Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 45
Filtrar
1.
Sensors (Basel) ; 22(15)2022 Jul 26.
Artigo em Inglês | MEDLINE | ID: mdl-35898074

RESUMO

There is a growing body of literature that recognizes the importance of Multi-Robot coordination and Modular Robotics. This work evaluates the secure coordination of an Unmanned Aerial Vehicle (UAV) via a drone simulation in Unity and an Unmanned Ground Vehicle (UGV) as a rover. Each robot is equipped with sensors to gather information to send to a cloud server where all computations are performed. Each vehicle is registered by blockchain ledger-based network security. In addition to these, relevant information and alerts are displayed on a website for the users. The usage of UAV-UGV cooperation allows for autonomous surveillance due to the high vantage field of view. Furthermore, the usage of cloud computation lowers the cost of microcontrollers by reducing their complexity. Lastly, blockchain technology mitigates the security issues related to adversarial or malicious robotic nodes connecting to the cluster and not agreeing to privacy rules and norms.


Assuntos
Computação em Nuvem , Procedimentos Cirúrgicos Robóticos , Robótica , Computação em Nuvem/normas , Computação em Nuvem/tendências , Simulação por Computador , Privacidade , Procedimentos Cirúrgicos Robóticos/normas , Procedimentos Cirúrgicos Robóticos/tendências , Robótica/instrumentação , Robótica/métodos , Dispositivos Aéreos não Tripulados/normas
2.
Comput Math Methods Med ; 2022: 6112815, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35096132

RESUMO

Due to the high amount of electronic health records, hospitals have prioritized data protection. Because it uses parallel computing and is distributed, the security of the cloud cannot be guaranteed. Because of the large number of e-health records, hospitals have made data security a major concern. The cloud's security cannot be guaranteed because it uses parallel processing and is distributed. The blockchain (BC) has been deployed in the cloud to preserve and secure medical data because it is particularly prone to security breaches and attacks such as forgery, manipulation, and privacy leaks. An overview of blockchain (BC) technology in cloud storage to improve healthcare system security can be obtained by reading this paper. First, we will look at the benefits and drawbacks of using a basic cloud storage system. After that, a brief overview of blockchain cloud storage technology will be offered. Many researches have focused on using blockchain technology in healthcare systems as a possible solution to the security concerns in healthcare, resulting in tighter and more advanced security requirements being provided. This survey could lead to a blockchain-based solution for the protection of cloud-outsourced healthcare data. Evaluation and comparison of the simulation tests of the offered blockchain technology-focused studies can demonstrate integrity verification with cloud storage and medical data, data interchange with reduced computational complexity, security, and privacy protection. Because of blockchain and IT, business warfare has emerged, and governments in the Middle East have embraced it. Thus, this research focused on the qualities that influence customers' interest in and approval of blockchain technology in cloud storage for healthcare system security and the aspects that increase people's knowledge of blockchain. One way to better understand how people feel about learning how to use blockchain technology in healthcare is through the United Theory of Acceptance and Use of Technology (UTAUT). A snowball sampling method was used to select respondents in an online poll to gather data about blockchain technology in Middle Eastern poor countries. A total of 443 randomly selected responses were tested using SPSS. Blockchain adoption has been shown to be influenced by anticipation, effort expectancy, social influence (SI), facilitation factors, personal innovativeness (PInn), and a perception of security risk (PSR). Blockchain adoption and acceptance were found to be influenced by anticipation, effort expectancy, social influence (SI), facilitating conditions, personal innovativeness (PInn), and perceived security risk (PSR) during the COVID-19 pandemic, as well as providing an overview of current trends in the field and issues pertaining to significance and compatibility.


Assuntos
Blockchain , Segurança Computacional , Atenção à Saúde , Registros Eletrônicos de Saúde , Adulto , Blockchain/normas , Blockchain/estatística & dados numéricos , COVID-19/epidemiologia , Computação em Nuvem/normas , Computação em Nuvem/estatística & dados numéricos , Biologia Computacional , Segurança Computacional/normas , Segurança Computacional/estatística & dados numéricos , Simulação por Computador , Atenção à Saúde/normas , Atenção à Saúde/estatística & dados numéricos , Registros Eletrônicos de Saúde/normas , Registros Eletrônicos de Saúde/estatística & dados numéricos , Feminino , Humanos , Masculino , Pessoa de Meia-Idade , Pandemias , Privacidade , SARS-CoV-2 , Inquéritos e Questionários , Adulto Jovem
3.
Bioanalysis ; 13(17): 1313-1321, 2021 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-34515519

RESUMO

Challenges for data storage during drug development have become increasingly complex as the pharmaceutical industry expands in an environment that requires on-demand availability of data and resources for users across the globe. While the efficiency and relative low cost of cloud services have become increasingly attractive, hesitancy toward the use of cloud services has decreased and there has been a significant shift toward real-world implementation. Within GxP laboratories, the considerations for cloud storage of data include data integrity and security, as well as access control and usage for users around the globe. In this review, challenges and considerations when using cloud storage options for the storage of laboratory-based GxP data are discussed and best practices are defined.


Assuntos
Computação em Nuvem/normas , Armazenamento e Recuperação da Informação/métodos , Laboratórios/normas , Humanos
4.
PLoS One ; 16(6): e0252244, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34086735

RESUMO

The purposes are to improve the server deployment capability under Mobile Edge Computing (MEC), reduce the time delay and energy consumption of terminals during task execution, and improve user service quality. After the server deployment problems under traditional edge computing are analyzed and researched, a task resource allocation model based on multi-stage is proposed to solve the communication problem between different supporting devices. This model establishes a combined task resource allocation and task offloading method and optimizes server execution by utilizing the time delay and energy consumption required for task execution and comprehensively considering the restriction processes of task offloading, partition, and transmission. For the MEC process that supports dense networks, a multi-hybrid intelligent algorithm based on energy consumption optimization is proposed. The algorithm converts the original problem into a power allocation problem via a heuristic model. Simultaneously, it determines the appropriate allocation strategy through distributed planning, duality, and upper bound replacement. Results demonstrate that the proposed multi-stage combination-based service deployment optimization model can solve the problem of minimizing the maximum task execution energy consumption combined with task offloading and resource allocation effectively. The algorithm has good performance in handling user fairness and the worst-case task execution energy consumption. The proposed hybrid intelligent algorithm can partition tasks into task offloading sub-problems and resource allocation sub-problems, meeting the user's task execution needs. A comparison with the latest algorithm also verifies the model's performance and effectiveness. The above results can provide a theoretical basis and some practical ideas for server deployment and applications under MEC.


Assuntos
Computação em Nuvem/normas , Computadores/normas , Investimentos em Saúde/normas , Alocação de Recursos/métodos , Alocação de Recursos/normas , Algoritmos
6.
PLoS One ; 15(11): e0240424, 2020.
Artigo em Inglês | MEDLINE | ID: mdl-33151974

RESUMO

Cloud computing has evolved the big data technologies to a consolidated paradigm with SPaaS (Streaming processing-as-a-service). With a number of enterprises offering cloud-based solutions to end-users and other small enterprises, there has been a boom in the volume of data, creating interest of both industry and academia in big data analytics, streaming applications, and social networking applications. With the companies shifting to cloud-based solutions as a service paradigm, the competition grows in the market. Good quality of service (QoS) is a must for the enterprises, as they strive to survive in a competitive environment. However, achieving reasonable QoS goals to meet SLA agreement cost-effectively is challenging due to variation in workload over time. This problem can be solved if the system has the ability to predict the workload for the near future. In this paper, we present a novel topology-refining scheme based on a workload prediction mechanism. Predictions are made through a model based on a combination of SVR, autoregressive, and moving average model with a feedback mechanism. Our streaming system is designed to increase the overall performance by making the topology refining robust to the incoming workload on the fly, while still being able to achieve QoS goals of SLA constraints. Apache Flink distributed processing engine is used as a testbed in the paper. The result shows that the prediction scheme works well for both workloads, i.e., synthetic as well as real traces of data.


Assuntos
Big Data , Computação em Nuvem/normas , Redes de Comunicação de Computadores/normas , Controle de Qualidade , Algoritmos , Carga de Trabalho
7.
J Med Internet Res ; 22(11): e19597, 2020 11 26.
Artigo em Inglês | MEDLINE | ID: mdl-33177037

RESUMO

BACKGROUND: De-identifying personal information is critical when using personal health data for secondary research. The Observational Medical Outcomes Partnership Common Data Model (CDM), defined by the nonprofit organization Observational Health Data Sciences and Informatics, has been gaining attention for its use in the analysis of patient-level clinical data obtained from various medical institutions. When analyzing such data in a public environment such as a cloud-computing system, an appropriate de-identification strategy is required to protect patient privacy. OBJECTIVE: This study proposes and evaluates a de-identification strategy that is comprised of several rules along with privacy models such as k-anonymity, l-diversity, and t-closeness. The proposed strategy was evaluated using the actual CDM database. METHODS: The CDM database used in this study was constructed by the Anam Hospital of Korea University. Analysis and evaluation were performed using the ARX anonymizing framework in combination with the k-anonymity, l-diversity, and t-closeness privacy models. RESULTS: The CDM database, which was constructed according to the rules established by Observational Health Data Sciences and Informatics, exhibited a low risk of re-identification: The highest re-identifiable record rate (11.3%) in the dataset was exhibited by the DRUG_EXPOSURE table, with a re-identification success rate of 0.03%. However, because all tables include at least one "highest risk" value of 100%, suitable anonymizing techniques are required; moreover, the CDM database preserves the "source values" (raw data), a combination of which could increase the risk of re-identification. Therefore, this study proposes an enhanced strategy to de-identify the source values to significantly reduce not only the highest risk in the k-anonymity, l-diversity, and t-closeness privacy models but also the overall possibility of re-identification. CONCLUSIONS: Our proposed de-identification strategy effectively enhanced the privacy of the CDM database, thereby encouraging clinical research involving multiple centers.


Assuntos
Computação em Nuvem/normas , Confidencialidade/normas , Anonimização de Dados/normas , Bases de Dados Factuais/normas , Informática Médica/métodos , Humanos
8.
J Med Internet Res ; 22(8): e18183, 2020 08 13.
Artigo em Inglês | MEDLINE | ID: mdl-32788145

RESUMO

The world is witnessing an alarming rate of displacement and migration, with more than 70.8 million forcibly displaced individuals, including 26 million refugees. These populations are known to have increased vulnerability and susceptibility to mental and physical health problems due to the migration journey. Access of these individuals to health services, whether during their trajectory of displacement or in refugee-hosting countries, remains limited and challenging due to multiple factors, including language and cultural barriers and unavailability of the refugees' health records. Cloud-based electronic health records (EHRs) are considered among the top five health technologies integrated in humanitarian crisis preparedness and response during times of conflict. This viewpoint describes the design and implementation of a scalable and innovative cloud-based EHR named Sijilli, which targets refugees in low-resource settings. This paper discusses this solution compared with other similar practices, shedding light on its potential for scalability.


Assuntos
Computação em Nuvem/normas , Registros Eletrônicos de Saúde/normas , Serviços de Saúde/normas , Refugiados/estatística & dados numéricos , Mundo Árabe , Humanos
9.
J Med Internet Res ; 22(7): e18087, 2020 07 28.
Artigo em Inglês | MEDLINE | ID: mdl-32540846

RESUMO

Developing or independently evaluating algorithms in biomedical research is difficult because of restrictions on access to clinical data. Access is restricted because of privacy concerns, the proprietary treatment of data by institutions (fueled in part by the cost of data hosting, curation, and distribution), concerns over misuse, and the complexities of applicable regulatory frameworks. The use of cloud technology and services can address many of the barriers to data sharing. For example, researchers can access data in high performance, secure, and auditable cloud computing environments without the need for copying or downloading. An alternative path to accessing data sets requiring additional protection is the model-to-data approach. In model-to-data, researchers submit algorithms to run on secure data sets that remain hidden. Model-to-data is designed to enhance security and local control while enabling communities of researchers to generate new knowledge from sequestered data. Model-to-data has not yet been widely implemented, but pilots have demonstrated its utility when technical or legal constraints preclude other methods of sharing. We argue that model-to-data can make a valuable addition to our data sharing arsenal, with 2 caveats. First, model-to-data should only be adopted where necessary to supplement rather than replace existing data-sharing approaches given that it requires significant resource commitments from data stewards and limits scientific freedom, reproducibility, and scalability. Second, although model-to-data reduces concerns over data privacy and loss of local control when sharing clinical data, it is not an ethical panacea. Data stewards will remain hesitant to adopt model-to-data approaches without guidance on how to do so responsibly. To address this gap, we explored how commitments to open science, reproducibility, security, respect for data subjects, and research ethics oversight must be re-evaluated in a model-to-data context.


Assuntos
Pesquisa Biomédica/métodos , Computação em Nuvem/normas , Disseminação de Informação/métodos , Humanos , Reprodutibilidade dos Testes
10.
PLoS One ; 15(4): e0231708, 2020.
Artigo em Inglês | MEDLINE | ID: mdl-32310989

RESUMO

On-demand cloud computing is one of the rapidly evolving technologies that is being widely used in the industries now. With the increase in IoT devices and real-time business analytics requirements, enterprises that ought to scale up and scale down their services have started coming towards on-demand cloud computing service providers. In a cloud data center, a high volume of continuous incoming task requests to physical hosts makes an imbalance in the cloud data center load. Most existing works balance the load by optimizing the algorithm in selecting the optimal host and achieves instantaneous load balancing but with execution inefficiency for tasks when carried out in the long run. Considering the long-term perspective of load balancing, the research paper proposes Stackelberg (leader-follower) game-theoretical model reinforced with the satisfaction factor for selecting the optimal physical host for deploying the tasks arriving at the data center in a balanced way. Stackelberg Game Theoretical Model for Load Balancing (SGMLB) algorithm deploys the tasks on the host in the data center by considering the utilization factor of every individual host, which helps in achieving high resource utilization on an average of 60%. Experimental results show that the Stackelberg equilibrium incorporated with a satisfaction index has been very useful in balancing the loading across the cluster by choosing the optimal hosts. The results show better execution efficiency in terms of the reduced number of task failures by 47%, decreased 'makespan' value by 17%, increased throughput by 6%, and a decreased front-end error rate as compared to the traditional random allocation algorithms and flow-shop scheduling algorithm.


Assuntos
Computação em Nuvem/normas , Teoria dos Jogos , Modelos Teóricos
11.
PLoS One ; 15(4): e0230722, 2020.
Artigo em Inglês | MEDLINE | ID: mdl-32271788

RESUMO

With the rapid development of informatization, an increasing number of industries and organizations outsource their data to cloud servers, to avoid the cost of local data management and to share data. For example, industrial Internet of things systems and mobile healthcare systems rely on cloud computing's powerful data storage and processing capabilities to address the storage, provision, and maintenance of massive amounts of industrial and medical data. One of the major challenges facing cloud-based storage environments is how to ensure the confidentiality and security of outsourced sensitive data. To mitigate these issues, He et al. and Ma et al. have recently independently proposed two certificateless public key searchable encryption schemes. In this paper, we analyze the security of these two schemes and show that the reduction proof of He et al.'s CLPAEKS scheme is incorrect, and that Ma et al.'s CLPEKS scheme is not secure against keyword guessing attacks. We then propose a channel-free certificateless searchable public key authenticated encryption (dCLPAEKS) scheme and prove that it is secure against inside keyword guessing attacks under the enhanced security model. Compared with other certificateless public key searchable encryption schemes, this scheme has higher security and comparable efficiency.


Assuntos
Computação em Nuvem/normas , Segurança Computacional/normas , Armazenamento e Recuperação da Informação , Internet das Coisas , Setor Público , Algoritmos , Confidencialidade , Gerenciamento de Dados/métodos , Gerenciamento de Dados/organização & administração , Gerenciamento de Dados/normas , Eficiência Organizacional , Registros Eletrônicos de Saúde/organização & administração , Registros Eletrônicos de Saúde/normas , Troca de Informação em Saúde/normas , Humanos , Armazenamento e Recuperação da Informação/métodos , Armazenamento e Recuperação da Informação/normas , Internet das Coisas/organização & administração , Internet das Coisas/normas , Serviços Terceirizados/organização & administração , Serviços Terceirizados/normas , Setor Público/organização & administração , Setor Público/normas , Tecnologia sem Fio/organização & administração , Tecnologia sem Fio/normas
12.
J Med Syst ; 44(5): 97, 2020 Mar 30.
Artigo em Inglês | MEDLINE | ID: mdl-32227255

RESUMO

The smart health medical system is expected to enhance the quality of health care services significantly. These system keeps patients related record and provides the services over the insecure public channel which may cause data security and privacy concerns in a smart health system. On the other hand, ciphertext attribute-based encryption(CP-ABE) provides possible encrypted data security. There are some security flaws in CP-ABE, where the existing access policies are in the cleartext form for accessing encrypted sensitive data. On the other hand, it supports the small attribute universe, which restricts the practical deployments of CP-ABE. Moreover, outsider adversary observed the communication, which also creates a serious threat to CP-ABE model. To overcome security and privacy risk, efficient access control have been designed and devolved for medical services. Although we also demonstrate the security analysis of Zhang et al.'s scheme, which is vulnerable to inefficient security proof and man in the middle attack. In the proposed scheme, we proposed an efficient and security preserve scheme to overcome the weaknesses of Zhang's et al.'s system. The protocol satisfies the attribute values of the medical user with hidden access policies. It has been proved under the standard model, which ensure the security of the protocol. Moreover, performance analysis comparison shows that the proposed scheme is more efficient than the existing one.


Assuntos
Computação em Nuvem/normas , Segurança Computacional/normas , Confidencialidade/normas , Sistemas de Informação/organização & administração , Registros Eletrônicos de Saúde/organização & administração , Humanos , Sistemas de Informação/normas
13.
J Med Internet Res ; 22(2): e15142, 2020 02 25.
Artigo em Inglês | MEDLINE | ID: mdl-32130115

RESUMO

BACKGROUND: With the continuous development of the internet and the explosive growth in data, big data technology has emerged. With its ongoing development and application, cloud computing technology provides better data storage and analysis. The development of cloud health care provides a more convenient and effective solution for health. Studying the evolution of knowledge and research hotspots in the field of cloud health care is increasingly important for medical informatics. Scholars in the medical informatics community need to understand the extent of the evolution of and possible trends in cloud health care research to inform their future research. OBJECTIVE: Drawing on the cloud health care literature, this study aimed to describe the development and evolution of research themes in cloud health care through a knowledge map and common word analysis. METHODS: A total of 2878 articles about cloud health care was retrieved from the Web of Science database. We used cybermetrics to analyze and visualize the keywords in these articles. We created a knowledge map to show the evolution of cloud health care research. We used co-word analysis to identify the hotspots and their evolution in cloud health care research. RESULTS: The evolution and development of cloud health care services are described. In 2007-2009 (Phase I), most scholars used cloud computing in the medical field mainly to reduce costs, and grid computing and cloud computing were the primary technologies. In 2010-2012 (Phase II), the security of cloud systems became of interest to scholars. In 2013-2015 (Phase III), medical informatization enabled big data for health services. In 2016-2017 (Phase IV), machine learning and mobile technologies were introduced to the medical field. CONCLUSIONS: Cloud health care research has been rapidly developing worldwide, and technologies used in cloud health research are simultaneously diverging and becoming smarter. Cloud-based mobile health, cloud-based smart health, and the security of cloud health data and systems are three possible trends in the future development of the cloud health care field.


Assuntos
Inteligência Artificial/normas , Pesquisa Biomédica/métodos , Computação em Nuvem/normas , Processamento de Texto/métodos , Humanos
14.
Comput Methods Programs Biomed ; 191: 105403, 2020 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-32109684

RESUMO

BACKGROUND AND OBJECTIVE: Multiple medical specialties rely on image data, typically following the Digital Imaging and Communications in Medicine (DICOM) ISO 12052 standard, to support diagnosis through telemedicine. Remote analysis by different physicians requires the same image to be transmitted simultaneously to different destinations in real-time. This scenario poses a need for a large number of resources to store and transmit DICOM images in real-time, which has been explored using some cloud-based solutions. However, these solutions lack strategies to improve the performance through the cloud elasticity feature. In this context, this article proposes a cloud-based publish/subscribe (PubSub) model, called PS2DICOM, which employs multilevel resource elasticity to improve the performance of DICOM data transmissions. METHODS: A prototype is implemented to evaluate PS2DICOM. A PubSub communication model is adopted, considering the coexistence of two classes of users: (i) image data producers (publishers); and (ii) image data consumers (subscribers). PS2DICOM employs a cloud infrastructure to guarantee service availability and performance through resource elasticity in two levels of the cloud: (i) brokers and (ii) data storage. In addition, images are compressed prior to the transmission to reduce the demand for network resources using one of three different algorithms: (i) DEFLATE, (ii) LZMA, and (iii) BZIP2. PS2DICOM employs dynamic data compression levels at the client side to improve network performance according to the current available network throughput. RESULTS: Results indicate that PS2DICOM can improve transmission quality, storage capabilities, querying, and retrieving of DICOM images. The general efficiency gain is approximately 35% in data sending and receiving operations. This gain is resultant from the two levels of elasticity, allowing resources to be scaled up or down automatically in a transparent manner. CONCLUSIONS: The contributions of PS2DICOM are twofold: (i) multilevel cloud elasticity to adapt the computing resources on demand; (ii) adaptive data compression to meet the network quality and optimize data transmission. Results suggest that the use of compression in medical image data using PS2DICOM can improve the transmission efficiency, allowing the team of specialists to communicate in real-time, even when they are geographically distant.


Assuntos
Computação em Nuvem/normas , Compressão de Dados , Editoração , Telemedicina , Algoritmos , Humanos , Melhoria de Qualidade
15.
Neural Netw ; 124: 243-257, 2020 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-32028053

RESUMO

This paper presents TrustSign, a novel, trusted automatic malware signature generation method based on high-level deep features transferred from a VGG-19 neural network model pretrained on the ImageNet dataset. While traditional automatic malware signature generation techniques rely on static or dynamic analysis of the malware's executable, our method overcomes the limitations associated with these techniques by producing signatures based on the presence of the malicious process in the volatile memory. By leveraging the cloud's virtualization technology, TrustSign analyzes the malicious process in a trusted manner, since the malware is unaware and cannot interfere with the inspection procedure. Additionally, by removing the dependency on the malware's executable, our method is fully capable of signing fileless malware as well. TrustSign's signature generation process does not require feature engineering or any additional model training, and it is done in a completely unsupervised manner, eliminating the need for a human expert. Because of this, our method has the advantage of dramatically reducing signature generation and distribution time. In fact, in this paper we rethink the typical use of deep convolutional neural networks and use the VGG-19 model as a topological feature extractor for a vastly different task from the one it was trained for. The results of our experimental evaluation demonstrate TrustSign's ability to generate signatures impervious to the process state over time. By using the signatures generated by TrustSign as input for various supervised classifiers, we achieved up to 99.5% classification accuracy.


Assuntos
Computação em Nuvem/normas , Segurança Computacional/normas , Aprendizado Profundo
16.
J Mol Diagn ; 22(2): 147-158, 2020 02.
Artigo em Inglês | MEDLINE | ID: mdl-31751676

RESUMO

Next-generation sequencing (NGS) diagnostics continue to expand rapidly in clinical medicine. An ever-expanding menu of molecular biomarkers is deemed important for diagnostic, prognostic, and therapeutic assessment in patients. The increasing role of NGS in the clinic is driven mainly by the falling costs of sequencing. However, the data-intensive nature of NGS makes bioinformatic analysis a major challenge to many clinical laboratories. Critically needed NGS bioinformatics personnel are hard to recruit and retain in small- to mid-size clinical laboratories. Also, NGS software often lacks the scalability necessary for expanded clinical laboratory testing volumes. Commercial software solutions aim to bridge the bioinformatics barrier via turnkey informatics solutions tailored specifically for the clinical workplace. Yet, there has been no systematic assessment of these software solutions thus far. This article presents an end-to-end vendor evaluation experience of commercial NGS bioinformatics solutions. Six different commercial vendor solutions were assessed systematically. Key metrics of NGS software evaluation to aid in the robust assessment of software solutions are described. Comprehensive feedback, provided by the TriCore Reference Laboratories molecular pathology team, enabled the final vendor selection. Many key lessons were learned during the software evaluation process, which are described herein. This article aims to provide a detailed road map for small- to mid-size clinical laboratories interested in evaluating commercial bioinformatics solutions available in the marketplace.


Assuntos
Biologia Computacional/métodos , Sequenciamento de Nucleotídeos em Larga Escala , Análise de Sequência de DNA/métodos , Software , Computação em Nuvem/ética , Computação em Nuvem/normas , Biologia Computacional/normas , Hiperostose Cortical Congênita , Técnicas de Diagnóstico Molecular/métodos , Técnicas de Diagnóstico Molecular/normas , Anotação de Sequência Molecular , Osteopetrose , Controle de Qualidade , Análise de Sequência de DNA/normas
17.
J Med Syst ; 44(1): 29, 2019 Dec 14.
Artigo em Inglês | MEDLINE | ID: mdl-31838588

RESUMO

The growing use of wireless technology in healthcare systems and devices makes these systems particularly open to cyber-based attacks, including denial of service and information theft via sniffing (eaves-dropping) and phishing attacks. Evolving technology enables wireless healthcare systems to communicate over longer ranges, which opens them up to greater numbers of possible threats. Unmanned aerial vehicles (UAV) or drones present a new and evolving attack surface for compromising wireless healthcare systems. An enumeration of the types of wireless attacks capable via drones are presented, including two new types of cyber threats: a stepping stone attack and a cloud-enabled attack. A real UAV is developed to test and demonstrate the vulnerabilities of healthcare systems to this new threat vector. The UAV successfully attacked a simulated smart hospital environment and also a small collection of wearable healthcare sensors. Compromise of wearable or implanted medical devices can lead to increased morbidity and mortality.


Assuntos
Aeronaves/instrumentação , Segurança Computacional/normas , Atenção à Saúde/organização & administração , Tecnologia de Sensoriamento Remoto/normas , Tecnologia sem Fio/normas , Computação em Nuvem/normas , Atenção à Saúde/normas , Humanos
18.
Genes (Basel) ; 10(9)2019 09 16.
Artigo em Inglês | MEDLINE | ID: mdl-31527408

RESUMO

A wealth of viral data sits untapped in publicly available metagenomic data sets when it might be extracted to create a usable index for the virological research community. We hypothesized that work of this complexity and scale could be done in a hackathon setting. Ten teams comprised of over 40 participants from six countries, assembled to create a crowd-sourced set of analysis and processing pipelines for a complex biological data set in a three-day event on the San Diego State University campus starting 9 January 2019. Prior to the hackathon, 141,676 metagenomic data sets from the National Center for Biotechnology Information (NCBI) Sequence Read Archive (SRA) were pre-assembled into contiguous assemblies (contigs) by NCBI staff. During the hackathon, a subset consisting of 2953 SRA data sets (approximately 55 million contigs) was selected, which were further filtered for a minimal length of 1 kb. This resulted in 4.2 million (Mio) contigs, which were aligned using BLAST against all known virus genomes, phylogenetically clustered and assigned metadata. Out of the 4.2 Mio contigs, 360,000 contigs were labeled with domains and an additional subset containing 4400 contigs was screened for virus or virus-like genes. The work yielded valuable insights into both SRA data and the cloud infrastructure required to support such efforts, revealing analysis bottlenecks and possible workarounds thereof. Mainly: (i) Conservative assemblies of SRA data improves initial analysis steps; (ii) existing bioinformatic software with weak multithreading/multicore support can be elevated by wrapper scripts to use all cores within a computing node; (iii) redesigning existing bioinformatic algorithms for a cloud infrastructure to facilitate its use for a wider audience; and (iv) a cloud infrastructure allows a diverse group of researchers to collaborate effectively. The scientific findings will be extended during a follow-up event. Here, we present the applied workflows, initial results, and lessons learned from the hackathon.


Assuntos
Computação em Nuvem/normas , Genoma Viral , Metagenoma , Metagenômica/métodos , Big Data , Genoma Humano , Humanos , Metagenômica/normas , Software
19.
J Med Syst ; 43(10): 318, 2019 Sep 14.
Artigo em Inglês | MEDLINE | ID: mdl-31522286

RESUMO

Mobile Edge-Cloud Network is a new network structure after fog-cloud computing, where service and data computing are scattered in the most logical, nearby and efficient place. It provides better services than fog-cloud computing with better performance in reasonably low cost way and allows users to eliminate numerous limitations inherent in fog-cloud computing, although it inherits those security-privacy issues from fog-cloud computing. A novel privacy-preserving mutual authentication in TMIS for mobile Edge-Cloud architecture (abbreviated to NPMA) is constructed in this paper. NPMA scheme not only mitigates some weaknesses of fog-cloud computing, but has other advantages. First, NPMA scheme supports patients(edge-servers) anonymity and forward-backward untraceability (traceability, when needed), since their identities are hidden in two distinct dynamic anonyms and a static one and only the trusted center can recover their real identities, when needed. Second, each edge-server shares a secret value, which realizes authentication with extremely low computional cost in authentication phase. Finally, NPMA scheme is proven safely against passive and active attacks under elliptic curve computable Diffie-Hellman problem (ECDHP) assumption in random oracle model. Hence, it achieves the required security properties and outperforms prior approaches in terms of energy and computational costs.


Assuntos
Computação em Nuvem/normas , Segurança Computacional , Confidencialidade/normas , Telemedicina/organização & administração , Humanos , Telemedicina/normas
20.
Big Data ; 7(3): 176-191, 2019 09.
Artigo em Inglês | MEDLINE | ID: mdl-31525108

RESUMO

Classification of the privacy preserved medical data is the domain of the researchers as it stirs the importance behind hiding the sensitive data from the third-party authenticator. Ensuring the privacy of the medical records and using the disease prediction mechanisms played a remarkable role in peoples' lives such that the earlier detection of the diseases is required for earlier diagnosis. Accordingly, this article proposes a method, named Taylor gradient descent (TGD)-based actor critic neural network (ACNN), which concentrates on performing the medical data classification. Initially, the privacy of the medical data is ensured by using the key matrix developed based on the privacy utility coefficient matrix using the chronological-Whale optimization algorithm. The privacy protected data are subjected to classification by using ACNN that performs the optimal classification using the proposed TGD algorithm. The proposed TGD algorithm is the integration of Taylor series in the gradient descent algorithm that updates the optimal weight of ACNN based on the weights in the previous iterations. The analysis using the Cleveland, Switzerland, and Hungarian dataset proves that the proposed classification strategy obtains an accuracy of 0.9252, a sensitivity of 0.8419, and a specificity of 0.8387, respectively.


Assuntos
Prontuários Médicos , Redes Neurais de Computação , Privacidade , Algoritmos , Computação em Nuvem/normas , Segurança Computacional , Humanos , Prontuários Médicos/classificação
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...