Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/11311
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tanveer, M. | en_US |
dc.date.accessioned | 2023-02-26T06:43:37Z | - |
dc.date.available | 2023-02-26T06:43:37Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Yang, C., Tampubolon, H., Setyoko, A., Hua, K., Tanveer, M., & Wei, W. (2022). Secure and privacy-preserving human interaction recognition of pervasive healthcare monitoring. IEEE Transactions on Network Science and Engineering, , 1-17. doi:10.1109/TNSE.2022.3223281 | en_US |
dc.identifier.issn | 2327-4697 | - |
dc.identifier.other | EID(2-s2.0-85144072360) | - |
dc.identifier.uri | https://doi.org/10.1109/TNSE.2022.3223281 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/11311 | - |
dc.description.abstract | A cloud-based Artificial Intelligence (AI) service has recently empowered the Internet of Medical Things (IoMT) in many applications on the remote Human Interaction Recognition of Pervasive Healthcare Monitoring (HIR-PHM). In this work, a framework of the skeleton-based HIR-PHM under secure Edge-Fog-Cloud computing (EFCC) was proposed to manage the computation and storage resources, latency, cyber-attack, and privacy-preserving simultaneously. At the Edge, IoMT with a camera, record the human interaction as videos and sends them to the Fog, which installed a human pose estimation model, PoseNet, to convert the videos into human skeleton data. At the Cloud, a skeleton-based Spatial-Temporal Graph Convolution Network with Pairwise Adjacency Matrix (STGCN-PAM) was employed to recognize the human interaction. A Hybrid of One Time Password (OTP), Hashed Messages Authentication Code (HMAC), and symmetric cipher were employed to secure the skeleton data. The UT-Interaction dataset was used to evaluate the proposed framework. Besides, the computation performance and latency under EFCC were compared with Edge-Fog and Edge-Cloud deployments. Experimental results confirmed two major contributions: 1) the proposed framework has promising performance compared with other methods on the dataset. 2) The skeleton-based HIR-PHM with secure EFCC shows the advantages of better computation performance in terms of frame per second. IEEE | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE Computer Society | en_US |
dc.source | IEEE Transactions on Network Science and Engineering | en_US |
dc.subject | Digital storage | en_US |
dc.subject | Edge computing | en_US |
dc.subject | Fog computing | en_US |
dc.subject | Health care | en_US |
dc.subject | Musculoskeletal system | en_US |
dc.subject | Network security | en_US |
dc.subject | Privacy-preserving techniques | en_US |
dc.subject | Cloud-computing | en_US |
dc.subject | Communication/networking and information technology | en_US |
dc.subject | Communications networking | en_US |
dc.subject | Edge computing | en_US |
dc.subject | Healthcare monitoring | en_US |
dc.subject | Human interaction recognition | en_US |
dc.subject | Pervasive healthcare | en_US |
dc.subject | Pervasive healthcare monitoring | en_US |
dc.subject | Privacy preserving | en_US |
dc.subject | Security and privacy | en_US |
dc.subject | Authentication | en_US |
dc.title | Secure and Privacy-Preserving Human Interaction Recognition of Pervasive Healthcare Monitoring | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Mathematics |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: