Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region



Similar documents
A Secure Information Forwarder for Mobile Healthcare System Using Sensors

A Secure Health Care Management System

Australian Journal of Basic and Applied Sciences. EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system

Mobile HealthCare Technology Based on Wireless Sensor

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

A Novel Switch Mechanism for Load Balancing in Public Cloud

Performance Measuring in Smartphones Using MOSES Algorithm

ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Wireless Sensor Network: Challenges, Issues and Research

Indian Journal of Science The International Journal for Science ISSN EISSN Discovery Publication. All Rights Reserved

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

The Internet of Things: Opportunities & Challenges

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón

Result and Analysis of Implemented Real Time Wireless Health Monitoring System Using Sensors

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm

A Framework for Personalized Healthcare Service Recommendation

A Road Map on Security Deliverables for Mobile Cloud Application

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Short-range Low Power Wireless Devices and Internet of Things (IoT)

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

Review of Mobile Applications Testing with Automated Techniques

Mobile Cloud Computing Challenges

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Horizontal IoT Application Development using Semantic Web Technologies

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging

Study on Differential Protection of Transmission Line Using Wireless Communication

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

Depiction of Body Area Network in Cloud Environment

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A Study of Application Recovery in Mobile Environment Using Log Management Scheme

Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices

ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES

Monitoring Performances of Quality of Service in Cloud with System of Systems

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

Wi-Fi, Bluetooth, and the Internet of Things

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Federation of Cloud Computing Infrastructure

Mobile and Sensor Systems

SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks

A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Cloud Computing for Agent-based Traffic Management Systems

Novel AMR technologies and Remote Monitoring

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

How To Make A Secure Storage On A Mobile Device Secure

A Survey of Cloud Based Health Care System

Cloud Data Protection for the Masses

Messaging and Voice Conferencing through Wi-Fi Network

Mobile Cloud Computing: A Comparison of Application Models

IJCSES Vol.7 No.4 October 2013 pp Serials Publications A NEW PARADIGM FOR DATA STORAGE IN CLOUD COMPUTING WITH SAFETY AND SECURITY

Middleware- Driven Mobile Applications

Mobile Health Apps 101: A Primer for Consumers. myphr.com

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Mobile Hybrid Cloud Computing Issues and Solutions

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature

Cloud Computing Services and its Application

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Grid Computing Vs. Cloud Computing

Sensor network infrastructure for intelligent building monitoring and management system

Crowdsourcing mobile networks from experiment

International Journal of Advanced Research in Computer Science and Software Engineering

PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

Smart Cities. Photo used under Creative Commons from nigelhowe

Enhancing Accountability for Distributed Data Sharing in the Cloud

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

The 5G Infrastructure Public-Private Partnership

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

International Journal of Engineering Research ISSN: & Management Technology November-2015 Volume 2, Issue-6

How To Balance In Cloud Computing

Automated testing for Mobility New age applications require New age Mobility solutions

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

A Survey on Load Balancing Techniques Using ACO Algorithm

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

Cloud Computing Simulation Using CloudSim

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Transcription:

International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region Manoj Kumar D.S 1 and R. Shankar 2 1 Student, M.E CSE Final, Department of Computer Science and Engineering, Indira Institute of Engineering and Technology, Tiruvallur, Anna University, Tamil Nadu. 2 Assistant Professor, Department of Computer Science and Engineering, Indira Institute of Engineering and Technology, Tiruvallur, Anna University, Tamil Nadu. Abstract Nowadays, the availability of these ubiquitous mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi- Fi. The advance of wireless body sensor networks (BSNs), mobile Healthcare (m-healthcare), which extends the operation of Healthcare provider into a different geographical environment for better health monitoring, has attracted considerable interest recently. One core element is the technical development in this area and the social paradigm that will be used to create cooperation among users for better monitoring of patients in the network and providing a feasible solution for the health issues. The scopes of these applications are very broad, since people can approach various entities to provide solutions at the given state of the Patient Health Information. Essentially, opportunistic computing is characterized by exploiting all available computing resources in an opportunistic environment to provide a platform for the distributed execution of a computing-intensive task. Providing an extensive solution for the patients either as a self monitoring kit or as a kit that will be handled by a medical user to provide a timely and resourceful evaluation of the current state of the patient on any given environment thereby saving the time constraint and providing capable medical aid on the point of that time. In addition, the future of mobile will be in novel technologies such as network coding as well as in combination with social networks in order to boost cooperation among users in as well as connect people over the shared content.

114 Manoj Kumar D.S & R. Shankar Keywords: opportunistic computing, social paradigm, patient health information. 1. Introduction E-health system has been used as communication system that enables to deliver medical service over the Internet. With the advancement of wireless technologies, high performance and fault tolerant wireless devices can be employed to eliminate medical errors, to reduce workload, to improve the efficiency of hospital staff as well as to improve the comfort of patients.wireless sensor networks (WSNs) are massively distributed networks that do not require any external infrastructure and are typically used to monitor a physical phenomenon. Sensor network applications can play a key role in many different areas, such as intrusion detection and surveillance, wildlife monitoring, precision agriculture and building monitoring. It is commonly accepted that, because of the lack of resources, classical strategies for computing and communication cannot be applied to the world of WSNs. This pushed the definition of new paradigms, such as opportunistic networking and computing.adoption of the opportunistic computing paradigm to maximize the resources available to find the solution at multiple stages. The concept of making interaction between mobile nodes through wireless communication makes this opportunistic computing more efficient and lively by providing different solutions and results for a particular problem for which the medical user uses the specifically developed medical application which gets the input from an kit which consists of sensors that gets the input from the user or patient on whom the sensors are implanted.to enable resource sharing between multiple heterogeneous healthcare enterprises and medical staff securely, this paper uses communication techniques such as SOA approach, UPnP and OPC-UA. To the best of one s knowledge, this paper is one of the first attempts to tackle key research challenges posed by the opportunistic computing concept. Specifically, developing an android native application to get the input from the sensors through a Bluetooth and this enables the kit to be carried remotely to any location and provide some first aid for the issue that is addressed to the patient. Solutions can be obtained at any given level from the mobile application itself, furthermore the social paradigm that enables the medical staff to interact and share the condition of the patient and provide the solution for the particular problem. If the solution is not being obtained at these levels health care centre can be contacted to provide an ambulance or the doctor for the particular patient. This project enables any user who has this kit to provide first aid for the patient before a doctor or an ambulance approaches to the particular location. Furthermore, adding features like holding the record for the patient and monitoring them from time to time till the patient gets a treatment. The Bluetooth kit from which the value is received and user who attended the patient. This helps in knowing the issues of the patient when brought to the health care centre without making any time delay and provide the necessary medications and treatment to the patient.

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different 115 2. Models and Design Goal In this section, we formalize the system model and identify our design goal as well. 2.1 System Model 2.1.1 Smart Mobile device and BSN. Smart mobile devices (smartphones and tablets) and BSN are huge factor for health care emergency. They contribute in a major amount there by bringing mobility and agilely in this field of expertise. Each act individually and combinable as a resource for providing any kind of attention or treatment to a patient in any given scenario and geographical region. 2.1.2 Health Care Center. With an history of all available diseases to a patient in an health care center it is very much important to include in this proposed scheme since it adds similar symptom based results that can be useful for many other patients as well that can be sent to medical staff. It is also relevant to include health care center into the framework, with the inclusion of the health care center medical staff can update the location of the patient with their current status and so that an ambulance or an doctor can be dispatched to that location. 2.2 Design Goals Our design goal is to develop an application that can be implemented on smart mobile devices that should be carried out everywhere. Making an application that is acceptable over all devices, will make communication easier and there by contributing a factor to add social paradigm into the proposed scheme. Adding social paradigm will bring opportunistic computing into play. That makes a way for numerous numbers for solution to a single problem. Providing certain constraints to monitor battery meter on smart mobile devices and provide alternative solutions on the low level of battery meters. Android includes a number of mechanisms to reduce the scope of potential issues by limiting the capability of Web View to the minimum functionality required by our application.so developing a native application will provide an numerous solution and way to handle data s efficiently. 3. Proposed Framework In this section, we propose our SPOC framework, which consists of three parts: system initialization, access to health care center and medical staff and role of opportunistic computing in m-healthcare emergency. 3.1 System Initialization A native Application built for Android using java is used Validate the effectiveness of the proposed SPOC framework in m-healthcare emergency. This application interacts between the sensor kit implanted in patient body and health care center as well as other medical users. Social paradigm is introduced to provide multiple solutions for a particular issue of a patient. Multiple entities can contact each other for multiple solutions before contacting the server. Battery meters are monitored and handed over

116 Manoj Kumar D.S & R. Shankar to nearby entity in case of emergency since smart mobile device energy could be insufficient when an emergency takes place. Representation of the system of the proposed framework is shown in the Fig. 1. Relatively medical applications are more sensitive and it has to be handled appropriately with every field name and value so that there won t be any misassumption of data s since any bad data can ruin someone s life. This dedicated application for this scheme provides a reliable and transparent data transfer between medical staffs and health care center which are easy to understand and trustworthy. In addition to providing data isolation, supporting full-file system encryption, and providing secure communications channels, Android provides a wide array of algorithms for protecting data using cryptography. Fig. 1: Proposed framework with social paradigm providing way for opportunistic computing. 3.2 Role of Opportunistic Computing with Access to Health Care Center and Medical Staffs Medical staff who carry the smart mobile device and BSN are allowed to interact with health care center and other medical staffs there by saving more time and getting more resources that can be applicable to patient. Saving the time by updating the patient health information to health care center instantaneously thereby reducing the time taken for initial treatment at the hospital since all the necessary records are being acquired by the medical staff and sent to the health care center. Once the patient arrives at the scene he can be taken directly to treatment with the necessary information that is being obtained from the medical staff from the scene.

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different 117 4. Related Works 4.1 Opportunistic Computing a New Paradigm When two devices come into contact, albeit opportunistically, it provides a great opportunity to match services to resources, exchange information, cyber forage, execute tasks remotely, and forward messages. This is mainly a high level talk. Three billion that is the estimated number of cell phones in the world by the end of 2010. That number excludes other types of access technologies and deployed sensors. The average performance of a cell phone processor is 100 MIPS and communication is at 200 kbps. However one calculates it, three billion cell phones pack in an enormous amount of computing power, memory space, and energy that can be shared in a collaborative way; in a manner that is representative of distributed computing, albeit in a different paradigm. Often referred to as opportunistic computing, this concept actually meshes well with the phenomenon of social networking that has taken the Internet world by storm. 4.2 Android Security Overview Android has security features built into the operating system that significantly reduce the frequency and impact of application security issues. The system is designed so you can typically build your apps with default system and file permissions and avoid difficult decisions about security. Some of the core security features that help you build secure apps include: The Android Application Sandbox, which isolates your app data and code execution from other apps. An application framework with robust implementations of common security functionality such as cryptography, permissions, and secure IPC. An encrypted file system that can be enabled to protect data on lost or stolen devices. User-granted permissions to restrict access to system features and user data. Application-defined permissions to control application data on a per-app basis. 4.3 Using external storage Files created on external storage, such as SD Cards, are globally readable and writable. Because external storage can be removed by the user and also modified by any application, you should not store sensitive information using external storage. 5. Conclusion In this paper, we have proposed a technique for overcoming the hurdle that is being faced in day to day life by every person around this global environment. Saving the precious time as well as the life of dear ones by implementing this ideology. We hope that this paper will inspire lot of people to take over and update with lot of emerging technologies and bring more resources to this health care emergency. In our future work we tend to reduce the size of the sensor kit and make it more portable like a wrist

118 Manoj Kumar D.S & R. Shankar watch which has most of the sensors. Moreover adding voice inputs and message in the application will result in less time consuming and sophisticate medical staff across the network and we intend to increase the battery life by adding solar charging modules to the current battery meters of the sensor kit. References [1] Rongxing Lu,Xiaodong Lin and Xuemin Shen (2013) A Secure and Privacy- Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency, IEEE Transactions on Parallel and Distributed Systems, pp. 614-624. [2] R. Zhang, Y. Zhang, J. Sun, and G. Yan (2012) Fine-Grained Private Matching for Proximity-Based Mobile Social Networking, Prof. of INFOCOM 12, pp. 1-9. [3] M. Avvenuti, P. Corsini, P. Masci, and A. Vecchio (2007) Opportunistic Computing for Wireless Sensor Networks, Proc. IEEE Int l Conf. Mobile Adhoc and Sensor Systems (MASS 07), pp. 1-6. [4] A. Passarella, M. Conti, E. Borgia, and M. Kumar (2010) Performance Evaluation of Service Execution in Opportunistic Computing, Proc. 13th ACM Int l Conf. Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM 10), pp. 291-298. [5] R. Lu, X. Lin, X. Liang, and X. Shen (2010) Secure Handshake with Symptoms-Matching: The Essential to the Success of Mhealthcare Social Network, Proc. Fifth Int l Conf. Body Area Networks (BodyNets 10). [6] W. Dong, V. Dave, L. Qiu, and Y. Zhang (2011) Secure Friend Discovery in Mobile Social Networks, Prof. of INFOCOM 11, pp. 1647-1655. [7] https://developer.android.com/guide/index.html