2015
DOI: 10.1007/s10916-015-0327-y
|View full text |Cite
|
Sign up to set email alerts
|

Big Data, Internet of Things and Cloud Convergence – An Architecture for Secure E-Health Applications

Abstract: Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing component… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 161 publications
(58 citation statements)
references
References 17 publications
0
56
0
2
Order By: Relevance
“…Finally, they present the findings of extended results from the European Union (EU)‐funded project BIG and the German‐funded project PEC . As a conclusion, we have study the combination of the technologies of Mobile Cloud Computing, Big Data, and IoT, and we have study some analysation of existing components and methods of securely integrating Big Data processing with cloud machine‐to‐machine systems based on remote telemetry units .…”
Section: Related Workmentioning
confidence: 95%
“…Finally, they present the findings of extended results from the European Union (EU)‐funded project BIG and the German‐funded project PEC . As a conclusion, we have study the combination of the technologies of Mobile Cloud Computing, Big Data, and IoT, and we have study some analysation of existing components and methods of securely integrating Big Data processing with cloud machine‐to‐machine systems based on remote telemetry units .…”
Section: Related Workmentioning
confidence: 95%
“…Every single IoT device might present a potential risk that could be exploited to either harm the end-users or jeopardize the privacy of them [130]. If IoT security is compromised, end-users information can be accessed through unauthorized authentications.…”
Section: E Security and Privacymentioning
confidence: 99%
“…In this way, problems are expected to be detected before they arise in the ongoing processes. When data is generated with a rate and volume at a scale beyond the capacity of the state-of-the-art systems and therefore creates a need for revolutionary solutions, it is called Big Data [9][10][11][56][57][58][59]. With the revolutionary Big Data solutions, the tremendous amount of data generated by M2M applications can be handled effectively.…”
Section: Review Articlementioning
confidence: 99%