A Secure and Scalable Sidechain Model for Fog Computing in Healthcare Systems
Abstract
With the enormous amount of data produced daily, cloud and fog computing presented efficient and effective models for real-time data exchange. Nevertheless, this technology came with a cost at the security level, where it became an easy target for malicious actions that could quickly spread throughout the model. Blockchain, a recent and promising technology, has shown to be a suitable solution for securing transactions in the fog environment because of the distributed ledger structure that makes it resistant to many types of attacks. Scalability, however, introduced the main drawback of a blockchain by making it inefficient in some real-world applications, especially in the medical field, which includes a lot of data exchange. This work will suggest a scalable and secure model for fog and cloud computing in healthcare systems that depend on sidechains and the clustering of the available fog nodes. The importance of the model is highlighted, and experimental results showed promising outcomes.References
Elhadad, A., Alanazi, F., Taloba, A. I., & Abozeid, A. (2022). Fog computing service in the Healthcare Monitoring System for managing the real-time notification. Journal of Healthcare Engineering, 2022, 1–11. https://doi.org/10.1155/2022/5337733
Alazeb, A., & Panda, B. (2019). Ensuring Data Integrity in Fog Computing Based Health-Care Systems. Security, Privacy, and Anonymity in Computation, Communication, and Storage, 63–77. https://doi.org/10.1007/978-3-030-24907-6_6
Jiang, Y., Wang, C., Wang, Y., & Gao, L. (2019). A Cross-Chain Solution to Integrating Multiple Blockchains for IoT Data Management. Sensors, 19(9), 2042. https://doi.org/10.3390/s19092042
Yi, S., Qin, Z., & Li, Q. (2015). Security and Privacy Issues of Fog Computing: A Survey. Wireless Algorithms, Systems, and Applications, pp. 685–695. https://doi.org/10.1007/978-3-319-21837-3_67
Alazeb, A., & Panda, B. (2019). Maintaining Data Integrity in Fog Computing Based Critical Infrastructure Systems. 2019 International Conference on Computational Science and Computational Intelligence (CSCI). https://doi.org/10.1109/csci49370.2019.00014
Hosseinpour, Farhoud & Amoli, Payam & Plosila, Juha & Hämäläinen, Timo & Tenhunen, Hannu. (2016). An Intrusion Detection System for Fog Computing and IoT-based Logistic Systems using a Smart Data Approach. International Journal of Digital Content Technology and its Applications. 10.
Ismail, L., & Materwala, H. (2020). Blockchain Paradigm for Healthcare: Performance Evaluation. Symmetry, 12(8), 1200. https://doi.org/10.3390/sym12081200
Ziegler, M. H., Grossmann, M., & Krieger, U. R. (2019). Integration of Fog Computing and Blockchain Technology Using the Plasma Framework. 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). https://doi.org/10.1109/bloc.2019.8751308
Blockchain Metrics | Arcitura Patterns. (n.d.). ARCITURA. Retrieved December 29, 2022, from http://patterns.arcitura.com/blockchain-patterns/blockchain-metrics
Gia, T. N., Ali, M., Dhaou, I. B., Rahmani, A. M., Westerlund, T., Liljeberg, P., & Tenhunen, H. (2017). IoT-based continuous glucose monitoring system: A feasibility study. Procedia Computer Science, 109, 327–334. https://doi.org/10.1016/j.procs.2017.05.359
Kua, J., Loke, S., Arora, C., Fernando, N., & Ranaweera, C. (2021). Internet of Things in Space: A Review of Opportunities and Challenges from Satellite-Aided Computing to Digitally-Enhanced Space Living. Sensors, 21(23), 8117. https://doi.org/10.3390/s21238117
How Google Workspace uses encryption to protect your data. (n.d.). Google. Retrieved July 21, 2022, from https://services.google.com/fh/files/misc/google-workspace-encryption-wp.pdf
Fatoum, H., Hanna, S., Halamka, J. D., Sicker, D. C., Spangenberg, P., & Hashmi, S. K. (2021). Blockchain Integration With Digital Technology and the Future of Health Care Ecosystems: Systematic Review. Journal of Medical Internet Research, 23(11), e19846. https://doi.org/10.2196/19846
Author, G. (2014, July 31). A Cautionary Tale: How a Bug in Dropbox Permanently Deleted 8,000 of My Photos. PetaPixel. https://petapixel.com/2014/07/31/cautionary-tale-bug-dropbox-permanently-deleted-8000-photos/
Squarepants, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3977007
Foley, S., Karlsen, J. R., & Putniņš, T. J. (2019). Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed through Cryptocurrencies? The Review of Financial Studies, 32(5), 1798–1853. https://doi.org/10.1093/rfs/hhz015
Jiang, Y., Wang, C., Wang, Y., & Gao, L. (2019). A Cross-Chain Solution to Integrating Multiple Blockchains for IoT Data Management. Sensors, 19(9), 2042. https://doi.org/10.3390/s19092042
Back, S.A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A.K., Poelstra, A., & Timón, J. (2014). Enabling Blockchain Innovations with Pegged.
Alam, T. (2019). IoT-Fog: A Communication Framework using blockchain in the Internet of Things. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3638991
Singh, P., Nayyar, A., Kaur, A., & Ghosh, U. (2020). Blockchain and Fog-Based Architecture for Internet of Everything in Smart Cities. Future Internet, 12(4), 61. https://doi.org/10.3390/fi12040061
Ngabo, D., Wang, D., Iwendi, C., Anajemba, J. H., Ajao, L. A., & Biamba, C. (2021). Blockchain-Based Security Mechanism for the Medical Data at Fog Computing Architecture of Internet of Things. Electronics, 10(17), 2110. https://doi.org/10.3390/electronics10172110
Agarwal, N. & Agarwal, G. (2017). Role of Cloud Computing in Development of Smart City. International Journal of Science Technology & Engineering
Devadass, L., Sekaran, S. S., & Thinakaran, R. (2017). CLOUD COMPUTING IN HEALTHCARE. International Journal of Students’ Research in Technology & Management, 5(1), 25–31. https://doi.org/10.18510/ijsrtm.2017.516
Choudhary, S. & Jadoun, R & Mandoria, H. (2016). Role of Cloud Computing Technology in Agriculture Fields. Computer Engineering and Intelligent Systems. 7. 2222-2863.
Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing - MCC ’12. https://doi.org/10.1145/2342509.2342513
Ema, R. R., Islam, T., & Ahmed, M. H. (2019). Suitability of Using Fog Computing Alongside Cloud Computing. 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). https://doi.org/10.1109/icccnt45670.2019.8944906
Du, H., Leng, S., Wu, F., Chen, X., & Mao, S. (2020). A New Vehicular Fog Computing Architecture for Cooperative Sensing of Autonomous Driving. IEEE Access, 8, 10997–11006. https://doi.org/10.1109/access.2020.2964029
Elhadad, A., Alanazi, F., Taloba, A. I., & Abozeid, A. (2022). Fog Computing Service in the Healthcare Monitoring System for Managing the Real-Time Notification. Journal of Healthcare Engineering, 2022, 1–11. https://doi.org/10.1155/2022/5337733
Quy, V. K., Hau, N. V., Anh, D. V., & Ngoc, L. A. (2021). Smart healthcare IoT applications based on fog computing: architecture, applications, and challenges. Complex & Intelligent Systems. https://doi.org/10.1007/s40747-021-00582-9
Awaisi, K. S., Hussain, S., Ahmed, M., Khan, A. A., & Ahmed, G. (2020). Leveraging IoT and Fog Computing in Healthcare Systems. IEEE Internet of Things Magazine, 3(2), 52–56. https://doi.org/10.1109/iotm.0001.1900096
Al-khafajiy, M., Baker, T., Asim, M., Guo, Z., Ranjan, R., Longo, A., Puthal, D., & Taylor, M. (2020). COMMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137, 1–16. https://doi.org/10.1016/j.jpdc.2019.10.006
Gu, K., Dong, X., & Jia, W. (2022). Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs. IEEE Transactions on Cloud Computing, 10(2), 1215–1232. https://doi.org/10.1109/tcc.2020.2985050
Fantacci, R., Nizzi, F., Pecorella, T., Pierucci, L., & Roveri, M. (2019). False Data Detection for Fog and Internet of Things Networks. Sensors, 19(19), 4235. https://doi.org/10.3390/s19194235
Ahanger, T. A., Tariq, U., Ibrahim, A., Ullah, I., Bouteraa, Y., & Gebali, F. (2022). Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective. Mathematics, 10(8), 1298. https://doi.org/10.3390/math10081298
Mayer, A. H., Rodrigues, V. F., Costa, C. A., Righi, R. da, Roehrs, A., & Antunes, R. S. (2021). Fogchain: A fog computing architecture integrating blockchain and internet of things for personal health records. IEEE Access, 9, 122723–122737. https://doi.org/10.1109/access.2021.3109822
Na, S., Xumin, L., & Yong, G. (2010). Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm. 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. https://doi.org/10.1109/iitsi.2010.74
Poon, J., & Buterin, V. (2017). Plasma: Scalable Autonomous Smart Contracts. Scalable Autonomous Smart Contracts. https://plasma.io/
DOI:
https://doi.org/10.31449/inf.v49i1.5580Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







