Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/11311
Title: Secure and Privacy-Preserving Human Interaction Recognition of Pervasive Healthcare Monitoring
Authors: Tanveer, M.
Keywords: Digital storage;Edge computing;Fog computing;Health care;Musculoskeletal system;Network security;Privacy-preserving techniques;Cloud-computing;Communication/networking and information technology;Communications networking;Edge computing;Healthcare monitoring;Human interaction recognition;Pervasive healthcare;Pervasive healthcare monitoring;Privacy preserving;Security and privacy;Authentication
Issue Date: 2022
Publisher: IEEE Computer Society
Citation: Yang, C., Tampubolon, H., Setyoko, A., Hua, K., Tanveer, M., & Wei, W. (2022). Secure and privacy-preserving human interaction recognition of pervasive healthcare monitoring. IEEE Transactions on Network Science and Engineering, , 1-17. doi:10.1109/TNSE.2022.3223281
Abstract: A cloud-based Artificial Intelligence (AI) service has recently empowered the Internet of Medical Things (IoMT) in many applications on the remote Human Interaction Recognition of Pervasive Healthcare Monitoring (HIR-PHM). In this work, a framework of the skeleton-based HIR-PHM under secure Edge-Fog-Cloud computing (EFCC) was proposed to manage the computation and storage resources, latency, cyber-attack, and privacy-preserving simultaneously. At the Edge, IoMT with a camera, record the human interaction as videos and sends them to the Fog, which installed a human pose estimation model, PoseNet, to convert the videos into human skeleton data. At the Cloud, a skeleton-based Spatial-Temporal Graph Convolution Network with Pairwise Adjacency Matrix (STGCN-PAM) was employed to recognize the human interaction. A Hybrid of One Time Password (OTP), Hashed Messages Authentication Code (HMAC), and symmetric cipher were employed to secure the skeleton data. The UT-Interaction dataset was used to evaluate the proposed framework. Besides, the computation performance and latency under EFCC were compared with Edge-Fog and Edge-Cloud deployments. Experimental results confirmed two major contributions: 1) the proposed framework has promising performance compared with other methods on the dataset. 2) The skeleton-based HIR-PHM with secure EFCC shows the advantages of better computation performance in terms of frame per second. IEEE
URI: https://doi.org/10.1109/TNSE.2022.3223281
https://dspace.iiti.ac.in/handle/123456789/11311
ISSN: 2327-4697
Type of Material: Journal Article
Appears in Collections:Department of Mathematics

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: