2015
DOI: 10.1016/j.procs.2015.05.093
|View full text |Cite
|
Sign up to set email alerts
|

Stream Processing of Healthcare Sensor Data: Studying User Traces to Identify Challenges from a Big Data Perspective

Abstract: The Internet of Things (IoT) generates massive streams of data which call for ever more efficient real time processing. Designing and implementing a big data service for the real time processing of such data requires an extensive knowledge of both input load and data distribution in order to provide a service which can cope with the workload. In this context, we study in this paper the challenges inherent to the real time processing of massive data flows from the IoT. We provide a detailed analysis of traces g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0
6

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 134 publications
(45 citation statements)
references
References 8 publications
0
37
0
6
Order By: Relevance
“…A recent analysis [18] of Endomondo application, a popular sport activity tracking application has revealed number of remarkable observations. The study shows that a single workout generates 170 GPS tuples, and the total number of GPS tuples can reach 6.3 million in a month time.…”
Section: Motivation Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…A recent analysis [18] of Endomondo application, a popular sport activity tracking application has revealed number of remarkable observations. The study shows that a single workout generates 170 GPS tuples, and the total number of GPS tuples can reach 6.3 million in a month time.…”
Section: Motivation Scenariomentioning
confidence: 99%
“…Authentication solutions based on Public Key Infrastructure [16] may prove beneficial for this problem. Trusted execution environment (TEE) techniques [17,18] are potential solutions to this authentication problem in fog computing as well. Measurement-based methods may also be used to detect rogue devices and hence reduce authentication cost [18,19].…”
Section: Security and Reliabilitymentioning
confidence: 99%
“…With the growth of IoT-based systems, a rapid increase in the number of connected devices has led to a massive volume of data that needs to be processed [16,17]. Cloud computing has, thus far, provided scalable and on-demand storage and processing resources to fulfill the requirement of IoT.…”
Section: Fog Computing and Its Benefitsmentioning
confidence: 99%
“…The challenge of deriving insights from big data streams is recognized as a key challenge. Various authors proposed various algorithms and techniques for mining big data streams . The proposed algorithms illustrated various techniques to collect, integrate, analyze, and visualize big data streams in real time.…”
Section: Preliminariesmentioning
confidence: 99%
“…Various authors proposed various algorithms and techniques for mining big data streams. 13,14,[33][34][35][36][37][38] The proposed algorithms illustrated various techniques to collect, integrate, analyze, and visualize big data streams in real time. Nevertheless, less attention has been paid to resource scheduling for big data streams.…”
Section: Related Workmentioning
confidence: 99%