skip to main content
research-article

Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model

Published:16 June 2021Publication History
Skip Abstract Section

Abstract

There have been significant advances in the field of Internet of Things (IoT) recently, which have not always considered security or data security concerns: A high degree of security is required when considering the sharing of medical data over networks. In most IoT-based systems, especially those within smart-homes and smart-cities, there is a bridging point (fog computing) between a sensor network and the Internet which often just performs basic functions such as translating between the protocols used in the Internet and sensor networks, as well as small amounts of data processing. The fog nodes can have useful knowledge and potential for constructive security and control over both the sensor network and the data transmitted over the Internet. Smart healthcare services utilise such networks of IoT systems. It is therefore vital that medical data emanating from IoT systems is highly secure, to prevent fraudulent use, whilst maintaining quality of service providing assured, verified and complete data. In this article, we examine the development of a Cognitive Fog (CF) model, for secure, smart healthcare services, that is able to make decisions such as opting-in and opting-out from running processes and invoking new processes when required, and providing security for the operational processes within the fog system. Overall, the proposed ensemble security model performed better in terms of Accuracy Rate, Detection Rate, and a lower False Positive Rate (standard intrusion detection measurements) than three base classifiers (K-NN, DBSCAN, and DT) using a standard security dataset (NSL-KDD).

References

  1. 2018. Decision Trees for Classification: A Machine Learning Algorithm. https://www.xoriant.com/blog/product-engineering/.Google ScholarGoogle Scholar
  2. Karim Abouelmehdi, Abderrahim Beni Hssane, and Hayat Khaloufi. 2018. Big healthcare data: Preserving security and privacy. J. Big Data 5 (2018), 1. DOI:https://doi.org/10.1186/s40537-017-0110-7Google ScholarGoogle ScholarCross RefCross Ref
  3. Abdulla Amin Aburomman and Mamun Bin Ibne Reaz. 2016. A novel SVM-kNN-PSO ensemble method for intrusion detection system. Applied Soft Computing 38 (2016), 360-372. DOI:https://doi.org/10.1016/j.asoc.2015.10.011 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Swati Agarwal, Shashank Yadav, and Arun kumar Yadav. 2016. An efficient architecture and algorithm for resource provisioning in fog computing. In Proceedings of the IEEE Region 10 Conference (TENCON’17). 3129–3134. DOI:10.1109/TENCON.2017.8228399Google ScholarGoogle ScholarCross RefCross Ref
  5. John Patrick C. Agustin, Joshua H. Jacinto, Wilbert Jethro R. Limjoco, and Jhoanna Rhodette I. Pedrasa. 2017. IPv6 routing protocol for low-power andLossy networks implementation in network simulator-3. In IEEE Region 10 Conference (TENCON 2017). IEEE, 3129–3134.Google ScholarGoogle Scholar
  6. Mohammed Al-khafajiy, Thar Baker, Carl Chalmers, Muhammad Asim, Hoshang Kolivand, Muhammad Fahim, and Atif Waraich. 2019. Remote health monitoring of elderly through wearable sensors. Multimedia Tools and Applications (24 Jan 2019). DOI:https://doi.org/10.1007/s11042-018-7134-7Google ScholarGoogle Scholar
  7. M. Al-khafajiy, T. Baker, A. Waraich, D. Al-Jumeily, and A. Hussain. 2018. IoT-Fog optimal workload via fog offloading. In 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion). 359–364. DOI:https://doi.org/10.1109/UCC-Companion.2018.00081Google ScholarGoogle Scholar
  8. Mohammed Al-khafajiy, Lee Webster, Thar Baker, and Atif Waraich. 2018. Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In 2nd International Conference on Future Networks and Distributed Systems. ACM, 9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ismaeel Al Ridhawi, Moayad Aloqaily, and Azzedine Boukerche. 2019. Comparing fog solutions for energy efficiency in wireless networks: Challenges and opportunities. IEEE Wireless Communications 26, 6 (2019), 80–86.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Fadi Al-Turjman. 2017. Cognitive caching for the future sensors in fog networking. Pervasive and Mobile Computing 42 (2017), 317–334. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bahast Ali and Xiaochun Cheng. 2019. Security solution based on raspberry PI and IoT. In Cyberspace Safety and Security, Jaideep Vaidya, Xiao Zhang, and Jin Li (Eds.). Springer International Publishing, Cham, 162–171. Google ScholarGoogle Scholar
  12. M. Z. Alom and T. M. Taha. 2017. Network intrusion detection for cyber security using unsupervised deep learning approaches. In 2017 IEEE National Aerospace and Electronics Conference (NAECON). 63–69. DOI:https://doi.org/10.1109/NAECON.2017.8268746Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng. 2017. Fog computing for the Internet of Things: Security and privacy issues. IEEE Internet Computing (Mar. 1), 21 (2017), 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Venkatraman Balasubramanian, Safa Otoum, Moayad Aloqaily, Ismaeel Al Ridhawi, and Yaser Jararweh. 2020. Low-latency vehicular edge: A vehicular infrastructure model for 5G. Simulation Modelling Practice and Theory 98 (2020), 101968.Google ScholarGoogle ScholarCross RefCross Ref
  15. Venkatraman Balasubramanian, Faisal Zaman, Moayad Aloqaily, Ismaeel Al Ridhawi, Yaser Jararweh, and Haythem Bany Salameh. 2019. A mobility management architecture for seamless delivery of 5G-IoT services. In I IEEE International Conference on Communications (ICC 2019). IEEE, 1–7.Google ScholarGoogle ScholarCross RefCross Ref
  16. Venkatraman Balasubramanian, Faisal Zaman, Moayad Aloqaily, Saed Alrabaee, Maria Gorlatova, and Martin Reisslein. 2019. Reinforcing the edge: Autonomous energy management for mobile device clouds. In IEEE Conference on Computer Communications Workshops (INFOCOM 2019 WKSHPS). IEEE, 44–49.Google ScholarGoogle ScholarCross RefCross Ref
  17. M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita. 2014. Network anomaly detection: methods, systems and tools. IEEE Communications Surveys Tutorials 16, 1 (2014), 303–336. DOI:https://doi.org/10.1109/SURV.2013.052213.00046Google ScholarGoogle ScholarCross RefCross Ref
  18. Hafida Bouziane, Belhadri Messabih, and Abdallah Chouarfia. 2011. Profiles and majority voting-based ensemble method for protein secondary structure prediction. Evolutionary Bioinformatics Online 7 (10 2011), 171-189. DOI:https://doi.org/10.4137/EBO.S7931Google ScholarGoogle Scholar
  19. Ahmed M. Elmisery, Seungmin Rho, and Dmitri Botvich. 2016. A fog based middleware for automated compliance with OECD privacy principles in Internet of Healthcare Things. IEEE Access 4 (2016), 8418–8441.Google ScholarGoogle ScholarCross RefCross Ref
  20. Q. Fan and N. Ansari. 2018. Towards workload balancing in fog computing empowered IoT. IEEE Transactions on Network Science and Engineering (2018), 1–1. DOI:https://doi.org/10.1109/TNSE.2018.2852762Google ScholarGoogle Scholar
  21. Dewan Md. Farid, Nouria Harbi, and Mohammad Zahidur Rahman. 2010. Combining naive Bayes and decision tree for adaptive intrusion detection. CoRR abs/1005.4496 (2010). arxiv:1005.4496http://arxiv.org/abs/1005.4496.Google ScholarGoogle Scholar
  22. Canadian Institute for Cybersecurity. 2018. NSL-KDD dataset. http://www.unb.ca/cic/datasets/nsl.html.Google ScholarGoogle Scholar
  23. L. Galluccio, S. Milardo, G. Morabito, and S. Palazzo. 2015. Sdn wise: Design. 2015 Prototyping and experimentation of a stateful SDN solution for wireless sensor networks. In 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 513–521.Google ScholarGoogle Scholar
  24. T. Govindarajan. 2016. Evaluation of ensemble classifiers for intrusion detection. International Journal of Computer and Information Engineering 10, 6 (2016), 1045–1053.Google ScholarGoogle Scholar
  25. Harriet Green. 2015. The Internet of Things in the cognitive era: Realizing the future and full potential of connected devices. ed: IBM Watson IoT (2015).Google ScholarGoogle Scholar
  26. Andreas Heil, Mirko Knoll, and Torben Weis. 2007. The Internet of Things - Context-based device federations. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07). IEEE, 58–58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Martin Henze, René Hummen, Roman Matzutt, and Klaus Wehrle. 2014. A trust point-based security architecture for sensor data in the cloud. In Trusted Cloud Computing (2014), 77–106.Google ScholarGoogle ScholarCross RefCross Ref
  28. Kirak Hong, David Lillethun, Umakishore Ramachandran, Beate Ottenwälder, and Boris Koldehofe. 2013. Mobile fog: A programming model for large-scale applications on the Internet of Things. In 2nd ACM SIGCOMM Workshop on Mobile Cloud Computing (MCC’13). ACM, New York,, 15–20. DOI:https://doi.org/10.1145/2491266.2491270 Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Kai Hwang, Sameer Kulkareni, and Yue Hu.2009. Cloud security with virtualized defense and reputation-based trust mangement. In 2009 8th IEEE International Conference on DependableAutonomic and Secure Computing, IEEE, 717–722. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Fatemeh Jalali, Olivia J. Smith, Timothy Lynar, and Frank Suits. 2017. Cognitive IoT gateways: Automatic task sharing and switching between cloud and edge/fog computing. In SIGCOMM Posters and Demos. ACM, 121–123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. F. Jiang, S. S. Tseng, and C. M. Su. 2001. Two-phase clustering process for outliers detection. Pattern Recognition Letters 22/6-7 (2001), 691–700. DOI:https://doi.org/10.1016/s0167-8655(00)00131-8 Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Kapsalis, P. Kasnesis, I. S. Venieris, D. I. Kaklamani, and C. Z. Patrikakis. 2017. A cooperative fog approach for effective workload balancing. IEEE Cloud Computing 4, 2 (March 2017), 36–45. DOI:https://doi.org/10.1109/MCC.2017.25Google ScholarGoogle ScholarCross RefCross Ref
  33. Daoying Ma and Aidong Zhang. 2004. An adaptive density-based clustering algorithm for spatial database with noise. In IEEE International Conference on Data Mining (ICDM’04) (2004). DOI:https://doi.org/10.1109/icdm.2004.10036 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, and Mohamed Sellami. 2018. Cognitive computing meets the Internet of Things. In 13th International Conference on Software Technologies. SciTePress.Google ScholarGoogle Scholar
  35. Wided Mathlouthi and Narjes Bellamine Ben Saoud. 2017. Flexible composition of System of Systems on cloud federation. In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 358–365.Google ScholarGoogle ScholarCross RefCross Ref
  36. N. Moustafa, B. Turnbull, and K. R. Choo. 2019. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet of Things Journal (2019), 1–1. DOI:https://doi.org/10.1109/JIOT.2018.2871719Google ScholarGoogle Scholar
  37. S. Otoum, B. Kantarci, and H. T. Mouftah. 2017. Mitigating false negative intruder decisions in WSN-based smart grid monitoring. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 153–158. DOI:https://doi.org/10.1109/IWCMC.2017.7986278Google ScholarGoogle Scholar
  38. S. Otoum, B. Kantarci, and H. T. Mouftah. 2019. On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters 1, 2 (June 2019), 68–71. DOI:https://doi.org/10.1109/LNET.2019.2901792Google ScholarGoogle ScholarCross RefCross Ref
  39. Safa Otoum, Burak Kantraci, and Hussein T. Mouftah. 2017. Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. IEEE International Conference on Communications (ICC’17) (2017). DOI:https://doi.org/icc.2017Google ScholarGoogle ScholarCross RefCross Ref
  40. Beate Ottenwälder, Boris Koldehofe, Kurt Rothermel, and Umakishore Ramachandran. 2013. MigCEP: Operator migration for mobility driven distributed complex event processing. In 7th ACM International Conference on Distributed Event-based Systems (DEBS’13). ACM, New York,, 183–194. DOI:https://doi.org/10.1145/2488222.2488265 Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. A.K. Pujari. 2001. Data Mining Techniques. Universities Press. https://books.google.ca/books?id=dH2KQhJboSYC.Google ScholarGoogle Scholar
  42. Amir-Mohammad Rahmani, Nanda Kumar Thanigaivelan, Tuan Nguyen Gia, Jose Granados, Behailu Negash, Pasi Liljeberg, and Hannu Tenhunen. 2015. Smart e-health gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 826–834.Google ScholarGoogle ScholarCross RefCross Ref
  43. Anam Sajid and Haider Abbas. 2016. Data privacy in cloud-assisted healthcare systems: State of the art and future challenges. J. Medical Systems 40, 6 (2016), 155:1–155:16. DOI:https://doi.org/10.1007/s10916-016-0509-2 Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Amit Sheth. 2016. Internet of Things to Smart IoT through semantic, cognitive, and perceptual computing. IEEE Intelligent Systems 31, 2 (2016), 108–112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Fan Shi, Zhenlei Chen, and Xiaochun Cheng. 2019. Behavior modeling and individual recognition of sonar transmitter for secure communication in UASNs. IEEE Access (2019).Google ScholarGoogle Scholar
  46. S. Soheily-Khah, P. Marteau, and N. Béchet. 2018. Intrusion detection in network systems through hybrid supervised and unsupervised machine learning process: a case study on the ISCX dataset. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). 219–226. DOI:https://doi.org/10.1109/ICDIS.2018.00043Google ScholarGoogle ScholarCross RefCross Ref
  47. Seyed Ahmad Soleymani, Abdul Hanan Abdullah, Mahdi Zareei, Mohammad Hossein Anisi, Cesar Vargas-Rosales, Muhammad Khurram Khan, and Shidrokh Goudarzi. 2017. A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5 (2017), 15619–15629.Google ScholarGoogle ScholarCross RefCross Ref
  48. Bunheang Tay, Jung Keun Hyun, and Sejong Oh. 2014. A machine learning approach for specification of spinal cord injuries using fractional anisotropy values obtained from diffusion tensor images. Computational and Mathematical Methods in Medicine 2014 (01 2014), 276589. DOI:https://doi.org/10.1155/2014/276589Google ScholarGoogle Scholar
  49. Tian Wang, Guangxue Zhang, M. D. Zakirul Alam Bhuiyan, Anfeng Liu, Weijia Jia, and Mande Xie. 2018. A Novel Trust Mechanism Based on Fog Computing in Sensor-Cloud System. Future Generation Computer Systems.Google ScholarGoogle Scholar
  50. T. Wang, G. Zhang, A. Liu, M. Z. A. Bhuiyan, and Q. Jin. 2018. A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing.IEEE Internet of Things Journal.Google ScholarGoogle Scholar
  51. Qihui Wu, Guoru Ding, Yuhua Xu, Shuo Feng, Zhiyong Du, Jinlong Wang, and Keping Long. 2014. Cognitive Internet of Things: A new paradigm beyond connection. IEEE Internet of Things Journal 1, 2 (2014), 129–143.Google ScholarGoogle ScholarCross RefCross Ref
  52. A. Yousefpour, G. Ishigaki, R. Gour, and J. P. Jue. 2018. On reducing IoT service delay via fog offloading. IEEE Internet of Things Journal 5, 2 (April 2018), 998–1010. DOI:https://doi.org/10.1109/JIOT.2017.2788802Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Internet Technology
            ACM Transactions on Internet Technology  Volume 21, Issue 3
            August 2021
            522 pages
            ISSN:1533-5399
            EISSN:1557-6051
            DOI:10.1145/3468071
            • Editor:
            • Ling Liu
            Issue’s Table of Contents

            Copyright © 2021 Association for Computing Machinery.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 June 2021
            • Accepted: 1 February 2021
            • Online AM: 7 May 2020
            • Revised: 1 February 2020
            • Received: 1 December 2019
            Published in toit Volume 21, Issue 3

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!