Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/11311
Title: | Secure and Privacy-Preserving Human Interaction Recognition of Pervasive Healthcare Monitoring |
Authors: | Tanveer, M. |
Keywords: | Digital storage;Edge computing;Fog computing;Health care;Musculoskeletal system;Network security;Privacy-preserving techniques;Cloud-computing;Communication/networking and information technology;Communications networking;Edge computing;Healthcare monitoring;Human interaction recognition;Pervasive healthcare;Pervasive healthcare monitoring;Privacy preserving;Security and privacy;Authentication |
Issue Date: | 2022 |
Publisher: | IEEE Computer Society |
Citation: | Yang, C., Tampubolon, H., Setyoko, A., Hua, K., Tanveer, M., & Wei, W. (2022). Secure and privacy-preserving human interaction recognition of pervasive healthcare monitoring. IEEE Transactions on Network Science and Engineering, , 1-17. doi:10.1109/TNSE.2022.3223281 |
Abstract: | A cloud-based Artificial Intelligence (AI) service has recently empowered the Internet of Medical Things (IoMT) in many applications on the remote Human Interaction Recognition of Pervasive Healthcare Monitoring (HIR-PHM). In this work, a framework of the skeleton-based HIR-PHM under secure Edge-Fog-Cloud computing (EFCC) was proposed to manage the computation and storage resources, latency, cyber-attack, and privacy-preserving simultaneously. At the Edge, IoMT with a camera, record the human interaction as videos and sends them to the Fog, which installed a human pose estimation model, PoseNet, to convert the videos into human skeleton data. At the Cloud, a skeleton-based Spatial-Temporal Graph Convolution Network with Pairwise Adjacency Matrix (STGCN-PAM) was employed to recognize the human interaction. A Hybrid of One Time Password (OTP), Hashed Messages Authentication Code (HMAC), and symmetric cipher were employed to secure the skeleton data. The UT-Interaction dataset was used to evaluate the proposed framework. Besides, the computation performance and latency under EFCC were compared with Edge-Fog and Edge-Cloud deployments. Experimental results confirmed two major contributions: 1) the proposed framework has promising performance compared with other methods on the dataset. 2) The skeleton-based HIR-PHM with secure EFCC shows the advantages of better computation performance in terms of frame per second. IEEE |
URI: | https://doi.org/10.1109/TNSE.2022.3223281 https://dspace.iiti.ac.in/handle/123456789/11311 |
ISSN: | 2327-4697 |
Type of Material: | Journal Article |
Appears in Collections: | Department of Mathematics |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: