaches for collaborative forecasting. Int J Forecast. https://doi.org/10.1016/j.ijforecast.2020.06.003
Carpov S, Gama N, Georgieva M et al (2020) Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption. BMC Med Genomics 13:88. https://doi.org/10.1186/s12920-020-0723-0
Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2020) Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J ParalDistribComput. https://doi.org/10.1016/j.jpdc.2019.08.014
Bernabe JB, David M, Moreno RT, Cordero JP, Bahloul S, Skarmeta A (2020) ARIES: evaluation of a reliable and privacy-preserving European identity management framework. FutGenerComputSyst 102:409–425. https://doi.org/10.1016/j.future.2019.08.017
Gheisari M, Wang G, Chen S (2020) An edge computing-enhanced internet of things framework for privacy-preserving in smart city. Comput Elect Eng 81:106504. https://doi.org/10.1016/j.compeleceng.2019.106504
Li W, Zong N, Liu K et al (2020) A privacy-preserving group decision making expert system for medical diagnosis based on dynamic knowledge base. Wireless Netw. https://doi.org/10.1007/s11276-020-02374-4
Liu X, Li H, Xu G et al (2020) Adaptive privacy-preserving federated learning. Peer-to-Peer NetwAppl. https://doi.org/10.1007/s12083-019-00869-2
Makhdoom I, Zhou I, Abolhasan M, Lipman J, Ni W (2019) PrivySharing: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput Sec. https://doi.org/10.1016/j.cose.2019.101653
Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo KR (2020) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Ind Inform 16(8):5110–5118. https://doi.org/10.1109/TII.2019.2957140
Alamer A, Basudan S (2020) An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing. EngApplArtif Intel. https://doi.org/10.1016/j.engappai.2020.103583
Duan J, Zhou J, Li Y (2020) Privacy-preserving distributed deep learning based on secret sharing. InfSci 527:108–127. https://doi.org/10.1016/j.ins.2020.03.074
Preuveneers D, Garofalo G, Joosen W (2020) Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. InfSyst Front. https://doi.org/10.1007/s10796-020-09993-4
Ramesh S, Govindarasu M (2020) An efficient framework for privacy-preserving computations on encrypted IoT data. IEEE Intern Things J. https://doi.org/10.1109/JIOT.2020.2998109
Xu Z, Yang W, Xiong Z et al (2020) TPSense: a framework for event-reports trustworthiness evaluation in privacy-preserving vehicular crowdsensing systems. J Sign Process Syst. https://doi.org/10.1007/s11265-020-01559-6
Zhang L, Ren J, Mu Y, Wang B (2020) Privacy-preserving multi-authority attribute-based data sharing framework for smart grid. IEEE Access 8:23294–23307. https://doi.org/10.1109/ACCESS.2020.2970272
Zhang X, Yang L, Ding Z, Song J, Zhai Y, Zhang D (2021) Sparse vector coding-based multi-carrier NOMA for in-home health networks. IEEE J Select Areas Commun 39(2):325–337. https://doi.org/10.1109/JSAC.2020.3020679
Shi N, Tan L, Li W, Qi X, Yu K (2020) A blockchain-empowered AAA scheme in the large-scale HetNet. Dig CommunNetw. https://doi.org/10.1016/j.dcan.2020.10.002
Feng C, Yu K, Aloqaily M, Alazab M, Lv Z, Mumtaz S (2020) Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV. IEEE Trans VehicTechnol 69(11):13784–13795. https://doi.org/10.1109/TVT.2020.3027568
Arachchige PCM, Bertok P, Khalil I, Liu D, Camtepe S, Atiquzzaman M (2020) "A trustworthy privacy preserving framework for machine learning in industrial IoT systems. IEEE Trans IndInf 16(9):6092–6102. https://doi.org/10.1109/TII.2020.2974555
Funding
This Research Received no specific grant from any funding agency in the public, commercial or not-for-profit sectors.
Author information
Authors and Affiliations
Contributions
The authors have proposed a novel framework for an effective utilization of sharable resources, which are available within the reachable region, by creating an opportunity to frame an opportunistic computing while preserving the user’s privacy.
Corresponding author
Ethics declarations
Conflict of interests
The authors of this research article declare that no conflict of interest in preparing this research article.
Ethical approval and consent to participate.
Not applicable.
Consent for publication
All the authors of this paper have shown their Participation voluntarily.
Availability of supporting data
The data will be provided based on data request by the evaluation team.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dhasarathan, C., Kumar, M., Srivastava, A.K. et al. A bio-inspired privacy-preserving framework for healthcare systems. J Supercomput 77, 11099–11134 (2021). https://doi.org/10.1007/s11227-021-03720-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-03720-9