2018
DOI: 10.1007/978-3-319-95171-3_15
|View full text |Cite
|
Sign up to set email alerts
|

A Software Reference Architecture for IoT-Based Healthcare Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Another work presented in [14] also highlights the transformative potential of IoT technology in healthcare, citing its capacity to drive cost reductions and enhance health outcomes through the deployment of distributed applications. It delineates the multifaceted challenges encountered in developing and implementing IoT-based healthcare solutions, including interoperability, availability, usability, and security issues exacerbated by the heterogeneous nature of IoT systems.…”
Section: Sras For Ehrs and Healthcare Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another work presented in [14] also highlights the transformative potential of IoT technology in healthcare, citing its capacity to drive cost reductions and enhance health outcomes through the deployment of distributed applications. It delineates the multifaceted challenges encountered in developing and implementing IoT-based healthcare solutions, including interoperability, availability, usability, and security issues exacerbated by the heterogeneous nature of IoT systems.…”
Section: Sras For Ehrs and Healthcare Systemsmentioning
confidence: 99%
“…While various SRAs exist in the literature, offering reference architectures for healthcare systems [12,13], they are often tailored to speciőc contexts, such as IoT [14], or ignore crucial aspects of privacy and security in their designs [15]. To the best of our knowledge, there is currently no SRA speciőcally tailored for EHR systems that comprehensively addresses privacy and security concerns.…”
Section: Introductionmentioning
confidence: 99%
“…Also, this mechanism helps to improve availability since in case of attacks against a VM, other VMs are protected by virtualization layer. Moreover, secure key storage 2 Integrity 66,77,83,86,91,93,95,99,108,109,111,116,118,122,123,132,136 3 Confidentiality 63,65,66,71,75,83,86,90,91,93,99,110,112,116,118,120,126 4 Availability 63,66,70,75,76,78,79,81,87,90,91,98,103,104,109,111,…”
Section: Securitymentioning
confidence: 99%
“…In this architecture, collected data are transferred via Kafka to Spark for stream processing. Cloud/edge analytic layer is responsible for data gathering and analysis; also, machine learning algorithms can be applied in order to provide a deep analysis T A B L E 5 List of studies focusing on scalability challenges Item Challenge 1 Data management [72][73][74][75]79,82,84,87,90,102,104,107,112,117,118,123,125,[127][128][129]131 2 Control and configuration 17,68,70,78,84,104,109,123,124,126,131,135 3 Discovery and topic searching 17,64,67,72,90,96,97,101,115,124,133 4 Flexibility and extendibility 64,67,69,…”
Section: Scalabilitymentioning
confidence: 99%