Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/11311
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTanveer, M.en_US
dc.date.accessioned2023-02-26T06:43:37Z-
dc.date.available2023-02-26T06:43:37Z-
dc.date.issued2022-
dc.identifier.citationYang, C., Tampubolon, H., Setyoko, A., Hua, K., Tanveer, M., & Wei, W. (2022). Secure and privacy-preserving human interaction recognition of pervasive healthcare monitoring. IEEE Transactions on Network Science and Engineering, , 1-17. doi:10.1109/TNSE.2022.3223281en_US
dc.identifier.issn2327-4697-
dc.identifier.otherEID(2-s2.0-85144072360)-
dc.identifier.urihttps://doi.org/10.1109/TNSE.2022.3223281-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/11311-
dc.description.abstractA cloud-based Artificial Intelligence (AI) service has recently empowered the Internet of Medical Things (IoMT) in many applications on the remote Human Interaction Recognition of Pervasive Healthcare Monitoring (HIR-PHM). In this work, a framework of the skeleton-based HIR-PHM under secure Edge-Fog-Cloud computing (EFCC) was proposed to manage the computation and storage resources, latency, cyber-attack, and privacy-preserving simultaneously. At the Edge, IoMT with a camera, record the human interaction as videos and sends them to the Fog, which installed a human pose estimation model, PoseNet, to convert the videos into human skeleton data. At the Cloud, a skeleton-based Spatial-Temporal Graph Convolution Network with Pairwise Adjacency Matrix (STGCN-PAM) was employed to recognize the human interaction. A Hybrid of One Time Password (OTP), Hashed Messages Authentication Code (HMAC), and symmetric cipher were employed to secure the skeleton data. The UT-Interaction dataset was used to evaluate the proposed framework. Besides, the computation performance and latency under EFCC were compared with Edge-Fog and Edge-Cloud deployments. Experimental results confirmed two major contributions: 1) the proposed framework has promising performance compared with other methods on the dataset. 2) The skeleton-based HIR-PHM with secure EFCC shows the advantages of better computation performance in terms of frame per second. IEEEen_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.sourceIEEE Transactions on Network Science and Engineeringen_US
dc.subjectDigital storageen_US
dc.subjectEdge computingen_US
dc.subjectFog computingen_US
dc.subjectHealth careen_US
dc.subjectMusculoskeletal systemen_US
dc.subjectNetwork securityen_US
dc.subjectPrivacy-preserving techniquesen_US
dc.subjectCloud-computingen_US
dc.subjectCommunication/networking and information technologyen_US
dc.subjectCommunications networkingen_US
dc.subjectEdge computingen_US
dc.subjectHealthcare monitoringen_US
dc.subjectHuman interaction recognitionen_US
dc.subjectPervasive healthcareen_US
dc.subjectPervasive healthcare monitoringen_US
dc.subjectPrivacy preservingen_US
dc.subjectSecurity and privacyen_US
dc.subjectAuthenticationen_US
dc.titleSecure and Privacy-Preserving Human Interaction Recognition of Pervasive Healthcare Monitoringen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Mathematics

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: