Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
In the era of pervasive digital connectivity, intelligent surveillance systems (ISS) have become essential tools for ensuring public safety, protecting critical infrastructure, and deterring security threats in various environments. The current state of these systems heavily relies on the computational capabilities of mobile devices for tasks such as real-time video analysis, object detection, and tracking. However, the limited processing power and energy constraints of these devices hinder their ability to perform these tasks efficiently and effectively. The dynamic nature of the surveillance environment also adds complexity to the task-offloading process. To address this issue, mobile edge computing (MEC) comes into play by offering edge servers with higher computational capabilities and proximity to mobile devices. It enables ISS by offloading computationally intensive tasks from resource-constrained mobile devices to nearby MEC servers. Therefore, in this paper, we propose and implement an energy-efficient and cost-effective task-offloading framework in the MEC environment. The amalgamation of binary and partial task-offloading strategies is used to achieve a cost-effective and energy-efficient system. We also compare the proposed framework in MEC with mobile cloud computing (MCC) environments. The proposed framework addresses the challenge of achieving energy-efficient and cost-effective solutions in the context of MEC for ISS. The iFogSim simulator is used for implementation and simulation purposes. The simulation results show that the proposed framework reduces latency, cost, execution time, network usage, and energy consumption.more » « less
-
Electronic Health Records (EHRs) have become increasingly popular in recent years, providing a convenient way to store, manage and share relevant information among healthcare providers. However, as EHRs contain sensitive personal information, ensuring their security and privacy is most important. This paper reviews the key aspects of EHR security and privacy, including authentication, access control, data encryption, auditing, and risk management. Additionally, the paper dis- cusses the legal and ethical issues surrounding EHRs, such as patient consent, data ownership, and breaches of confidentiality. Effective implementation of security and privacy measures in EHR systems requires a multi-disciplinary approach involving healthcare providers, IT specialists, and regulatory bodies. Ultimately, the goal is to come upon a balance between protecting patient privacy and ensuring timely access to critical medical information for feature healthcare delivery.more » « less
-
The Internet of Medical Things (IoMT) is a network of interconnected medical devices, wearables, and sensors integrated into healthcare systems. It enables real-time data collection and transmission using smart medical devices with trackers and sensors. IoMT offers various benefits to healthcare, including remote patient monitoring, improved precision, and personalized medicine, enhanced healthcare efficiency, cost savings, and advancements in telemedicine. However, with the increasing adoption of IoMT, securing sensitive medical data becomes crucial due to potential risks such as data privacy breaches, compromised health information integrity, and cybersecurity threats to patient information. It is necessary to consider existing security mechanisms and protocols and identify vulnerabilities. The main objectives of this paper aim to identify specific threats, analyze the effectiveness of security measures, and provide a solution to protect sensitive medical data. In this paper, we propose an innovative approach to enhance security management for sensitive medical data using blockchain technology and smart contracts within the IoMT ecosystem. The proposed system aims to provide a decentralized and tamper-resistant plat- form that ensures data integrity, confidentiality, and controlled access. By integrating blockchain into the IoMT infrastructure, healthcare organizations can significantly enhance the security and privacy of sensitive medical data.more » « less