Wireless Communications and Mobile Computing

Wireless Communications and Mobile Computing / 2021 / Article
Special Issue

Data Collection in Resource-Limited Networks (WSNs, IoT, Sensor Cloud)

View this Special Issue

Review Article | Open Access

Volume 2021 |Article ID 5599907 | https://doi.org/10.1155/2021/5599907

QingQingChang, Iftikhar Ahmad, Xiaoqun Liao, Shah Nazir, "Evaluation and Quality Assurance of Fog Computing-Based IoT for Health Monitoring System", Wireless Communications and Mobile Computing, vol. 2021, Article ID 5599907, 12 pages, 2021. https://doi.org/10.1155/2021/5599907

Evaluation and Quality Assurance of Fog Computing-Based IoT for Health Monitoring System

Academic Editor: Ihsan Ali
Received25 Jan 2021
Revised25 Mar 2021
Accepted13 Apr 2021
Published23 Apr 2021

Abstract

Computation and data sensitivity are the metrics of the current Internet of Things (IoT). In cloud data centers, current analytics are often hosted and reported on suffering from high congestion, limited bandwidth, and security mechanisms. Various platforms are developed in the area of fog computing and thus implemented and assessed to run analytics on multiple devices, including IoT devices, in a distributed way. Fog computing advances the paradigm of cloud computing on the network edge, introducing a number of options and facilities. Fog computing enhances the processing, verdicts, and interventions to occur through IoT devices and spreads only the necessary details. The ideas of fog computing based on IoT in healthcare frameworks are exploited by shaping the disseminated delegate layer of insight between sensor hubs and the cloud. The cloud proposed a system adapted to overcome various challenges in omnipresent medical services frameworks, such as portability, energy efficiency, adaptability, and unwavering quality issues, by accepting the right to take care of certain weights of the sensor network and a distant medical service group. An overview of e-health monitoring system in the context of testing and quality assurance of fog computing is presented in this paper. Relevant papers were analyzed in a comprehensive way for the identification of relevant information. The study has compiled contributions of the existing methodologies, methods, and approaches in fog computing e-healthcare.

1. Introduction

Fog computing is an infrastructure located somewhere between the data source and the cloud in which information computing, storage, and applications are located to process the data and information. Fog computing, like edge computing, takes the cloud’s benefits and power closer to where information is produced and operated. The words fog computing and edge computing are interchangeably used by many individuals as both require taking knowledge and computation adjacent to where the information is formed. It is mostly done to enhance reliability, but it may also be done for reasons of protection and adherence. The distributed approach to fog computing addresses IoT needs, and perhaps even the enormous volume of information produced by smart sensors and IoT devices, that would also be time-consuming and expensive to submit for analysis and processing to the cloud. Fog computing decreases the required bandwidth and decreases the connectivity between receptors and also the cloud that can have a detrimental impact on IoT results. Fog computing offers the server counterpart to the IoT to manage the information gathered on a daily basis. By exporting gigabytes of Internet traffic from the core network, it eliminates the need for expensive bandwidth additions [1, 2]. Many designed structures have been developed by researchers depending on the best and mechanized cycle with the hope that current patient consideration techniques can be strengthened and fresh limits have been generated considering the gigantic data upset that ensures the framework is clever. Therefore, a simple technique and a novel smart flow model for savvy mending emphasis are the systematic mechanism of need assessment for the brilliant work cycle of the mending group, considering a few evocative methods used to get-together requirements. Moreover, this research measure offers a better solution than knowing the boggling mending emphasis coordination system consideration and flattens out requesting office work measure of the specialist. Recreation performance shows that the average Quick Flow Model will work better than the current work steps [3].

Modern healthcare approaches are challenging errands to gain more researcher insights. The application of Healthcare 4.0 technique will contribute to the penetration of medical care information where programmers can obtain complete admission to the email records, texts, and reports of patients. In reality, an assured modern healthcare strategy will provide all stakeholders with completion, counting patients, and parental figures. In addition, the research provides a broad written audit, investigating best in class guidelines for preserving security and safety in modern healthcare. It has also explored the blockchain-based response to two specialists and expert networks for offering experiences. Finally, in modern healthcare, current issues and potential protection and security exploration bearings are added [4].

The contribution of the proposed study is to present an overview of e-health monitoring system in the context of testing and quality assurance of fog computing. Several relevant papers associated with the proposed study were analyzed in a comprehensive way. The study has compiled the contributions of the existing methodologies, methods, and approaches in fog computing in e-healthcare.

The organization of the paper is as follows: Section 2 presents the literature study of the proposed research. Section 3 shows the approaches for evaluation and quality assurance of fog computing-based IoT for health monitoring. Section 4 represents statistics of the research done in the area. The paper concludes in Section 5.

2. Literature Study

Research in the area of healthcare and IoT has gained more attention for devising new algorithms, approaches, techniques, and mechanisms for solving different problems. The integrity of IoT in medical care medicine is discussed by incorporating a comprehensive literature due to the lack of and less convincing medical care administrations to meet the rising demands of a growing population with persistent diseases. It is recommended that this involves a move from facility-driven care to quiet-driven medical services where each specialist is regularly aligned with each other, for example, medical unit, patients, and administration. This IoT e-health biological patient-driven model includes a multilayer infrastructure facility. Various case instances of administration and applications that are updated on certain layers adopt this mist-driven IoT engineering. These models range from portable well-being, assisted living, e-medication, inserts, and structures for early admonition to population management in savvy urban communities. At that point, it has finally got IoT e-healthcare challenges, such as executive data, adaptability, guidance, interoperability, gadget network-human interfaces, security, and safety [5]. Hartmann et al. [6] presented a report describing the existing and evolving edge processing systems and processes for medical care applications, to differentiate system preconditions and difficulties for various use cases. The application for connected devices focuses particularly on the grouping of well-being information, including critical sign monitoring and fall recognition. Other low-dormancy applications conduct explicit side effect scans for illnesses, such as walking irregularities in patients with Parkinson’s infection. In addition, it presents a detailed audit of eager figuring information tasks that include transition, encryption, validation, characterization, decrease, and forecasting. Indeed, edge figuring has some related problems, even with these focal points, including prerequisites for refined protection and data reduction techniques to allow their cloud-based partners to perform equivalently, but with smaller capacity. It has been acknowledged that potential analysis headings in edge figures for medical facilities give consumers a wider spread of life whenever they tend to achieve. All information is collected in the concept of the information lake, regardless of its length, its abundance, and its pace. It may be a test to put away all this data regardless of whether the invention provides a few arrangements, for example, on reason, on the cloud or half-breed clouds, as well as the foundation and atmosphere. The Internet of Things has modified the concept of securing information in the atmosphere of the information lake, and the volume cutoff points could be reached earlier rather than later for certain information lakes. As of late, a novel concept, called mist registering, has been introduced. The exchange of information intake steps between the sensor that provides knowledge and the information lake that burns through information is a fundamental feature of haze figuring. Initially, this section discusses the principle of mist registration and the associated difficulties and then explores the alternative options to be considered when managing a knowledge lake [7].

Jaimes et al. [8] presented a study in which a crowd detecting measure is illustrated and evaluated that involves effective collaboration in brilliant contexts between crowd sensing participants, using a simple mist that registers the empowered Internet of Things. A haze figuring IoT model involves a layer of figuring hubs that reside closer to the detecting gadgets, with this layer of mist hubs lying in the organization and the cloud in the center of portable and detecting gadgets. This encourages us to propose a model in brilliant circumstances for crowd sensing that involves both competition and cooperation between members of the edge organization who are close to crowd sensing. To test the show of the specific proposal, recreations are added. The work demonstrates desirable attributes regarding the number of dynamic participants, the number of tests obtained, and inclusion within a given investment plan, considering the limited involvement of crowd detecting members on the edge layer that can serve various atmosphere applications. One of the new research areas is investigating the critical hypothesis, challenging framework, and innovation of continuous inquiry over streaming data for cloud processing. This review describes the related innovation of the investigation depending on random hash, finding out how to hash and summarize, investigating the problems and difficulties of the ongoing question in the climate of asset-restricted mist processing, ultimately analyzing in detail the vital methodology and techniques for the issue, even decreasing the estimation, encoding techniques depending on figuring out how the development of systematic reviews strategy for inquiry over web-based Internet of Thing details, and the related research question structure study bearings and others. In addition, a Hybrid Dynamic Quantization approach for finding out how to hash has been proposed; studies show that other quantization methods are beaten by DAQ [9].

Kelati et al. [10] have discussed recent advances in metered energy usage knowledge in locally formed administrations. It also studies and analyzes interference, reliable existing, and effective force strategies that demonstrate stable load. This study readily retrieves either nonmeddle or judgmental approaches. This study demonstrates that engineering utilizes advances in the strategy of the savvy instrument and haze registering worldview for planning crude oil data. The framework is experiencing a change in perception to increase the need for everyday comfort of metropolitan networks and to provide healthcare administrations that are practical and competent. Patients with intellectual disabilities can be tested and illustrated by analyzing the power usage of home devices. After this, the article describes the execution stage based on replication to create unique models of family devices and check the AI measurement for the identification operation. Kumari et al. [11] presented an approach which addressed basic nature and difficulty of investigating mist data. The FDA’s point-by-point scientific categorization is concerned with the cycle model. We need efficient and persuasive arrangements to handle such big data, such as information mining, analysis, and reduction to be distributed on a cloud at the edge of haze gadgets. For the most part, the current creative work attempts focused around conducting big data investigations lack the challenge of supporting mist knowledge analysis. The proposed model tackles numerous exploration challenges, such as availability, adaptability, and interaction with mint nodes, nodal coordination, variability, efficiency, and the essence of administration needs. We present two contextual studies to view the proposed cycle model. Li et al. [12] offered the production processes for edge fog IoT phase beginning to be completed. These models are applied to a solid situation: the analysis of information streams provided by inserted cameras. The administrations rely on cloud capacity and computing resource systems, transforming their engineering into more dispersed one-dependent eager offices provided by Internet service providers. It is indistinct between the IoT equipment association and cloud system, which is the largest portion in terms of energy utilization. The approval consolidates predictions on a growing array of IoT gadgets on real proving grounds running application-focused and recreations with prominent test systems to discuss the scaling up. The outcomes for this case are indeed the portion of the cloud infrastructure that inserts the processing assets devouring multiple times more than the IoT part containing the IoT equipment and the remote passageway.

Liu et al. [13] presented a framework for half, and half protection saving clinical option emotionally supporting network in haze cloud services, called HPCS, is proposed in this paper. A fog worker uses a lightweight information mining technique in HPCS to gradually screen patients’ disease safely. In an authentication manner, the recently found abnormal appearances can be further shipped away from the cloud worker for rising projection. In particular, the goal is to prepare another secure reassessed internal item convention for mist workers to achieve a healthy lightweight single-layer neural organization. In addition, the security safeguarding convention of piecewise polynomial estimation allows cloud workers to safely execute any initiation capabilities in different neural organization layers. Besides that, another framework called security safeguarding division estimate convention is planned to take care of the estimation flood issue. At that phase, we show that by changing the constant and exacting quality of recreations, the HPCS meets the goal of patient possibly the best status checking without preventive splashback with unpermitted parties. To deliver the level of comfort, capability, and digitalization for consumers, the current and impending IoT administrations are exceptionally promising. It takes high security, assurance, validation, and recovery from attacks to get the option to complete such an environment in a constantly creating manner. A stable IoT structure is important at present, joining the crucial reforms in IoT structures designed to achieve start to finish. A detailed analysis is combined in this exploration of security-related problems and threat wellsprings in IoT properties or applications. Precisely, when taking a gender at privacy concerns, recent progress in maintaining a serious level of confidence in IoT applications appears to be made. Four basic changes are assessed to extend the degree of IoT security, including cryptography, fog figuring, edge processing, and machine learning [14].

3. Approaches for Evaluation and Quality Assurance of Fog Computing-Based IoT for Health Monitoring

Numerous platforms, approaches, and techniques are established in the field of fog computing and thus implemented and evaluated to run analytics on multiple devices, such as IoT devices, in a distributed way. Fog computing improves the paradigm of cloud computing on the network edge, introducing a number of options and facilities. Manocha et al. [15] presented a novel scientific fog supported to upgrade an individual’s living accomplishments by a deep learning-empowered real position-based inconsistency recognition structure. An effort was made to record predicted movement scores on the cloud to extend the efficacy of the proposed augmented reality treatment by pursuing the ceaseless time arrangement plan to include potential well-being references to an approved clinical expert. In addition, a shrewd risk profile age structure is proposed to gradually insinuate clinical subject matter experts and managers regarding an individual’s actual real status. The age of the alert is straight forwardly relative to the anticipated actual abnormality and the size of well-being seriousness. The determined results legitimize the prevalence of the proposed examination checking arrangement over the traditional cloud-based observing arrangements by accomplishing high movement expectation, precision, and less dormancy rate in dynamics. Mutlag et al. [16] offered a study with the purpose to implement a deliberately writing audit of cloud processing developments in the field of IoT frameworks for medical services and review the history. The implications of the scientific categorization have been isolated into three main classes; systems and models, frameworks, audit, and summary. For demanding applications, ongoing low inertness, and high reaction time, particularly in medical services applications, fog figuring is considered necessary. Separate activities with glare registration were established. Compared to distributed computing, cloud processing decreased inertness without doubt. Specialists show that extensions of reproduction and research ensure that a detailed image passivity are provided.

Fog figuring is still starting and needs strong preparation to obtain a successful, productive, and effectively deployable replacement for the now prevalent cloud as essentially achievable cost [17]. In this article, a new asset-productive framework is presented for a multidistrict haze processing worldview for disseminated video synopsis. The portals of the sensor field depend on the Raspberry Equity gadget. Validation tapes are distributed over different hubs, and a breakdown is provided over the structure of cloud, which is periodically pushed to the cloud to decrease the consumption of data transfer resources. To test the proposed system, a number of realistic remaining tasks are used as observation recordings. Trial results indicate that the proposed device has virtually nothing overhead with great adaptability over off-the-rack costly database arrangements, even by using an exceedingly restricted asset, a single board, accepting its adequacy for brilliant urban areas assisted by IoT [17]. Olakanmi and Odeyemi [18] represented a security conspiracy that provides executives with viable data, and safe admission to patient data in an e-health setting is supported. In addition, the methodology underpins the useful conveyance of medical services among carers through compelling automation for data sharing. It will help clinical emphasis on carers to function more effectively and for patients to receive better treatment. Receiving wearable clinical gadgets and distributed computing offers an immense amount of data for quick and momentary access. Nevertheless, it provides some details on the bottlenecks, security, and safety challenges of managers. Using the symmetric key and modified cipher text-strategy trait-based encryption, a two-layer security approach is obtained to provide fine-grained admission control, time-sensitive repudiation of land, and agreeable assignment of well-being management among caregivers.

3.1. E-Health Approaches in Pandemic

Otoom et al. [19] presented a study suggesting an ongoing system for COVID-19 discovery and checking. The proposed structure uses the IoT system to collect client constant manifestation information, to identify suspected cases of Covid19 early, to screen the care reaction of people who have just recovered from the infection, and to gather and analyze significant information to understand the concept of the infection. The platform consists of five main segments: Collection and Uploading of Symptom Data, Isolation Focus, Data Analysis Center (AI), Health Advisors, and Network Equipment. This study proposes eight Artificial Intelligence calculations, specifically Support Vector Machine, Naive, Reverse Nearest Neighbor, Linear Regression, State Diagram, and Proposed General. In contrast to the part of the relevant side effects, the analysis was aimed at testing these eight calculations on a real COVID embodiment dataset. The results indicate that five of these eight analyses achieved an efficiency of more than 90 percent. Parasuraman and Sangaiah [20] presented a study that explores the systematic needs of vast spaces and devoured massive amounts of power to needless electronic measures. The coordinated structure was to form dispersed structures with higher efficiency at the end of the ongoing years. The normal registration process turns out to be more expensive and inviolate to oversee in the current years as information requests and online customers are rapidly extended. Conventional processing is unacceptable for getting to the data wherever and whenever. Cloud calculation is a web-based figure with comprehensive running effects and unsurprising features across companies, partnerships, data innovation, architecture, programming, and data stockpiling, providing easy and updated planning tools and on-demand preparation of resources. In fact, vendors may assume that their customer information placed on their base is safe and, in addition, very much guaranteed, so the strongest security efforts need to be divided to deal with the difficulties of putting away data at an outsider data center.

In the light of compact IoT and cloud side administration, the authors created two overlay arrangement in this paper. ITaaS contains arrangements for (a) the IoT side to regularly support information assortment from IoT gadgets to a passage and (b) the cloud back-end side to help exchange stockpile and prepare information. ITaaS provides the vanguard of innovation to allow fast application arrangements in the space of interest. E-health and distant tracking are conspicuous and promising applications of this breakthrough. A distant patient observation framework as a proof of idea and the coordination of the proposed scheme uses a beat oximeter and devices for detecting pulse observation. Similarly, the spine system with high client concurrence and high information streams was stressed, and we show that the solicitations are performed at around 1 second, a number that means a good presentation by considering the number of solicitations, the organization inactivity, and the general (two GB RAM) [21].

3.2. Geo-Based Dissemination

The concept of fog registering in healthcare frameworks is exploited by shaping a geo-disseminated delegate layer of insight between sensor hubs and the cloud. The cloud proposed system will adapt to various challenges in omnipresent medical services frameworks, such as portability, energy efficiency, adaptability, and unwavering quality issues, by accepting the right to take care of certain weights of the sensor network and a distant medical service group. Particularly in clinical conditions, a prosperous use of weight associated gateways will empower enormous arrangements of pervasive observing frameworks. A model is presented for a smart e-health gateway known as UT-GATE, where a portion of the higher level highlights reviewed has been modified. In addition, an Internet of Things early warning score check was conducted to essentially demonstrate the efficacy and validity of our system for clinical contextual studies. The proof of concept configuration demonstrates an Internet of Things observing system with improved and broad knowledge of the platform, energy ability, accessibility, operation, connectivity, stability, and durability [22]. The study advocates the critical role of modern guidelines and edge authentication components for the diffusion of the largely expanded consumer experience in conjunction with presented collection management and surveys the modern insights that can gain from both the IoT and edge processing situation, discussing in depth about each of the taxonomic segments at that stage. Second, it presents two use cases executed for all intents and purposes that have as of late used the edge-IoT worldview together to fix metropolitan savvy living problems and, third, for e-medical services such as the proposed novel fog-based engineering and developed demo proving ground. The test results showed promising results in limiting emphasis on IoT cloud research or doorway. It concludes with discussions on various boundaries, such as engineering, prerequisite capacity, helpful problems, and determination rules, associated with the endurance of layer joining [23].

Rehman et al. [24] have completed genome datasets of different organisms readily available, and a lot more are being sequenced. In understanding the functioning of normal living beings, these genomic mechanisms are of utmost importance and have many applications in our everyday lives. It is a daunting job to control this gigantic measure of knowledge with conventional methods. Analysis of such data may take hours or days to produce results which have caused ideal models of current distributed computing to face various difficulties. Among the indicated qualities, fog processing is commonly used by specialists around the world for flexible asset distribution. Cloud registration uses the cloud at the back end, thus expanding the spectrum of cloud to things by taking resources close to the edge of gadgets, thus defeating various impediments to the worldview of distributed computing. In view of the interesting properties of haze, such as low jitter, low idleness, enhanced protection, and so on, it is argued that the philosophy of fog extraction has extraordinary potential for high embedded platforms for data and information. Sanchez-Gallegos et al. [25] presented a study on the plan creation, as well as implementation of an engineering model to build on request edge-mist cloud handling frameworks to deal consistently with enormous data and simultaneously execute NFR filling administration. Effective and calculated squares, revised as microservices and nanoservices, are recursively interconnected in this model to construct edge-haze cloud planning systems as a rationalist administrative framework. Coherence plans generate information through the cloud and edge structure squares and enable a model developed using this model to demonstrate the accomplishment of this model, which was tested in a situation study based on the handling of data to endorse a simple dynamic methodology in distant patient observation. This research examines situations in which end-clients and clinical staff received bits of information when planning electrocardiograms provided by sensors in remote IoT devices, much as doctors were accommodated and admonished when examining and identifying anomalies in the broken down ECG content on the web. It was also considered a situation in which associations deal with different concurrent edge-mist cloud systems for the preparation of information and material transmitted to inside and outer workers.

3.3. Real-Time Mobility and Robust Streaming

García-Valls et al. [26] presented the plan and approval of a system that improves the administration season of the fog workers’ chosen exercises; undoubtedly, most of those exercises are described by distant patients. It crosses the limits of current processors to parallelize explicit exercises that can be a sudden spike in demand for saved centers; what is more, it depends on the nature of administration, certification of information circulation stages to improve correspondence, and reaction times to versatile patients. A significant test of e-health administrations on the cloud, instead of various administrations running on shrewd large cities, is that they typically conduct various computational exercises conducting broad data handling on realistic information that should be protected. The overhaul of distant patient hubs can be enhanced by using the limits of current processors. The proposed approach is approved for a model execution of recreated computationally serious e-health collaborations, diminishing the reaction time by 4x when center reservation is enacted. In comparison to cloud space, the latest ideal models of edge and cloud figuring offer innovative arrangements by bringing assets closer to the customer and offering low idleness and energy efficient responses for knowledge planning. In any event, there are various limitations and spotlights on the latest mist models from restriction. It is suggested in this study that a new structure called health fog to integrate deep learning in edge registering gadgets and conveyed it for the genuine use of the fog-enabled cloud system programmed heart-disease inspection. Fog bus is used to convey and evaluate the presentation of the proposed monitoring. In various cloud calculation situations and for different customer needs, health fog is configurable for different operation modes that offer the best quality of service or forecast accuracy, as necessary [27]. To minimize the spread of the infection and protect the health of patients who need to stay in an emergency clinic, home hospitalization is a standout among other alternative arrangements. This paper proposes a system for home hospitalization based on IoT, fog, and cloud processing; these are among the key developments that have led in a big way to improving the field of medical services. These systems enable patients in their homes and among their families to recover and obtain care, where awareness and the ecological condition of the hospital stay room are observed, to encourage specialists to follow the hospital stay cycle and to make recommendations, through control units and flexible applications created for this purpose, for patients and their supervisors. The after effects of the test have shown a remarkable appreciation of this framework by patients and specialists alike [28].

The use of IoT gadgets for ML deduction saves the cloud disadvantage of high dormancy in the enterprise, unsuitable for delay-touch apps such as fall locators. The present fall recognition structures, however, require induction on the mist, and there is no evidence of it under real circumstances, nor documentation regarding the dynamic challenge of the structure. To collect tolerant observing data, a handheld trihub accelerometer is used. This study suggests a genius Open IoT engineering in the cloud to assist the far-off sending and the DL model board. Two DL models have been submitted to advance assets, and their exhibition and derivation time using virtualization are analyzed. The results show the adequacy of our fall system, which offers a more convenient and accurate solution than traditional fall finder frameworks, greater competence, 98.75 percent accuracy, lower deferral, and improvement in administration [29]. Farahani et al. [5] proposed a comprehensive AI-driven IoT e-health engineering focused on the concept of a collective machine learning method in which insight is transmitted through devices Despite the energizing advances in the shift from center-driven to understanding-driven medical care, the device enables medical service professionals to continuously screen the associated data of subjects anywhere anytime and has constant noteworthy interactions that ultimately strengthen the dynamic force. Using a comprehensive ECG-based arrhythmia position contextual analysis, the plausibility of such engineering is tested. From plan recommendations, for example, relating to overheads, energy usage, inertia, and implementation, to designing and conveying advanced AI strategies to such engineering, this illustrative model explores and discusses immeasurably important parts of the proposed engineering. Yacchirema et al. [30] introduced an innovative system based on distributed and cloud computing technologies that provides new opportunities to assemble novel and inventive administrations to support the rest of apnea and to resolve the current constraints in combination with IoT and large knowledge levels. In particular, the structure is focused on a few remote low-power organizations with brilliant heterogeneous gadgets. An edge center offers IoT association and interoperability in cloud computing and prehandling IoT information to continuously recognize occasions that can jeopardize the elderly and function similarly. In the cloud, for additional handling and investigation, a generic motivating agent background broker supervises, stores, and infuses information into the massive information analyzer. The presentation and emotional appropriateness of the system were evaluated separately using more than thirty GB size datasets and a poll satisfied by medical professionals educated. Results show that the system knowledge study enhances the dynamics of the experts to screen and direct rest apnea care, as well as improving the personal satisfaction of older people.

4. Statistics of the Research in the Area

It is difficult to guarantee the security of sensitive information in an acceptable stored information in view of the fact that after the information is delivered to the data-driven entity in the type of piece, it is no longer limited by the information distributor. In addition, terminal clinical sensors are typically asset-driven in certain real-time health applications, limiting the immediate receipt of expensive cryptographic natives. To overcome these challenges, an asset-skilled secure information sharing strategy is proposed in the data-driven e-health system, the one which uses encryption based on the related literature trait and adapts it to the previously stated system regarding essential security needs. It likewise misuses the calculation assets of fog hubs and utilizes rethinking cryptography to boost framework productivity. The evaluation shows that the strategy can fundamentally reduce the overhead estimate of resource-restricted terminal clinical gadgets and can more effectively support ongoing e-health applications [31]. Aladwani [32] proposed to use fog registering between sensors and distributed computing to competently collect measurement information, reduce the measurement of information transferred between the cloud and the sensors, and increase the efficacy of the whole system. Remote sensor organizations that use health care observation in the territory send a large amount of companies of varying degrees of importance and length to fog registration all time. Eventually, estimation of the ability to reliably provide task needs and render the primary factor in the need for tasks is their importance, paying no attention to their duration. This study is aimed at enhancing the execution of static business booking calculations by using another technique called classification of tasks and categorization of virtual machines based on the significance of enterprises. IoT-characterized enterprises rely on their importance in three classes: high-significance errands, medium-significance enterprises, and low-significance errands that depend on the status of the patient. They will be added to the MAX-MIN booking equation to measure the exhibition achieved by these techniques.

Karatas and Korpeoglu [33] proposed that a topographically circulated multiple leveled cloud in this paper, fog registration-based IoT architecture, and proposed procedures for setting IoT information in the sections of the proposed engineering. Information is considered in various kinds, and different applications can involve each kind of information. The model of the problem of information situation is a problem of improvement and proposes calculations for the effective, viable situation of information generated and devoured by IoT hubs that are topographically relevant. Data used for different applications is packed away in an environment that is essentially accessed by applications using that type of information for only a single period. To test the plan, comprehensive recreation trial is conducted and the results show that the design and situation techniques can productively position and store information while providing great execution to applications and organization’s as far as access inertness and data transfer capability are devoted. The current gadgets that are used today are also becoming all more impressive in terms of highlights and skills, but they are still not equipped to perform shrewd, self-governing, and savvy orders, such as those often needed for shrewd medical services, concerning helped living, virtual reality, and increased reality; we need another substance to perform undertakings for emerging IoT and distributed computing applications; assignment offloading is desirable. Between IoT hubs, sensors and edge gadgets can happen. Offloading can be done based on different components that involve an application’s computational needs, load change, board energy, executive inertness, etc. This review presents a scientific categorization of late discharge plans that have been suggested, such as cloud, distributed computing, and IoT, for space. It also discusses the middleware developments that enable offloading in a cloud-IoT scenario and the components that are critical for offloading in a particular scenario. Additionally, it presents an exploration preprint submitted to Future Generation Computer Systems on May 2, 2018, opening concerning offloading in edge and cloud processing [34].

The search process of the proposed research was carried out in various popular libraries including Springer, ScienceDirect, IEEE, and Wiley Online. The key reason of the search in these libraries was to identify the most associated materials for the process of analysis. The analysis was done from different perspectives such as to identify the publications on year-wise basis and to identify the type of publication, title of publication, topics of publication, location of publications, and so on. Figure 1 depicts the paper types in the library of Springer.

Figure 2 represents the disciplines of the area in the given library. More papers are published in the area of engineering.

Figure 3 shows the types of papers in the IEEE library. In this library, more articles were published as conference papers.

Figure 4 shows the conference location in the same library.

Figure 5 depicts the topics of publication in the library where more papers are published in the area of IoT.

Figure 6 depicts the publication title.

Figure 7 graphically represents the number of publications done in a given year in the Library of ScienceDirect.

The publication types are given in Figure 8 for the given library.

The publication titles are presented in Figure 9. More publications regarding the area of research were done in “Future Generation Computer Systems.”

The subject areas are presented in Figure 10. The figure shows that more publications are done in the field of “Computer Science.”

The library of Wiley online was searched for identifying associated materials. Figure 11 depicts the subject areas of research in the library.

The publication types are mentioned in Figure 12. More publications are done as journal category.

Figure 13 graphically demonstrates the articles published.

5. Conclusion

Fog computing is a computing infrastructure located nearby data sources and the cloud, in which information computing, storage, and applications are positioned to process the data and information. Fog computing advances the paradigm of cloud computing on the network edge, introducing a number of options and facilities. Fog computing enhances the processing, verdicts, and interventions to occur through IoT devices and spreads only the necessary details. The ideas of fog computing based on IoT in healthcare frameworks are exploited by shaping the disseminated delegate layer of insight between sensor hubs and the cloud. An overview of e-health monitoring systems in the context of testing and quality assurance of fog computing is presented in the study under consideration. Relevant materials were searched and analyzed in a widespread manner. The study has compiled the contributions of the existing methodologies, methods, and approaches in fog computing in e-healthcare. This review will be an evidence for the researchers to devise new approaches and platforms for handling and managing various situations associated with researches in the area.

Data Availability

The data will be provided upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. S. Khan, S. Nazir, I. García-Magariño, and A. Hussain, “Deep learning-based urban big data fusion in smart cities: towards traffic monitoring and flow-preserving fusion,” Computers & Electrical Engineering, vol. 89, article 106906, 2021. View at: Publisher Site | Google Scholar
  2. B. Wu, S. Nazir, and N. Mukhtar, “Identification of attack on data packets using rough set approach to secure end to end communication,” Complexity, vol. 2020, Article ID 6690569, 12 pages, 2020. View at: Publisher Site | Google Scholar
  3. M. Rath and V. K. Solanki, “Performance improvement in contemporary health care using IoT allied with big data,” in Handbook of Data Science Approaches for Biomedical Engineering, V. E. Balas, V. K. Solanki, R. Kumar, and M. Khari, Eds., pp. 103–119, Academic Press, 2020. View at: Publisher Site | Google Scholar
  4. J. J. Hathaliya and S. Tanwar, “An exhaustive survey on security and privacy issues in Healthcare 4.0,” Computer Communications, vol. 153, pp. 311–335, 2020. View at: Publisher Site | Google Scholar
  5. B. Farahani, M. Barzegari, F. Shams Aliee, and K. A. Shaik, “Towards collaborative intelligent IoT eHealth: from device to fog, and cloud,” Microprocessors and Microsystems, vol. 72, article 102938, 2020. View at: Publisher Site | Google Scholar
  6. M. Hartmann, U. S. Hashmi, and A. Imran, “Edge computing in smart health care systems: review, challenges, and research directions,” Transactions on Emerging Telecommunications Technologies, no. article e3710, 2019. View at: Publisher Site | Google Scholar
  7. A. Laurent, D. Laurent, and C. Madera, Book, Data Lakes, First Edition. Edited by © ISTE Ltd 2020. Published by ISTE Ltd and John Wiley & Sons, Inc., ISTE Ltd and John Wiley & Sons, Inc, 2020.
  8. L. G. Jaimes, A. Chakeri, and R. Steele, “Localized cooperation for crowdsensing in a fog computing-enabled internet-of-things,” Journal of Ambient Intelligence and Humanized Computing, 2018. View at: Publisher Site | Google Scholar
  9. X. Jiang, P. Hu, Y. Li et al., “A survey of real-time approximate nearest neighbor query over streaming data for fog computing,” Journal of Parallel and Distributed Computing, vol. 116, pp. 50–62, 2018. View at: Publisher Site | Google Scholar
  10. A. Kelati, I. B. Dhaou, A. Kondoro, D. Rwegasira, and H. Tenhunen, “IoT based appliances identification techniques with fog computing for e-health,” in 2019 IST-Africa Week Conference (IST-Africa), pp. 1–11, Nairobi, Kenya, May 2019. View at: Publisher Site | Google Scholar
  11. A. Kumari, S. Tanwar, S. Tyagi, N. Kumar, R. M. Parizi, and K.-K. R. Choo, “Fog data analytics: a taxonomy and process model,” Journal of Network and Computer Applications, vol. 128, pp. 90–104, 2019. View at: Publisher Site | Google Scholar
  12. Y. Li, A.-C. Orgerie, I. Rodero, B. L. Amersho, M. Parashar, and J.-M. Menaud, “End-to-end energy models for edge cloud-based IoT platforms: application to data stream analysis in IoT,” Future Generation Computer Systems, vol. 87, pp. 667–678, 2018. View at: Publisher Site | Google Scholar
  13. X. Liu, R. H. Deng, Y. Yang, H. N. Tran, and S. Zhong, “Hybrid privacy-preserving clinical decision support system in fog-cloud computing,” Future Generation Computer Systems, vol. 78, pp. 825–837, 2018. View at: Publisher Site | Google Scholar
  14. M. Mahbub, “Progressive researches on IoT security: an exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics,” Journal of Network and Computer Applications, vol. 168, article 102761, 2020. View at: Publisher Site | Google Scholar
  15. A. Manocha, G. Kumar, M. Bhatia, and A. Sharma, “Video-assisted smart health monitoring for affliction determination based on fog analytics,” Journal of Biomedical Informatics, vol. 109, article 103513, 2020. View at: Publisher Site | Google Scholar
  16. A. A. Mutlag, M. K. Abd Ghani, N. Arunkumar, M. A. Mohammed, and O. Mohd, “Enabling technologies for fog computing in healthcare IoT systems,” Future Generation Computer Systems, vol. 90, pp. 62–78, 2019. View at: Publisher Site | Google Scholar
  17. M. Nasir, K. Muhammad, J. Lloret, A. K. Sangaiah, and M. Sajjad, “Fog computing enabled cost-effective distributed summarization of surveillance videos for smart cities,” Journal of Parallel and Distributed Computing, vol. 126, pp. 161–170, 2019. View at: Publisher Site | Google Scholar
  18. O. Olakanmi and K. Odeyemi, “FEACS: a fog enhanced expressible access control scheme with secure services delegation among carers in E-health systems,” Internet of Things, vol. 12, article 100278, 2020. View at: Publisher Site | Google Scholar
  19. M. Otoom, N. Otoum, M. A. Alzubaidi, Y. Etoom, and R. Banihani, “An IoT-based framework for early identification and monitoring of COVID-19 cases,” Biomedical Signal Processing and Control, vol. 62, article 102149, 2020. View at: Publisher Site | Google Scholar
  20. S. Parasuraman and A. K. Sangaiah, “Fog - driven healthcare framework for security analysis,” in Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, pp. 253–270, elsevier, 2018. View at: Publisher Site | Google Scholar
  21. E. G. M. Petrakis, S. Sotiriadis, T. Soultanopoulos, P. T. Renta, R. Buyya, and N. Bessis, “Internet of Things as a Service (iTaaS): challenges and solutions for management of sensor data on the cloud and the fog,” Internet of Things, vol. 3-4, pp. 156–174, 2018. View at: Publisher Site | Google Scholar
  22. A. M. Rahmani, T. N. Gia, B. Negash et al., “Exploiting smart e-health gateways at the edge of healthcare Internet-of- Things: a fog computing approach,” Future Generation Computer Systems, vol. 78, pp. 641–658, 2018. View at: Publisher Site | Google Scholar
  23. P. P. Ray, D. Dash, and D. De, “Edge computing for Internet of Things: a survey, e-healthcare case study and future direction,” Journal of Network and Computer Applications, vol. 140, pp. 1–22, 2019. View at: Publisher Site | Google Scholar
  24. H. U. Rehman, A. Khan, and U. Habib, “Fog computing for bioinformatics applications,” in Book Chapter, pp. 529–545, elsevier, 2020. View at: Google Scholar
  25. D. D. Sanchez-Gallegos, A. Galaviz-Mosqueda, J. L. Gonzalez-Compean et al., “On the continuous processing of health data in edge-fog-cloud computing by using micro/nanoservice composition,” IEEE Access, vol. 8, pp. 120255–120281, 2020. View at: Publisher Site | Google Scholar
  26. M. García-Valls, C. Calva-Urrego, and A. García-Fornes, “Accelerating smart eHealth services execution at the fog computing infrastructure,” Future Generation Computer Systems, vol. 108, pp. 882–893, 2020. View at: Publisher Site | Google Scholar
  27. S. Tuli, N. Basumatary, S. S. Gill et al., “HealthFog: an ensemble deep learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integrated IoT and fog computing environments,” Future Generation Computer Systems, vol. 104, pp. 187–200, 2020. View at: Publisher Site | Google Scholar
  28. H. Ben Hassen, N. Ayari, and B. Hamdi, “A home hospitalization system based on the Internet of things, fog computing and cloud computing,” Informatics in Medicine Unlocked, vol. 20, article 100368, 2020. View at: Publisher Site | Google Scholar
  29. D. Sarabia-Jácome, R. Usach, C. E. Palau, and M. Esteve, “Highly-efficient fog-based deep learning AAL fall detection system,” Internet of Things, vol. 11, article 100185, 2020. View at: Publisher Site | Google Scholar
  30. D. Yacchirema, D. Sarabia-Jácome, C. E. Palau, and M. Esteve, “System for monitoring and supporting the treatment of sleep apnea using IoT and big data,” Pervasive and Mobile Computing, vol. 50, pp. 25–40, 2018. View at: Publisher Site | Google Scholar
  31. L. Dang, M. Dong, K. Ota, J. Wu, J. Li, and G. Li, “Resource-efficient secure data sharing for information centric E-health system using fog computing,” in 2018 IEEE International Conference on Communications (ICC), pp. 1–6, Kansas City, MO, USA, May 2018. View at: Publisher Site | Google Scholar
  32. T. Aladwani, “Scheduling IoT healthcare tasks in fog computing based on their importance,” Procedia Computer Science, vol. 163, pp. 560–569, 2019. View at: Publisher Site | Google Scholar
  33. F. Karatas and I. Korpeoglu, “Fog-based data distribution service (F-DAD) for Internet of Things (IoT) applications,” Future Generation Computer Systems, vol. 93, pp. 156–169, 2019. View at: Publisher Site | Google Scholar
  34. M. Aazam, S. Zeadally, and K. A. Harras, “Offloading in fog computing for IoT: review, enabling technologies, and research opportunities,” Future Generation Computer Systems, vol. 87, pp. 278–289, 2018. View at: Publisher Site | Google Scholar

Copyright © 2021 QingQingChang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Related articles

No related content is available yet for this article.
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views763
Downloads476
Citations

Related articles

No related content is available yet for this article.

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.