Skip to main content

Advertisement

Log in

Health Fog: a novel framework for health and wellness applications

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In the past few years the role of e-health applications has taken a remarkable lead in terms of services and features inviting millions of people with higher motivation and confidence to achieve a healthier lifestyle. Induction of smart gadgetries, people lifestyle equipped with wearables, and development of IoT has revitalized the feature scale of these applications. The landscape of health applications encountering big data need to be replotted on cloud instead of solely relying on limited storage and computational resources of handheld devices. With this transformation, the outcome from certain health applications is significant where precise, user-centric, and personalized recommendations mimic like a personal care-giver round the clock. To maximize the services spectrum from these applications over cloud, certain challenges like data privacy and communication cost need serious attention. Following the existing trend together with an ambition to promote and assist users with healthy lifestyle we propose a framework of Health Fog where Fog computing is used as an intermediary layer between the cloud and end users. The design feature of Health Fog successfully reduces the extra communication cost that is usually found high in similar systems. For enhanced and flexible control of data privacy and security, we also introduce the cloud access security broker (CASB) as an integral component of Health Fog where certain polices can be implemented accordingly. The modular framework design of Health Fog is capable of engaging data from multiple resources together with adequate level of security and privacy using existing cryptographic primitives.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. Depending upon the nature of proposed framework we will refer Fog computing as Health Fog.

References

  1. FitnessKeeper (2015) Runkeeper everyone every run. http://runkeeper.com/

  2. Noom (2015) Noom help you to make a change. https://www.noom.com/

  3. Azumio (2015) Argus quantify your day-to-day. http://www.azumio.com/s/argus/index.html

  4. myfitnesspal (2015) Lose weight with myfitnesspal. https://www.myfitnesspal.com/

  5. Fitocracy (2015) Fitocracy. https://www.fitocracy.com/

  6. Digifit (2015) Digifit personal engagement solution. http://www.digifit.com/personal-solutions.html

  7. MIOLink (2015) Mio train with heart. http://www.mioglobal.com

  8. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, pp 13–16

  9. Firstbrook P, MacDonald N (2015) The growing importance of cloud access security brokers. https://www.gartner.com/doc/2032015/growing-importance-cloud-access-security

  10. HP cloud access security protection platform. Business white paper : Case for a cloud access security brokers. hp.com/go/CloudAccessSecurity, (2015)

  11. Fischlin M (2001) A cost-effective pay-per-multiplication comparison method for millionaires. In: Topics in Cryptology CT-RSA 2001, Springer. pp 457–471

  12. Sweeney Latanya (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl Based Syst 10(05):571–588

    Article  MathSciNet  MATH  Google Scholar 

  13. Sweeney Latanya (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570

    Article  MathSciNet  MATH  Google Scholar 

  14. Evdokimov S, Günther O (2007) Encryption techniques for secure database outsourcing. In: Computer Security–ESORICS 2007, Springer, pp 327–342

  15. De Capitani S, Di Vimercati FS, Jajodia S, Paraboschi S, Samarati P (2007) A data outsourcing architecture combining cryptography and access control. In: Proceedings of the 2007 ACM workshop on Computer security architecture, ACM, pp 63–69

  16. Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N (2011) Relational cloud: a database-as-a-service for the cloud

  17. Google (2013) Google app engine. https://cloud.google.com/products/app-engine

  18. Shi Y, Ding G, Wang H, Roman HE, Lu S (2015) The fog computing service for healthcare. In: 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), IEEE, pp 1–5

  19. Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, pp 1–8

  20. Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW), IEEE, pp 125–128

  21. Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an iot recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp 325–329

  22. Paillier P (2000) Trapdooring discrete logarithms on elliptic curves over rings. In: Okamoto T (ed) Advances in CryptologyASI—ACRYPT 2000. Springer, Berlin, Heidelberg, pp 573–584

  23. Paillier P (1999) Public key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT’99, Springer-Verlag, Berlin, Heidelberg, pp 223–238

  24. Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS (2010) A cloud computing solution for patient’s data collection in health care institutions. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10, IEEE, pp. 95–99

  25. Chen Y, Shen W, Huo H, Xu Y (2010) A smart gateway for health care system using wireless sensor network. In: 2010 Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM), IEEE, pp 545–550

  26. Laine TH, Lee C, Suk H (2014) Mobile gateway for ubiquitous health care system using zigbee and bluetooth. In: 014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2. IEEE, pp 139–145

  27. Yang S, Gerla M (2011) Personal gateway in mobile health monitoring. In: 011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2. IEEE, pp 636–641

  28. Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing. ACM, pp 15–20

  29. Gia TN, Rahmani MJAM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet-of-things: a case study on ecg feature extraction

  30. Hussain J, Khan WA, Afzal M, Hussain M, Kang BH, Lee S (2014) Adaptive user interface and user experience based authoring tool for recommendation systems. In: Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. Springer, pp 136–142

Download references

Acknowledgments

This work was supported by a grant from the Kyung Hee University in 2013[KHU-20130439].

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Mahmood Ahmad or Taechoong Cheong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmad, M., Amin, M.B., Hussain, S. et al. Health Fog: a novel framework for health and wellness applications. J Supercomput 72, 3677–3695 (2016). https://doi.org/10.1007/s11227-016-1634-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-016-1634-x

Keywords

Navigation