Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing

Published: 05 September 2022 Publication History

Abstract

With the continuous spread of COVID-19 virus, how to guarantee the healthy living of people especially the students who are of relative weak physique is becoming a key research issue of significant values. Specifically, precise recognition of the anomaly in student health conditions is beneficial to the quick discovery of potential patients. However, there are so many students in each school that the education managers cannot know about the health conditions of students in a real-time manner and accurately recognize the possible anomaly among students quickly. Fortunately, the quick development of mobile cloud computing technologies and wearable sensors has provided a promising way to monitor the real-time health conditions of students and find out the anomalies timely. However, two challenges are present in the above anomaly detection issue. First, the health data monitored by massive wearable sensors are often massive and updated frequently, which probably leads to high sensor-cloud transmission cost for anomaly detection. Second, the health data of students are often sensitive enough, which probably impedes the integration of health data in cloud environment even renders the health data-based anomaly detection infeasible. In view of these challenges, we propose a time-efficient and privacy-aware anomaly detection solution for students with wearable sensors in mobile cloud computing environment. At last, we validate the effectiveness and efficiency of our work via a set of simulated experiments.

References

[1]
Ferraz Junior N, Silva AA, Guelfi AE, and Kofuji ST Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages J Cloud Comput 2022 11 1 1-17
[2]
Wang S, Cong Y, Zhu H, Chen X, Qu L, Fan H, et al. Multi-scale context-guided deep network for automated lesion segmentation with endoscopy images of gastrointestinal tract IEEE J Biomed Health Inform 2020 25 2 514-525
[3]
Uslu BÇ, Okay E, and Dursun E Analysis of factors affecting IoT-based smart hospital design J Cloud Comput 2020 9 1 1-23
[4]
Cui WH and Ye J Logarithmic similarity measure of dynamic neutrosophic cubic sets and its application in medical diagnosis Comput Ind 2019 111 198-206
[5]
Fu J, Ye J, and Cui W An evaluation method of risk grades for prostate cancer using similarity measure of cubic hesitant fuzzy sets J Biomed Inform 2018 87 131-137
[6]
Ye J and Fu J Multi-period medical diagnosis method using a single valued neutrosophic similarity measure based on tangent function Comput Methods Programs Biomed 2016 123 142-149
[7]
Feng S, Shen S, Huang L, Champion AC, Yu S, Wu C, et al. Three-dimensional robot localization using cameras in wireless multimedia sensor networks J Netw Comput Appl 2019 146 102425
[8]
Huang J, Lv B, Wu Y, et al. Dynamic Admission Control and Resource Allocation for Mobile Edge Computing Enabled Small Cell Network IEEE Trans Veh Technol 2022 71 2 1964-1973
[9]
Dai Y, Wu J, Fan Y, Wang J, Niu J, Gu F, et al. (2022) MSEva: A Musculoskeletal Rehabilitation Evaluation System Based on EMG Signals. ACM Trans Sensor Netw (TOSN).
[10]
Huang J, Tong Z, Feng Z. Geographical POI recommendation for Internet of Things: A federated learning approach using matrix factorization. Int J Commun Syst 1-1.
[11]
Liu Y, Song Z, Xu X, Rafique W, Zhang X, Shen J, et al. (2021) Bidirectional GRU networks-based next POI category prediction for healthcare. Int J Intel Syst.
[12]
Liu H, Xu X, Li E, Zhang S, Li X. (2021) Anomaly detection with representative neighbors. IEEE Trans Neural Netw Learn Syst. 
[13]
Kong L, Wang L, Gong W, Yan C, Duan Y, Qi L (2021) LSH-aware multitype health data prediction with privacy preservation in edge environment. World Wide Web 1-16. 
[14]
Liu J, Shen S, Yue G, Han R, and Li H A stochastic evolutionary coalition game model of secure and dependable virtual service in sensor-cloud Appl Soft Comput 2015 30 123-135
[15]
Li Y, Xu H, Cao Q, Li Z, and Shen S Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks Int J Distrib Sensor Netw 2015 11 2 818903
[16]
Zhou X, Liang W, Li W, Yan K, Shimizu S, Kevin I, et al. (2021) Hierarchical Adversarial Attacks Against Graph Neural Network Based IoT Network Intrusion Detection System. IEEE Internet Things J. 
[17]
Liu J, Wang X, Shen S, Fang Z, Yu S, Yue G, et al. (2021) Intelligent jamming defense using DNN Stackelberg game in sensor edge cloud. IEEE Internet Things J. 
[18]
Zhou H, Shen S, and Liu J Malware propagation model in wireless sensor networks under attack-defense confrontation Computer Communications 2020 162 51-58
[19]
Zhou X, Yang X, Ma J, Kevin I, Wang K (2021) Energy efficient smart routing based on link correlation mining for wireless edge computing in IoT. IEEE Internet Things J. 
[20]
Zhang H, Shen S, Cao Q, Wu X, and Liu S Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton Int J Distrib Sensor Netw 2020 16 11 1550147720972944
[21]
Liu J, Wang X, Yue G, and Shen S Data sharing in VANETs based on evolutionary fuzzy game Futur Gener Comput Syst 2018 81 141-155
[22]
Chen Y, Gu W, Li K. Dynamic task offloading for Internet of Things in mobile edge computing via deep reinforcement learning. Int J Commun Syst
[23]
Bao Y, Tang Z, Li H, and Zhang Y Computer vision and deep learning-based data anomaly detection method for structural health monitoring Structural Health Monitoring 2019 18 2 401-421
[24]
Tang Z, Chen Z, Bao Y, and Li H Convolutional neural network-based data anomaly detection method using multiple information for structural health monitoring Struct Control Health Monit 2019 26 1 e2296
[25]
Lee K, Kim JK, Kim J, Hur K, Kim H (2018) CNN and GRU combination scheme for bearing anomaly detection in rotating machinery health monitoring. In: 2018 1st IEEE International conference on knowledge innovation and invention (ICKII). IEEE, pp 102-105
[26]
Nguyen LH and Goulet JA Anomaly detection with the switching kalman filter for structural health monitoring Struct Control Health Monit 2018 25 4 e2136
[27]
Sarmadi H and Karamodin A A novel anomaly detection method based on adaptive Mahalanobis-squared distance and one-class kNN rule for structural health monitoring under environmental effects Mech Syst Signal Process 2020 140 106495
[28]
Qi L, Yang Y, Zhou X, Rafique W, Ma J (2021) Fast Anomaly Identification Based on Multi-Aspect Data Streams for Intelligent Intrusion Detection Toward Secure Industry 4.0. IEEE Trans Ind Inform
[29]
Wang W, Wang Z, Zhou Z, Deng H, Zhao W, Wang C, et al. Anomaly detection of industrial control systems based on transfer learning Tsinghua Sci Technol 2021 26 6 821-832
[30]
Guezzaz A, Asimi Y, Azrour M, and Asimi A Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection Big Data Mining and Analytics 2021 4 1 18-24
[31]
Ying C, Hua X, Zhuo M, et al. (2022) Cost-Efficient Edge Caching for NOMA-enabled IoT Services. China Commun
[32]
Zhang K, Tian Z, Cai Z, and Seo D Link-privacy preserving graph embedding data publication with adversarial learning Tsinghua Sci Technol 2021 27 2 244-256
[33]
Sandhu AK Big data with cloud computing: Discussions and challenges Big Data Mining Analytics 2021 5 1 32-40
[34]
Qi L, Hu C, Zhang X, Khosravi MR, Sharma S, Pang S, et al. Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment IEEE Trans Ind Inform 2021 17 6 4159-4167
[35]
Yuan Q, Wang D, Zhao Y, Sang Y, Wang F, Liu Y, et al. Privacy-aware examination results ranking for the balance between teachers and mothers Tsinghua Sci Technol 2021 27 3 581-588
[36]
Li F, Yu X, Ge R, Wang Y, Cui Y, and Zhou H BCSE: Blockchain-based trusted service evaluation model over big data Big Data Min Analytics 2021 5 1 1-14
[37]
Yuan L, He Q, Chen F, Zhang J, Qi L, Xu X, et al. CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain IEEE Trans Parallel Distrib Syst 2021 33 8 1873-1887
[38]
Xu J, Li D, Gu W, et al. UAV-assisted Task Offloading for IoT in Smart Buildings and Environment via Deep Reinforcement Learning Building and Environment 2022
[39]
Zheng X, Zhang L, Li K, and Zeng X Efficient publication of distributed and overlapping graph data under differential privacy Tsinghua Sci Technol 2021 27 2 235-243
[40]
Wang H, Cao Z, Zhou Y, Guo ZK, and Ren Z Sampling with prior knowledge for high-dimensional gravitational wave data analysis Big Data Min Analytics 2021 5 1 53-63
[41]
Chen Y, Zhao F, Lu Y, Chen X. Dynamic task offloading for mobile edge computing with hybrid energy supply. Tsinghua Science and Technology
[42]
Zhou X, Hu Y, Wu J, Liang W, Ma J, Jin Q (2022) Distribution Bias Aware Collaborative Generative Adversarial Network for Imbalanced Deep Learning in Industrial IoT. IEEE Trans Ind Inform. 
[43]
Wu Z, Shen S, Zhou H, Li H, Lu C, and Zou D An effective approach for the protection of user commodity viewing privacy in e-commerce website Knowl-Based Syst 2021 220 106952
[44]
Liang W, Hu Y, Zhou X, Pan Y, Kevin I, and Wang K Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT IEEE Trans Ind Inform 2021 18 8 5087-5095
[45]
Qi L, Zhang X, Dou W, and Ni Q A Distributed Locality-Sensitive Hashing based Approach for Cloud Service Recommendation from Multi-Source Data IEEE J Sel Areas Commun 2017 35 11 2616-2624
[46]
Chen Y, Liu Z, Zhang Y, Wu Y, Chen X, and Zhao L Deep reinforcement learning-based dynamic resource management for mobile edge computing in industrial internet of things IEEE Trans Ind Inform 2021 17 7 4925-4934
[47]
Su YS, Ruan Y, Sun S, and Chang YT A Pattern Recognition Framework for Detecting Changes in Chinese Internet Management System J Soc Comput 2020 1 1 28-39
[48]
Li T, Li C, Luo J, and Song L Wireless recommendations for Internet of vehicles: Recent advances, challenges, and opportunities Intell Converged Netw 2020 1 1 1-17
[49]
Evans J Social computing unhinged. J Soc Comput 2020 1 1 1-13
[50]
Qi L, Lin W, Zhang X, Dou W, Xu X, Chen J (2022) A Correlation Graph based Approach for Personalized and Compatible Web APIs Recommendation in Mobile APP Development. IEEE Trans Knowl Data Eng.
[51]
Gao X, Luo JD, Yang K, Fu X, Liu L, and Gu W Predicting Tie Strength of Chinese Guanxi by Using Big Data of Social Networks J Soc Comput 2020 1 1 40-52
[52]
Catlett C, Beckman P, Ferrier N, Nusbaum H, Papka ME, Berman MG, et al. Measuring cities with software-defined sensors J Soc Comput 2020 1 1 14-27
[53]
Rahman GS, Dang T, and Ahmed M Deep reinforcement learning based computation offloading and resource allocation for low-latency fog radio access networks Intelligent and Converged Networks. 2020 1 3 243-257
[54]
Meng S, Huang W, Yin X, Khosravi MR, Li Q, Wan S, et al. Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications IEEE Trans Ind Inform 2020 17 6 4219-4228
[55]
Nath S and Wu J Deep reinforcement learning for dynamic computation offloading and resource allocation in cache-assisted mobile edge computing systems Intell Converged Netw 2020 1 2 181-198
[56]
Chen Y, Zhao F, Chen X, and Wu Y Efficient Multi-Vehicle Task Offloading for Mobile Edge Computing in 6G Networks IEEE Trans Veh Technol 2022 71 5 4584-4595

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Cloud Computing: Advances, Systems and Applications
Journal of Cloud Computing: Advances, Systems and Applications  Volume 11, Issue 1
Dec 2022
1609 pages
ISSN:2192-113X
EISSN:2192-113X
Issue’s Table of Contents

Publisher

Hindawi Limited

London, United Kingdom

Publication History

Published: 05 September 2022
Accepted: 26 July 2022
Received: 08 June 2022

Author Tags

  1. Mobile cloud computing
  2. Healthcare
  3. Privacy
  4. Wearable sensors
  5. Anomaly detection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media