| Literature DB >> 34512110 |
Zahra Ahmadi1, Mostafa Haghi Kashani1,2, Mohammad Nikravan2, Ebrahim Mahdipour1.
Abstract
The healthcare system aims to provide a reliable and organized solution to enhance the health of human society. Studying the history of patients can help physicians to consider patients' needs in healthcare system designing and offering service, which leads to an increase in patient satisfaction. Therefore, healthcare is becoming a growing contesting market. With this significant growth in healthcare systems, such challenges as huge data volume, response time, latency, and security vulnerability are raised. Therefore, fog computing, as a well-known distributed architecture, could help to solve such challenges. In fog computing architecture, processing components are placed between the end devices and cloud components, and they execute applications. This architecture is suitable for such applications as healthcare systems that need a real-time response and low latency. In this paper, a systematic review of available approaches in the field of fog-based healthcare systems is proposed; the challenges of its application in healthcare are explored, classified, and discussed. First, the fog computing approaches in healthcare are categorized into three main classes: communication, application, and resource/service. Then, they are discussed and compared based on their tools, evaluation methods, and evaluation metrics. Finally, based on observations, some open issues and challenges are highlighted for further studies in fog-based healthcare.Entities:
Keywords: Fog computing; Healthcare; Systematic review; eHealth
Year: 2021 PMID: 34512110 PMCID: PMC8418296 DOI: 10.1007/s11042-021-11227-x
Source DB: PubMed Journal: Multimed Tools Appl ISSN: 1380-7501 Impact factor: 2.757
Fig. 1The layered architecture of fog computing in healthcare applications
Some related studies in fog/cloud computing in healthcare
| Review type | Ref | Publication year | Main topic | The process of selecting paper | Taxonomy | Open issues | Covered year |
|---|---|---|---|---|---|---|---|
| [ | 2017 | Promises and challenges of IoT in fog-driven IoT eHealth | Not mentioned | No | Mentioned | 2011–2015 | |
| [ | 2018 | Role of polymer Nano-composites in the healthcare applications | Not mentioned | No | Mentioned | Not mentioned | |
| [ | 2018 | Introducing current technologies and challenges of fog computing for the healthcare IoT ecosystem | Not mentioned | No | Mentioned | Not mentioned | |
| [ | 2019 | Integration of Internet of things (IoT) and cloud computing (CC) for healthcare applications | Not mentioned | No | Mentioned | Not mentioned | |
| [ | 2019 | Discussing energy efficiency issue in the cloud of things for healthcare systems | Not mentioned | No | Mentioned | 2005–2016 | |
| [ | 2019 | Privacy and security concerns of e-Health solutions in cloud computing | Mentioned | No | Mentioned | 2000–2018 | |
| [ | 2020 | Online heart monitoring in The IoT-based techniques | Mentioned | No | Mentioned | Not mentioned | |
| [ | 2020 | Employing social IoT in healthcare and medical solutions | Mentioned | No | Mentioned | Not mentioned | |
| [ | 2020 | IoT based healthcare system to enhance the efficiency of monitoring | Not mentioned | No | Mentioned | Not mentioned | |
| [ | 2016 | Data privacy concern in cloud-based healthcare systems | Mentioned | No | Not mentioned | 2010–2015 | |
| [ | 2017 | Using fog computing within the healthcare systems | Mentioned | Yes | Not mentioned | 2005–2016 | |
| [ | 2018 | Employing fog computing within healthcare systems | Mentioned | No | Not mentioned | 2015–2018 | |
| [ | 2019 | Real-time and secure remote health monitoring based on smart homes using body sensors | Mentioned | Yes | Mentioned | 2007–2017 | |
| Our article | 2021 | Fog computing within healthcare | Mentioned | Yes | Mentioned | 2015- 2020 |
Inclusion/Exclusion criteria
| Inclusion criteria | Exclusion criteria |
|---|---|
• Studies published online from 2015 – March 2020 • Studies in the field of fog and healthcare | • Studies Non-peer-reviewed papers or non-English studies • Books, book chapters, or thesis |
| • Studies in the field of fog and healthcare | • Review and survey papers |
| • Studies ESCI-indexed journal and conference papers | • Short or editorials papers which are less than 6 pages |
Fig. 2Distribution of published paper based on publication
Fig. 3Distribution of papers over the years based on the publication
Details of selected papers
| Category | Publisher | Year | Author | Journal/Conference name |
|---|---|---|---|---|
| Service/ resource-based | IEEE | 2016 | Elmisery, et al. [ | IEEE Access |
| 2017 | Cerina, et al. [ | 2017 IEEE 3rd International Forum on Research and Technologies for Society and Industry (RTSI) | ||
| 2017 | Al Hamid, et al. [ | IEEE Access | ||
| 2017 | He, et al. [ | China Communications | ||
| 2018 | Sood and Mahajan [ | IEEE Internet of Things Journal | ||
| 2018 | Wang, et al. [ | IEEE Transactions on Network Science and Engineering | ||
| 2018 | Ullah, et al. [ | 2018 IEEE International Conference on Smart Internet of Things | ||
| 2019 | Wang, et al. [ | IEEE Transactions on Industrial Informatics | ||
| 2019 | Saha, et al. [ | IEEE Access | ||
| Science Direct | 2018 | Mahmoud, et al. [ | Computers & Electrical Engineering | |
| 2018 | Wazid, et al. [ | Future Generation Computer Systems | ||
| 2020 | Farahani, et al. [ | Microprocessors and Microsystems | ||
| Springer | 2019 | Zhang, et al. [ | Peer-to-Peer Networking and Applications | |
| 2019 | Jia, et al. [ | Wireless Networks | ||
| ACM | 2018 | Mahmud, et al. [ | Proceedings of the 19th International Conference on Distributed Computing and Networking | |
| Taylor & Francis | 2018 | Gupta, et al. [ | Journal of Statistics and Management System | |
| Emerald | 2016 | Tao, et al. [ | Journal of information, communication and ethics in society | |
| Application-based | IEEE | 2017 | Akrivopoulos, et al. [ | 2017 IEEE 41st Annual Computer Software and Applications Conference |
| 2018 | Sood and Mahajan [ | IEEE Internet of Things Journal | ||
| 2019 | Dar, et al. [ | IEEE Access | ||
| Science Direct | 2018 | Vijayakumar, et al. [ | Computers in Human Behavior | |
| 2020 | Tuli, et al. [ | Future Generation Computer Systems | ||
| Springer | 2019 | Gill, et al. [ | International Conference on Intelligent Data Communication Technologies and Internet of Things | |
| 2019 | Devarajan, et al. [ | Journal of Ambient Intelligence and Humanized Computing | ||
| Emerald | 2018 | Singh, et al. [ | International journal of pervasive computing and communications | |
| Communication-based | IEEE | 2015 | Gia, et al. [ | 2015 IEEE International Conference on Computer and Information Technology |
| 2017 | Giri, et al. [ | GLOBECOM 2017—2017 IEEE Global Communications Conference | ||
| 2018 | Asif-Ur-Rahman, et al. [ | IEEE Internet of Things Journal | ||
| Science Direct | 2018 | Kumari, et al. [ | Computers & Electrical Engineering | |
| 2018 | Rahmani, et al. [ | Future Generation Computer Systems | ||
| Springer | 2019 | Talaat, et al. [ | Journal of Network and Systems Management | |
| 2019 | Ullah, et al. [ | Peer-to-Peer Networking and Applications | ||
| ACM | 2018 | Al-khafajiy, et al. [ | 2nd International Conference on Future Networks and Distributed Systems | |
| Taylor & Francis | 2019 | Kharel, et al. [ | IETE Technical Review |
Fig. 4The classification of fog computing in the healthcare system
Categorization of recent studies and other information in resource/service-based
| Article | Main idea | Evaluation method | Tool | Advantage(s) | Disadvantage(s) |
|---|---|---|---|---|---|
| [ | Proposing a comprehensive middleware to preserve privacy in IoHT based healthcare services through fog nodes as privacy enforcement points | Data sets | Not-mentioned | High scalability Low latency High privacy | High Complexity |
| [ | Task execution with minimal latency, producing physical actions meaningful for the user, using location and context awareness | Simulation | Not-mentioned | Low latency High reliability High scalability The system was able to reduce CO2 levels | Dependency to user's smartphone |
| [ | Using fog computing facility to provide security for private healthcare data by designing a tri-party key agreement protocol | Design | Not-mentioned | High security Resource utilization | Low integrity Low availability |
| [ | Proposing a framework-specific to fog devices, to guarantee quick data processing and reliable data transmission | Simulation | Not-mentioned | High reliability High optimization | Low scalability |
| [ | Presenting an optimized policy for constrained resource allocation in data centers or network tools, using meta-heuristics | Simulation | iFogSim | Low latency Low energy consumption High optimization | Without considering cluster resource management, optimization, mobility, and edge-centric affinity |
| [ | Continually generating an alert indicating blood pressure fluctuation and send the alert to the mobile phone of a user | Simulation | Not-mentioned | High bandwidth efficiency Low latency High accuracy | Low security between layers |
| [ | A self-powered disposable supply sensing bio-sensor platform for big data in IoT healthcare | Simulation | Not mentioned | Low energy consumption High security | Low coverage Low Privacy |
| [ | A patient-driven Healthcare architecture in IoT | Simulation | MATLAB | High optimization Low latence | Low scalability Low security Low Privacy |
| [ | Presenting a multi-layer fog-cloud based architecture to reduce energy consumption and latency that will finally reduce the death rate | Simulation | iFogSim | Low latency Low energy consumption | Low security |
| [ | Proposing the most outstanding design of controlled and active bed system for patients | Simulation | iFogSim | Low energy consumption | Without considering patient mobility |
| [ | A systematic approach to elicite requirements for an IoT healthcare system and identifying stakeholders | Simulation | NS-2 | Low energy consumption High security High throughput Low overheads | Low scalability |
| [ | Optimizing complex correlation among the personalized services and intricate event pattern | Simulation | Java platfor | High scalability | Low privacy |
| [ | Presenting a secure propagation design for replicated data in Smart healthcare IoT environment | Simulation | NS-2 | High resource management High security | Low scalability |
| [ | Proposing an e-healthcare framework to preserve the privacy of patients that deals with electronic medical records (EMRs) | Design | Not-mentioned | High availability High privacy Low latency | Low security |
| [ | Designing a novel trustworthy and energy-efficient protocol based on mobile fog computing | Simulation | MATLAB | Low energy consumption High resource utilization High reliability | Low scalability |
| [ | Monitoring health-related data of patients at any time, anywhere in a real-time manner | Data sets | Not mentioned | Low latency Low energy consumption | Low scalability Low security Low Privacy |
| [ | Designing a security model for environments based on fog, proved its soundness using formal verification method, and analyzed its security against common attacks | Formal | Random oracle model | High security High reliability | Low generalizability Low efficiency |
Comparison of the existing factors in the resource/service-based approaches
| Article | Scalability | Latency | Reliability | Energy | Resource utilization | Security | Privacy | Availability | Optimization | Bandwidth | Accuracy | Throughout | Overhead |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| [ | ✓ | ✓ | ✓ | ||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||
| [ | ✓ | ✓ | |||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | |||||||||
| [ | ✓ | ✓ | ✓ | ✓ | |||||||||
| [ | ✓ | ✓ | |||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||
| [ | ✓ | ✓ | |||||||||||
| [ | ✓ | ||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | |||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||
| [ | ✓ | ||||||||||||
| [ | ✓ | ✓ | |||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||
| [ | ✓ | ✓ |
Categorization of recent studies and other information in application-based
| Article | Main idea | Evaluation | Tool | Advantage(s) | Disadvantage(s) |
|---|---|---|---|---|---|
| [ | They are pre-processing of dengue-related data and user classification into various categories based on their disease-related symptoms | Data sets | Not-mentioned | High accuracy Low response time Low execution time High resource utilization | Without considering safety Weak in diagnosis |
| [ | Employing decision tree, temporal network analysis (TNA), and wearable sensor technology, to propose a healthcare system to detect and prevent the prevalence of the Chikungunya virus | Data sets | Not-mentioned | High security High reliability High accuracy High Precision | High vulnerable |
| [ | Designing an intelligent system to early detect and prevent the mosquito-borne diseases at the early stage | Data sets | MATLAB | High accuracy | Using insecure channel High vulnerable to threats Low privacy |
| [ | Proposing a working prototype that collects ECG traces from a tailor-made device and uses the patient's smartphone as a fog gateway for securely sharing them to other authorized entities | Prototype | Not-mentioned | High security High resource utilization Low latency | Low scalability |
| [ | Presenting an energy-efficient healthcare system assisted by fog computing that maintains the glucose level of blood | Data sets | Not-mentioned | High security Low latency Low energy consumption High accuracy | Low scalability |
| [ | Leveraging the benefits of smartphones and fog computing to propose a delay-aware and cost-efficient accident detection and response system | Simulation | iFogSim | High security High scalability | Low generalizability |
| [ | Presenting an information model assisted by fog computing to manage the heart patient's data, which came from various IoT devices | Simulation | iFogSim | Low energy consumption Low latency | Low security Low generalizability |
| [ | Proposing a novel fog based smart healthcare systemfor automatic diagnosis of heart diseases | Design | Not mentioned | Low energy consumption Low latency | Low security |
Comparison of the existing correctness factors in the application-based approaches
| Article | Scalability | Latency | Reliability | Energy | Resource utilization | Security | Accuracy | Response time | Execution | Precision | F-measure |
|---|---|---|---|---|---|---|---|---|---|---|---|
| [ | ✓ | ✓ | ✓ | ||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||
| [ | ✓ | ||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | |||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||
| [ | ✓ | ✓ | |||||||||
| [ | ✓ | ✓ | |||||||||
| [ | ✓ | ✓ |
Categorization of recent studies and other information in communication-based
| Article | Main idea | Evaluation | Tool | Advantage(s) | Disadvantage(s) |
|---|---|---|---|---|---|
| [ | Implementing fog computing services such as distributed database with interoperability, location awareness, real-time notification mechanism and graphical user interface with access management | Data sets | MySQL | High resource utilization High throughput Low latency Low energy consumption | Low privacy Low scalability |
| [ | Designing a geo-distributed mediator layer of intelligence between cloud and sensor nodes and providing several higher-level services | Prototype | Not-mentioned | Low energy consumption High performance High interoperability High security High reliability | Low scalability Low generalizability |
| [ | Presenting a multi-layer patient-driven healthcare architecture to real-time collect, transmit, and process the data | Design | Not-mentioned | Low latency High security | Low generalizability |
| [ | Proposing a secure data transmission protocol in an e-medical system based on fog server | Design | Not-mentioned | High security | High latency |
| [ | An intelligent real-time healthcare framework to predict the health state of a person during workouts | Simulation | iFogSim | Low computational overhead | Low privacy High vulnerable |
| [ | Establishing an efficient peer-to-peer communication between wearables and healthcare sensing devices to shares secret data | Simulation | NS-2 | Low energy consumption Low communication cost High transmission rate | Low security Low privacy |
| [ | Providing smart health monitoring system based on fog computing exploiting Long Range (LoRa) as connectivity | Design | Not mentioned | Low computational overhead Low energy consumption | Low security Low privacy |
| [ | Proposing a heterogeneous Internet of healthcare things (IoHT) and a multi-layer communication framework to reduce health care costs and provide improved and reliable services | Simulation | Not-mentioned | High transmission rates Low latency High resource utilization | Low security Low scalability |
| [ | Designing job allocation and resource management that provides a high level of QoS within the healthcare systems | Simulation | Not-mentioned | Low latency High resource utilization Low response time | Low scalability |
Comparison of the existing correctness factors in the communication-based approaches
| Article | Latency | Energy | Resource utilization | Security | Response time | Throughput | Performance | Interoperability | Reliability | Computational overhead | Communication cost | Resilience |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| [ | ✓ | ✓ | ✓ | ✓ | ||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
| [ | ✓ | ✓ | ||||||||||
| [ | ✓ | |||||||||||
| [ | ✓ | ✓ | ||||||||||
| [ | ✓ | ✓ | ✓ | |||||||||
| [ | ✓ | ✓ | ✓ | |||||||||
| [ | ✓ | ✓ | ✓ | |||||||||
| [ | ✓ | ✓ | ✓ |
Fig. 5Percentage of the presented fog computing approaches in healthcare systems
Main advantages and disadvantages of distinct categories
| Category | Advantage | Weakness |
|---|---|---|
| Resource/service-based | Better latency Better energy consumption Better resource utilization | Unacceptable scalability Unacceptable security Unacceptable integrity Unacceptable availability |
| Communication-based | Better latency Better resource utilization | Unacceptable security and privacy Unacceptable energy consumption |
| Application-based | Better latency Better Security Better scalability Better energy consumption | Unacceptable security and privacy Generalizability has not been shown in other application Unacceptable resource utilization Unacceptable reliability |
Fig. 6Percentage of the presented popular tools and simulation environments in the literature
Fig. 7Percentage of metrics in the reviewed techniques of fog-based healthcare
Fig. 8Percentage of evaluation metrics in categorized papers
Fig. 9Percentage of the applied measurement environments in the literature
Fig. 10The open issues and challenges of some papers in the fog-based healthcare