A bio-inspired privacy-preserving framework for healthcare systems

C Dhasarathan, M Kumar, AK Srivastava… - The Journal of …, 2021 - Springer
The Journal of Supercomputing, 2021Springer
Wireless computing has revolutionized our life with the technological advancement from the
traditional networking into a new epoch for communication in ad hoc decorum. An energy
efficient network of sensors based on wireless communication and networking principles
can enhance the effectiveness of computing during unpredictable circumstances. If a
computable required resource is readily available within the reachable region and it is
identified to be idle and it is ready to share the corresponding information from its end …
Abstract
Wireless computing has revolutionized our life with the technological advancement from the traditional networking into a new epoch for communication in ad hoc decorum. An energy efficient network of sensors based on wireless communication and networking principles can enhance the effectiveness of computing during unpredictable circumstances. If a computable required resource is readily available within the reachable region and it is identified to be idle and it is ready to share the corresponding information from its end without affecting the normal behavior of the device or the node, then there exists an opportunity to utilize those resources for computing. Opportunistic computing has a great potential of growth in the field of wireless ad hoc network computing. In traditional network computing technology, mobile computing, grid computing, distributed computing, ubiquitous computing and cloud computing, formerly ensues the communication with minimal resources currently available at the terminal point. This paper proposes a novel framework for an effective utilization of sharable resources, which are available within the reachable region, by creating an opportunity to frame an opportunistic computing while preserving the user’s privacy. The proposed framework adopts a bio-inspired technique for identifying and collecting resources information, and thereby recognizes which resource is ready to participate in the opportunistic computing. Experimental results of a system that implements the bio-inspired technique along with the natural behavior of the bee colony approach was analyzed and found that the proposed system shows comparatively high performance in terms of computation resource searching, identifying, emergency data transfer, and participative node privacy preserving.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果