2021
DOI: 10.3390/electronics10222797
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Application Partitioning and Task-Scheduling Secure Schemes for Biosensor Healthcare Workload in Mobile Edge Cloud

Abstract: Currently, the use of biosensor-enabled mobile healthcare workflow applications in mobile edge-cloud-enabled systems is increasing progressively. These applications are heavyweight and divided between a thin client mobile device and a thick server edge cloud for execution. Application partitioning is a mechanism in which applications are divided based on resource and energy parameters. However, existing application-partitioning schemes widely ignore security aspects for healthcare applications. This study devi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…We need to modify the formula to H × H s = H t so that the transformation matrix acts on the source point cloud. The modified transformation matrix formula should be as follows (12):…”
Section: R P P Kmentioning
confidence: 99%
See 1 more Smart Citation
“…We need to modify the formula to H × H s = H t so that the transformation matrix acts on the source point cloud. The modified transformation matrix formula should be as follows (12):…”
Section: R P P Kmentioning
confidence: 99%
“…This approach aims to select correspondences that meet a threshold. Abdullah Lakhan et al [ 12 ] proposed a DAPWTS algorithm framework, which utilizes a secure minimum cut algorithm to partition applications between local nodes and edge nodes. After the application partitioning, an optimal search is performed using a node search algorithm, which also optimizes the structure of point cloud data.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, the limited bandwidth and broadcast nature of wireless communications render it cumbersome in the provision of privacy and security features such as authentication, confidentiality and integrity (Khadem et al, 2021). As such, these networks are dogged by attacks and threats such as traffic analysis, MitM, DDoS, eavesdropping, DoS and jamming (Lakhan et al, 2021; Tanveer et al, 2022). In addition, how to successfully authenticate identities of the communicating parties before the establishment of a secure channel to uphold integrity and confidentiality during message exchanges is still an open challenge (Zhang et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…They are widely used for prevention, medication, rehabilitation, etc. [2][3][4][5][6][7][8][9]. They also impact healthcare services in hospitals, care centres and emergency services [10][11][12].…”
Section: Introductionmentioning
confidence: 99%