Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model

Published: 16 June 2021 Publication History

Abstract

There have been significant advances in the field of Internet of Things (IoT) recently, which have not always considered security or data security concerns: A high degree of security is required when considering the sharing of medical data over networks. In most IoT-based systems, especially those within smart-homes and smart-cities, there is a bridging point (fog computing) between a sensor network and the Internet which often just performs basic functions such as translating between the protocols used in the Internet and sensor networks, as well as small amounts of data processing. The fog nodes can have useful knowledge and potential for constructive security and control over both the sensor network and the data transmitted over the Internet. Smart healthcare services utilise such networks of IoT systems. It is therefore vital that medical data emanating from IoT systems is highly secure, to prevent fraudulent use, whilst maintaining quality of service providing assured, verified and complete data. In this article, we examine the development of a Cognitive Fog (CF) model, for secure, smart healthcare services, that is able to make decisions such as opting-in and opting-out from running processes and invoking new processes when required, and providing security for the operational processes within the fog system. Overall, the proposed ensemble security model performed better in terms of Accuracy Rate, Detection Rate, and a lower False Positive Rate (standard intrusion detection measurements) than three base classifiers (K-NN, DBSCAN, and DT) using a standard security dataset (NSL-KDD).

References

[1]
2018. Decision Trees for Classification: A Machine Learning Algorithm. https://www.xoriant.com/blog/product-engineering/.
[2]
Karim Abouelmehdi, Abderrahim Beni Hssane, and Hayat Khaloufi. 2018. Big healthcare data: Preserving security and privacy. J. Big Data 5 (2018), 1.
[3]
Abdulla Amin Aburomman and Mamun Bin Ibne Reaz. 2016. A novel SVM-kNN-PSO ensemble method for intrusion detection system. Applied Soft Computing 38 (2016), 360-372.
[4]
Swati Agarwal, Shashank Yadav, and Arun kumar Yadav. 2016. An efficient architecture and algorithm for resource provisioning in fog computing. In Proceedings of the IEEE Region 10 Conference (TENCON’17). 3129–3134.
[5]
John Patrick C. Agustin, Joshua H. Jacinto, Wilbert Jethro R. Limjoco, and Jhoanna Rhodette I. Pedrasa. 2017. IPv6 routing protocol for low-power andLossy networks implementation in network simulator-3. In IEEE Region 10 Conference (TENCON 2017). IEEE, 3129–3134.
[6]
Mohammed Al-khafajiy, Thar Baker, Carl Chalmers, Muhammad Asim, Hoshang Kolivand, Muhammad Fahim, and Atif Waraich. 2019. Remote health monitoring of elderly through wearable sensors. Multimedia Tools and Applications (24 Jan 2019).
[7]
M. Al-khafajiy, T. Baker, A. Waraich, D. Al-Jumeily, and A. Hussain. 2018. IoT-Fog optimal workload via fog offloading. In 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion). 359–364.
[8]
Mohammed Al-khafajiy, Lee Webster, Thar Baker, and Atif Waraich. 2018. Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In 2nd International Conference on Future Networks and Distributed Systems. ACM, 9.
[9]
Ismaeel Al Ridhawi, Moayad Aloqaily, and Azzedine Boukerche. 2019. Comparing fog solutions for energy efficiency in wireless networks: Challenges and opportunities. IEEE Wireless Communications 26, 6 (2019), 80–86.
[10]
Fadi Al-Turjman. 2017. Cognitive caching for the future sensors in fog networking. Pervasive and Mobile Computing 42 (2017), 317–334.
[11]
Bahast Ali and Xiaochun Cheng. 2019. Security solution based on raspberry PI and IoT. In Cyberspace Safety and Security, Jaideep Vaidya, Xiao Zhang, and Jin Li (Eds.). Springer International Publishing, Cham, 162–171.
[12]
M. Z. Alom and T. M. Taha. 2017. Network intrusion detection for cyber security using unsupervised deep learning approaches. In 2017 IEEE National Aerospace and Electronics Conference (NAECON). 63–69.
[13]
A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng. 2017. Fog computing for the Internet of Things: Security and privacy issues. IEEE Internet Computing (Mar. 1), 21 (2017), 2.
[14]
Venkatraman Balasubramanian, Safa Otoum, Moayad Aloqaily, Ismaeel Al Ridhawi, and Yaser Jararweh. 2020. Low-latency vehicular edge: A vehicular infrastructure model for 5G. Simulation Modelling Practice and Theory 98 (2020), 101968.
[15]
Venkatraman Balasubramanian, Faisal Zaman, Moayad Aloqaily, Ismaeel Al Ridhawi, Yaser Jararweh, and Haythem Bany Salameh. 2019. A mobility management architecture for seamless delivery of 5G-IoT services. In I IEEE International Conference on Communications (ICC 2019). IEEE, 1–7.
[16]
Venkatraman Balasubramanian, Faisal Zaman, Moayad Aloqaily, Saed Alrabaee, Maria Gorlatova, and Martin Reisslein. 2019. Reinforcing the edge: Autonomous energy management for mobile device clouds. In IEEE Conference on Computer Communications Workshops (INFOCOM 2019 WKSHPS). IEEE, 44–49.
[17]
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita. 2014. Network anomaly detection: methods, systems and tools. IEEE Communications Surveys Tutorials 16, 1 (2014), 303–336.
[18]
Hafida Bouziane, Belhadri Messabih, and Abdallah Chouarfia. 2011. Profiles and majority voting-based ensemble method for protein secondary structure prediction. Evolutionary Bioinformatics Online 7 (10 2011), 171-189.
[19]
Ahmed M. Elmisery, Seungmin Rho, and Dmitri Botvich. 2016. A fog based middleware for automated compliance with OECD privacy principles in Internet of Healthcare Things. IEEE Access 4 (2016), 8418–8441.
[20]
Q. Fan and N. Ansari. 2018. Towards workload balancing in fog computing empowered IoT. IEEE Transactions on Network Science and Engineering (2018), 1–1.
[21]
Dewan Md. Farid, Nouria Harbi, and Mohammad Zahidur Rahman. 2010. Combining naive Bayes and decision tree for adaptive intrusion detection. CoRR abs/1005.4496 (2010). arxiv:1005.4496http://arxiv.org/abs/1005.4496.
[22]
Canadian Institute for Cybersecurity. 2018. NSL-KDD dataset. http://www.unb.ca/cic/datasets/nsl.html.
[23]
L. Galluccio, S. Milardo, G. Morabito, and S. Palazzo. 2015. Sdn wise: Design. 2015 Prototyping and experimentation of a stateful SDN solution for wireless sensor networks. In 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 513–521.
[24]
T. Govindarajan. 2016. Evaluation of ensemble classifiers for intrusion detection. International Journal of Computer and Information Engineering 10, 6 (2016), 1045–1053.
[25]
Harriet Green. 2015. The Internet of Things in the cognitive era: Realizing the future and full potential of connected devices. ed: IBM Watson IoT (2015).
[26]
Andreas Heil, Mirko Knoll, and Torben Weis. 2007. The Internet of Things - Context-based device federations. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07). IEEE, 58–58.
[27]
Martin Henze, René Hummen, Roman Matzutt, and Klaus Wehrle. 2014. A trust point-based security architecture for sensor data in the cloud. In Trusted Cloud Computing (2014), 77–106.
[28]
Kirak Hong, David Lillethun, Umakishore Ramachandran, Beate Ottenwälder, and Boris Koldehofe. 2013. Mobile fog: A programming model for large-scale applications on the Internet of Things. In 2nd ACM SIGCOMM Workshop on Mobile Cloud Computing (MCC’13). ACM, New York, 15–20.
[29]
Kai Hwang, Sameer Kulkareni, and Yue Hu.2009. Cloud security with virtualized defense and reputation-based trust mangement. In 2009 8th IEEE International Conference on DependableAutonomic and Secure Computing, IEEE, 717–722.
[30]
Fatemeh Jalali, Olivia J. Smith, Timothy Lynar, and Frank Suits. 2017. Cognitive IoT gateways: Automatic task sharing and switching between cloud and edge/fog computing. In SIGCOMM Posters and Demos. ACM, 121–123.
[31]
M. F. Jiang, S. S. Tseng, and C. M. Su. 2001. Two-phase clustering process for outliers detection. Pattern Recognition Letters 22/6-7 (2001), 691–700.
[32]
A. Kapsalis, P. Kasnesis, I. S. Venieris, D. I. Kaklamani, and C. Z. Patrikakis. 2017. A cooperative fog approach for effective workload balancing. IEEE Cloud Computing 4, 2 (March 2017), 36–45.
[33]
Daoying Ma and Aidong Zhang. 2004. An adaptive density-based clustering algorithm for spatial database with noise. In IEEE International Conference on Data Mining (ICDM’04) (2004).
[34]
Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, and Mohamed Sellami. 2018. Cognitive computing meets the Internet of Things. In 13th International Conference on Software Technologies. SciTePress.
[35]
Wided Mathlouthi and Narjes Bellamine Ben Saoud. 2017. Flexible composition of System of Systems on cloud federation. In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 358–365.
[36]
N. Moustafa, B. Turnbull, and K. R. Choo. 2019. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet of Things Journal (2019), 1–1.
[37]
S. Otoum, B. Kantarci, and H. T. Mouftah. 2017. Mitigating false negative intruder decisions in WSN-based smart grid monitoring. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 153–158.
[38]
S. Otoum, B. Kantarci, and H. T. Mouftah. 2019. On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters 1, 2 (June 2019), 68–71.
[39]
Safa Otoum, Burak Kantraci, and Hussein T. Mouftah. 2017. Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. IEEE International Conference on Communications (ICC’17) (2017).
[40]
Beate Ottenwälder, Boris Koldehofe, Kurt Rothermel, and Umakishore Ramachandran. 2013. MigCEP: Operator migration for mobility driven distributed complex event processing. In 7th ACM International Conference on Distributed Event-based Systems (DEBS’13). ACM, New York, 183–194.
[41]
A.K. Pujari. 2001. Data Mining Techniques. Universities Press. https://books.google.ca/books?id=dH2KQhJboSYC.
[42]
Amir-Mohammad Rahmani, Nanda Kumar Thanigaivelan, Tuan Nguyen Gia, Jose Granados, Behailu Negash, Pasi Liljeberg, and Hannu Tenhunen. 2015. Smart e-health gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 826–834.
[43]
Anam Sajid and Haider Abbas. 2016. Data privacy in cloud-assisted healthcare systems: State of the art and future challenges. J. Medical Systems 40, 6 (2016), 155:1–155:16.
[44]
Amit Sheth. 2016. Internet of Things to Smart IoT through semantic, cognitive, and perceptual computing. IEEE Intelligent Systems 31, 2 (2016), 108–112.
[45]
Fan Shi, Zhenlei Chen, and Xiaochun Cheng. 2019. Behavior modeling and individual recognition of sonar transmitter for secure communication in UASNs. IEEE Access (2019).
[46]
S. Soheily-Khah, P. Marteau, and N. Béchet. 2018. Intrusion detection in network systems through hybrid supervised and unsupervised machine learning process: a case study on the ISCX dataset. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). 219–226.
[47]
Seyed Ahmad Soleymani, Abdul Hanan Abdullah, Mahdi Zareei, Mohammad Hossein Anisi, Cesar Vargas-Rosales, Muhammad Khurram Khan, and Shidrokh Goudarzi. 2017. A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5 (2017), 15619–15629.
[48]
Bunheang Tay, Jung Keun Hyun, and Sejong Oh. 2014. A machine learning approach for specification of spinal cord injuries using fractional anisotropy values obtained from diffusion tensor images. Computational and Mathematical Methods in Medicine 2014 (01 2014), 276589.
[49]
Tian Wang, Guangxue Zhang, M. D. Zakirul Alam Bhuiyan, Anfeng Liu, Weijia Jia, and Mande Xie. 2018. A Novel Trust Mechanism Based on Fog Computing in Sensor-Cloud System. Future Generation Computer Systems.
[50]
T. Wang, G. Zhang, A. Liu, M. Z. A. Bhuiyan, and Q. Jin. 2018. A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing.IEEE Internet of Things Journal.
[51]
Qihui Wu, Guoru Ding, Yuhua Xu, Shuo Feng, Zhiyong Du, Jinlong Wang, and Keping Long. 2014. Cognitive Internet of Things: A new paradigm beyond connection. IEEE Internet of Things Journal 1, 2 (2014), 129–143.
[52]
A. Yousefpour, G. Ishigaki, R. Gour, and J. P. Jue. 2018. On reducing IoT service delay via fog offloading. IEEE Internet of Things Journal 5, 2 (April 2018), 998–1010.

Cited By

View all
  • (2024)dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone2024 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)10.1109/IPSN61024.2024.00021(200-212)Online publication date: 13-May-2024
  • (2024)Security and Privacy Protection Technology of AIoT Intelligent Transportation Teaching System with 5G Technology2024 3rd International Conference on Big Data, Information and Computer Network (BDICN)10.1109/BDICN62775.2024.00038(155-158)Online publication date: 12-Jan-2024
  • (2024)Role of cognitive computing in enhancing innovative healthcare solutionsAdvances in Biomarker Sciences and Technology10.1016/j.abst.2024.08.0026(152-165)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 21, Issue 3
August 2021
522 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3468071
  • Editor:
  • Ling Liu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 June 2021
Accepted: 01 February 2021
Online AM: 07 May 2020
Revised: 01 February 2020
Received: 01 December 2019
Published in TOIT Volume 21, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Fog computing
  2. cognitive fog
  3. fog security
  4. medical data security

Qualifiers

  • Research-article
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)5
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone2024 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)10.1109/IPSN61024.2024.00021(200-212)Online publication date: 13-May-2024
  • (2024)Security and Privacy Protection Technology of AIoT Intelligent Transportation Teaching System with 5G Technology2024 3rd International Conference on Big Data, Information and Computer Network (BDICN)10.1109/BDICN62775.2024.00038(155-158)Online publication date: 12-Jan-2024
  • (2024)Role of cognitive computing in enhancing innovative healthcare solutionsAdvances in Biomarker Sciences and Technology10.1016/j.abst.2024.08.0026(152-165)Online publication date: 2024
  • (2024)RETRACTED ARTICLE: Designing a cognitive smart healthcare framework for seizure prediction using multimodal convolutional neural networkCognitive Neurodynamics10.1007/s11571-023-10049-xOnline publication date: 2-Jan-2024
  • (2023)Cloud Computing to Fog Computing: A Paradigm ShiftEdge Computing - Technology, Management and Integration10.5772/intechopen.110751Online publication date: 2-Aug-2023
  • (2023)Artificial Intelligence for Cognitive Health Assessment: State-of-the-Art, Open Challenges and Future DirectionsCognitive Computation10.1007/s12559-023-10153-415:6(1767-1812)Online publication date: 24-Jun-2023
  • (2023)Security analysis of fog computing environment for ensuring the security and privacy of informationTransactions on Emerging Telecommunications Technologies10.1002/ett.486134:10Online publication date: 12-Oct-2023
  • (2022)Indoor localization using software defined radio: A non-invasive approach2022 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC)10.23919/AT-AP-RASC54737.2022.9814250(1-4)Online publication date: 29-May-2022
  • (2022)Electronic Controller Automatic Test System Based on Intelligent Control AlgorithmJournal of Electrical and Computer Engineering10.1155/2022/60946122022Online publication date: 1-Jan-2022
  • (2022)Automatic Intelligent Control System Based on Intelligent Control AlgorithmJournal of Electrical and Computer Engineering10.1155/2022/35942562022Online publication date: 1-Jan-2022
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media