You are on page 1of 66

DDM: Taxonomy for a descriptive study of data

management techniques in cloud-based mobile health


information systems

FINAL DRAFT REPORT

1
ABSTRACT

Background and Aim:

In the research years, various healthcare related systems are proposed and implemented
towards monitoring and maintaining the healthcare data in the cloud environment. Yet, data
management techniques have not been deployed adequately due to the issue of large data and
data trafficking in the healthcare environment. The focus is to implement robust data
management techniques for maintaining large healthcare related data in the cloud
environment.

Methodology:

The detailed method comprises classification of numerous mobile cloud technologies and
data management techniques for managing healthcare related data. For that, Data acquisition,
Data management informatics, and Mobile health (DDM) taxonomy is proposed for
managing healthcare data in the mobile cloud environment. The components of DDM
taxonomy helps to comprehend the system accurately and introduced various major factors
used in the data management techniques used for manipulating the healthcare data in mobile
clouds.

Results:

The DDM taxonomy is deployed in the healthcare for managing the patient healthcare
management. Yet, its faces the limitation of accuracy of manipulating the data in the context
of healthcare but the proposed DDM taxonomy with the state of art model determined the use
of data management techniques through the cloud technology.

Conclusion:

The influence of the research is to evaluate the literature available on the data management
techniques that are implemented by mobile cloud technology. Further, the importance of
understanding DDM taxonomy has also been emphasized.

Keywords:

Mobile health application, Self-management, Data management, Usability, Telecare

2
TABLE OF CONTENTS
1. INTRODUCTION..................................................................................................................3

2. LITRATURE REVIEW.........................................................................................................3

2.1 Data acquisition techniques..............................................................................................3

2.2 Data management informatics..........................................................................................3

2.3 Medical healthcare data manipulation techniques............................................................3

3.1 Data acquisition................................................................................................................3

3.2 Data management informatics..........................................................................................3

3.3 Mobile health....................................................................................................................3

4. SYSTEM CLASSIFICATION...............................................................................................3

4.1 Data acquisition................................................................................................................3

4.2 Data management informatics..........................................................................................3

4.3 Mobile health....................................................................................................................3

4.4 System Components Validation and Evaluation..............................................................3

5. SYATEM VERIFICATION..................................................................................................3

5.1 System identification........................................................................................................3

5.2 Completeness....................................................................................................................3

6. DISCUSSION........................................................................................................................3

6.1 Component one – Data acquisition...................................................................................3

6.1.1 Sub-component – Sensing.........................................................................................3

6.2 Component two – Data management informatics............................................................3

6.2.2 Sub-component – Information system.......................................................................3

6.3 Component three – Mobile health....................................................................................3

6.3.3 Subclass – Healthcare surveillance............................................................................3

7. Conclusion..............................................................................................................................3

References..................................................................................................................................3
3
1. INTRODUCTION

In the research data management techniques are introduced towards improving the accuracy
and efficiency of medical data management (Batalla et al. 2017). The mobile cloud
technology is used for manipulating the high amount of medical data in medical sector (de
Albuquerque et al. 2018). The focus of the system is to identify that which data is need to
settled in the mobile cloud environment (Xia Sifah Smahi Amofa & Zhang. 2017). The
medical data management is aimed in the research which is done through the robust mobile
cloud technology by using data management techniques (Stamate et al. 2017). The major
components of the system are Data acquisition, Data management informatics, and Mobile
health (DDM) (Nadareishvili Mitra McLarty & Amundsen. 2016). These are the major
component of the research that using data management techniques in the context of mobile
cloud technology that is used for manipulating the health care related data (Kueppers et al.
2017).

In the way to determine the issues and problems of the research domain or the certain area of
research, the mobile cloud technology is used by the data management techniques of the large
amount of healthcare data of the patient or person (Olaronke & Oluwaseun. 2016). The
detailed technology is used in the domain of healthcare sector to analyse and evaluate
healthcare related data that is going to be manipulated to the mobile cloud for reducing the
chances of data congestion (Sodhro Li & Shah. 2017). The limitation and issue of mobile
cloud technology is that the healthcare data has not maintained within the mobile devices
(Sun et al. 2017). Hence, the detailed and introduced system is used for implementing the
DDM taxonomy in the way to deploy mobile cloud technology in the context of healthcare
sector (Chandwani. 2017). The healthcare data can be accurately and feasibly manipulated by
the mobile cloud environment (da Cruz Rodrigues Al-Muhtadi Korotaev & de Albuquerque.
2018). Further, the Data acquisition, Data management informatics, and Mobile health
components are underlined that are used for proper management of healthcare related data to
the mobile cloud technology which has reduced the time consumption and improve the
accuracy of medical data management (Han Chan Alpcan & Leckie. 2017).

The focus of this research is to analyse and evaluate the latest and current literatures and
papers available on the mobile technology and data management techniques that are used to
evaluate the medical data that are to be manipulated to the mobile cloud environment (Li et

4
al. 2017). Moreover, the classification of components is done that helps to analyse and
evaluate the solution in the context of research issues (Zapata Fernández-Alemán Toval &
Idri. 2018). The detailed system is more important in the medical and healthcare domain
because it provides accuracy of managing the healthcare data to the mobile cloud
environment (Elhoseny et al. 2018). It has been also identified that the introduced system is
more accurate and reliable than the previous section (Cimperman Brenčič & Trkman. 2016).

The limitation identified in the system was inaccurate data management due to data storage
issues but the proposed taxonomy system has eliminated the issues from the current solution
and improves the accuracy of healthcare data management (Lu Lee Chen & Hsiao. 2016).
The implementation of DDM taxonomy assists with the data manipulation for managing the
large amount of healthcare data to the mobile cloud environment (Mulwafu Ensink Kuper &
Fagan. 2017). Moreover, the data can be retrieved by the healthcare professionals as well as
by the patient with secure networking (Wilson Tucci Merson & O'Donoghue. 2017). It will
improve the feasibility and reliability on the mobile health, as the healthcare related data can
be easily manipulated and managed (Bhavnani Narula & Sengupta. 2016).

The work is divided into several sections in which Section 2 is describing the literature
reviews where all paper is defining the components that are used in the literature. In Section 3
best solutions is described that is also called as state of art solution which is describing the
system components. In next Section 4 which is defining the proposed model that is defining
the techniques and algorithms. In sub section different components are described for the
system. In Section 5 validation and evaluation is described that is defining about the research
project. In Section 6, verification is done for the techniques that are used in the research
project. In Section 7, project is discussed and Section 8, conclusions is done for the research.

Term: DDM taxonomy

“DDM taxonomy” used in data management technique for the information system which is
used in the cloud based systems. It is used for making the data efficient such as data mining,
data acquisition, data management, mobile health and many more. The project is based on
data acquisition, data management and mobile health in information system. The primary
component of system is data management, data collection and data authentication.

5
2. LITRATURE REVIEW
The GAP identified in the previous literature works was that the number of systems has used
limited data storage platform approaches for manipulating the healthcare data that leads to
high amount of healthcare data congestion with low accuracy in data management. Thus,
majority of journals found less accurate regarding to the healthcare data management.

The research has been aimed on the proposition of techniques and algorithms that has the
ability to be used for improving the healthcare data management through the mobile cloud
technology and data management techniques. Appropriate, tools and techniques are used that
can be used for improving the accuracy of healthcare data management. The literature review
section is sub-divided into three different sections that are based on various methods and
techniques such as data acquisition techniques, data management informatics, and medical
healthcare data manipulation techniques.

2.1 Data acquisition techniques

Push-pull-mooring framework used to improve the performance of data management system


and it has been noticed that the mobile personal cloud storage services are accurately
maintained (Feng Chang & Ming. 2017). Also, the effect of security risk (0.248) was much
greater than that of privacy risk (0.178). Yet, the limitation of cross-cultural investigations is
not accurately performed in the system (Cheng, Lee & Choi, 2018). Further, Kao et al.
(2018), introduced Android-based self-management application for adequate and regular
services and improving the interface and information quality as well as the overall efficiency.
Unified model language (UML) approach is proposed for capturing and communicating
requirements with the respective service providers with the accuracy of 97.56% (Sodhro
Chen Sekhari Ouzrout & Wu. 2018). Yet, the high cost required for the establishment of
proposed system but the unified model language approach helps to maintain the flow of data
communication (Do Sheng Liu & Zhang. 2017). Moreover, (Mehmood et al. 2018), presented
mHealthcare environment and DNA data hiding for improving the access control and
securing the data. Moreover, Machine learning algorithms proposed to understand the
machine language by this security has been improved (Zhang Mao Leng He & Zhang. 2017).
Also, the medical data can be manipulated and communicate within the secure gateway (Liu
et al. 2016). Nonetheless, the limitation found that the proposed system is less accurate and

6
reliable due to limited medical applications but improvement has been achieved through the
proposed solution. Pham Mengistu Do & Sheng. (2018), introduced Cloud-based Smart
Home Environment (CoSHE) in the way to improve the healthcare related services. As the
output of the proposed solution, it has been noticed that the healthcare (Hussein Burbano-
Fernandez Ramírez-González Abdulhay & De Albuquerque. 2018). This process performed a
bandpass filter (5– 15 Hz) but inaccurate data management and high energy consumption
remains limitation in the proposed solution (Ali Shrestha Soar & Wamba. 2018).

mHealthy lifestyle management (MLM) model implemented towards enhancing the


empowerment of mHealth and improving sustainability in the healthcare environment
(Elhoseny et al. 2018). As the output of the proposed solution, it has been noticed that the
sustainable healthcare system has been achieved (Carvalho Rocha Vasconcelos & Abreu.
2018). Although, the high power consumption remains major issue in the current solution but
mHealthy lifestyle management (MLM) model has improved the healthcare data management
(Faiola & Isola. 2018). Varatharajan Manogaran & Priyan. (2018), detailed Support Vector
Machines (SVM) based Linear Discriminant Analysis (LDA) for improving the healthcare
data acquisition in the medical domain. Support vector machine algorithm provides cross
verification thus it enhanced the security (Darwish Hassanien Elhoseny Sangaiah &
Muhammad. 2017). This process focused on the development of SVM algorithms for the big
data (Rodrigues et al. 2018). The pattern recognition has been performed by the support
vector machines (Kalid et al. 2018). Nonetheless, frequency synchronization found inaccurate
in the system but the proposed analysis method has improved the ECG signal processing
(García Tomás Parra & Lloret. 2018). Open Archive Information System (OAIS) healthcare
architecture is identified for improving the efficiency of managing the clinical documents
such as HL7 clinical document (Esposito De Santis Tortora Chang & Choo. 2017). The
proposed data management system has accurately managed the HL7 (Sendra Parra Lloret &
Tomás. 2018). All the clinical data within the medical environment the data has been
accurately managed in within the doctor but large amount of data has not been managed
accurately in the proposed solution (Celesti et al. 2018). Moreover, it is noticed that the risk
rate has reduced by 13.8%. Elhoseny et al. (2018), stated that Industry 4.0 (a big data
applications) used for enhancing the accuracy of health service applications using Industry
4.0 framework based on virtual machine selection.

Genetic numerous algorithms are used for building the Industry 4.0 model but the proposed
system is less accurate for managing healthcare data (Sodhro et al. 2018). Moreover, mHealth

7
architecture has aimed on managing the healthcare information using middleware (Faiola &
Holden. 2017). The proposed middleware techniques have accurately managed the
healthcare. It provide interface between the doctors and patients (Sodhro et al.2018). Yet, the
limitation of limited bandwidth has been identified in the research that caused inaccurate
healthcare data management (Kalid et al. 2018). Synchronisation algorithm further
implemented for managing the healthcare related data with high accuracy and low latency
(Moraes et al. 2018). Thus, results revealed that the latency in the system has been reduced.
Lomotey & Deter. (2018), also aimed on mHealth architecture for managing the healthcare
information using middleware. Middleware layer is a Software-as-a-Service (SaaS)
framework which is used as the message router for accurate healthcare data management (Lin
Li Huang Chen & Shen. 2018). Yet, the complexity in the system has identified that leads to
inaccurate data synchronisation but the proposed middleware techniques have accurately
managed the healthcare (Moraes et al. 2017). It provide interface between the doctors and
patients with the accuracy of 89.65%. Tao et al. (2019), presented light-weight field
programmable gate array (FPGA) hardware-based cipher algorithm and KATAN algorithm
for improving the security of healthcare data. The proposed cipher algorithm has been
improved the security of healthcare data sensed through the smart sensors and various smart
devices (Habeeb et al. 2018). Improved security and provide security from cyber-attacks by
the use of internet of use to healthcare data (Wang et al. 2017). Also, the results reveal that
the data security has been improved by 89.67% (Wang Ma Xhafa Zhang & Luo. 2017). Yet,
the limitation of inaccurate data transmission has been notified in the system but the security
of healthcare data acquisition is improved feasibly (Gong Xu & Zhao. 2018).

2.2 Data management informatics

Cerebral stroke detection solution is detailed in the way to manage the high volume of
healthcare data within the cloud-IoT health services (Hoque & Sorwar. 2017). The big
volume of health data is accurately managed and voice recognition through Android Mobile
Vision API and the Android API (Ma He Khan & Chen. 2018). Moreover, It is identified that
the application of Android API 27 (v8.0 Oreo) SDK and CloudSim package improved the
performance but the fitness functions are not calculated accurately (Wazid et al. 2018). In
addition, the results reveal that the rate of execution has achieved 50%. Kaur Alam Jameel
Mourya & Chang. (2018), detailed Knowledge Discovery in Databases (KDD) that helps to
avoid the issue of limited bandwidth while communicating the healthcare data. The medical
data is accurately communicated and digital record managed through Electronic health record

8
and Blockchain model (Lakshmanaprabu et al. 2018). Further, limited bandwidth and
inaccurate healthcare data communication has been identified but the updated data is
determined through blockchain-based cloud system (Mohd Hayajneh Yousef Khalaf &
Bhuiyan. 2018). The results reveal that the latency has reduced with the rate of ~6.8% than
the previous solution (Chen Qin Hao Li & Song. 2018) . Certificateless public key encryption
with keyword search (CLPEKS) scheme is implemented towards providing safety and
accuracy to the healthcare data management in the healthcare domain (Wen & Chang. 2017).
It has been identified that 82% of security improved after implementation of Public-key
encryption with keyword search (PEKS) (Yadava Kumar Saini Roy & Dogra. 2017).
Nonetheless, it is notified that privacy reduced due to insufficient data and complex structures
are identified (Luo et al. 2018). Moreover, it has been identified that the error rate while
transferring the healthcare related data. Sharma Chen and Sheth. (2018), further proposed that
k-Health (a personalized digital healthcare information system) for patient digital health
monitoring. Outsource computation is for privacy protection from untrusted cloud service
providers and restrict users outsourcing in untrusted SPs (Esposito Castiglione Tudorica &
Pop. 2017). Further, ASP provides privacy model quality and efficiency to identify data
assets but the limitation of proposed system is inaccurate analysis of various healthcare
symptoms and communication of data to the healthcare provider but the improvement in the
system has gained through Cryptographic services (Sharma Powers & Chen. 2016).

2.3 Medical healthcare data manipulation techniques

Mobile health (mHealth) application introduced for improving the security of mHealth
application that contains health care related information (Khan et al. 2016). The security
checks of remote servers are done and battery energy achieved accuracy of 89.7% through
Misuse detection (Gomes et al. 2017). Yet, the limitation of proposed solution is that the end-
to-end security has not identified nonetheless AppFence imposing privacy controls and
providing data shadowing mechanism (Hussain et al. 2018). Moreover, Artificial Neural
Network (ANN) module focused in the way to achieve high accuracy in the healthcare data
communication (Yang Chen & Xiang. 2018). Further, the output signals are calculated
through textile electrode that further helps to manipulate the healthcare data to the healthcare
professionals (Karaca Moonis Zhang & Gezgez. 2019). Moreover, through the MLP
algorithm stroke diagnosis is provided with the accuracy rate of 85.3% but inaccurate data
identification remains an issue in the system. Rahman Khalil & Yi. (2018), introduced
Deoxyribonucleic Acid (DNA) sequence hiding method towards improving the healthcare

9
data authenticity. Further, in the DNA data hiding the authenticity of medical data is
providing with the accuracy of 67.7% with low error rate (~0%) (Sodhro Luo Sangaiah &
Baik. 2019). Nonetheless, it is seen that the secrete data packets or messages are not extracted
accurately but extraction of secrete message from stego sequences is performed feasibly
(Chang. 2017). Fine-grained EHR access control scheme introduced improve the security of
healthcare data through mobile cloud computing (Liu Zhang Ling & Liu. 2018). Although,
attribute based encryption provides fine grained access control to the healthcare data with
accuracy of 56.98% but the access of user is remains a limitation in the process (Li Huang Li
Yu & Shu. 2019). Also, it has been identified that the authorised and unauthorised users are
accurately identified through the feasible encryption and decryption processes. Sodhro
Malokani Sodhro Muzammal & Zongwei. (2019), detailed Adaptive QoS computation
algorithm (AQCA) in the context of healthcare environment. The medical data transmission
power noticed -15 dBm with delay of 100 ms through the proposed algorithm but the
limitation of inaccurate optimisation and low system performance is achieved (Benhlima.
2018). Mobile data processing and intelligent healthcare applications are accurately
processed the medical data with duty cycle of 10% (Ren Shen Zheng Wang & Chao. 2016).

Mobile Digital Health (MDH) is detailed and defined in the context of healthcare data
management system and to provide secure and fast communication of data within the mobile
cloud environment (Kim & Kim. 2018). The service oriented computing (SOC) helps to
communicate the healthcare data more accurately (Karambakhsh Kamel Sheng Li Yang &
Feng. 2018). It provides security to the network that improves the security of healthcare data
as well (Zhang et al. 2017). Yet, it has been identified that gaze and gestures are not
accurately monitored but the medical related information is providing with precision
monitoring through multimodal sensing (Chang and Oyama. 2018). Yousuf Hussein
Swanepoel Mahomed & Biagio de Jager. (2018), focused on the smartphone-based hearing
screening for providing feasible health services. The healthcare data is adequately
communicated to the data communication system but it has been identified that the effects are
not indicated accurately (Stamate et al. 2018). Moreover, it is notified that the recorded noise
quality index and screen the performance is achieved high accuracy and worked under 0.5
kHz. Firdaus et al. (2018), focused on the Blockchain-based medical data management
(BMDM) for accurately manipulate the healthcare related data. Logitboost algorithm is used
for the attributes are evaluated on the basis of malware detection (Mengistu Pham Do &
Sheng. 2016). Implemented to fit the additive logistic regression model and calculated the

10
probability estimates with accuracy. Karlekar and Gomathi. (2017), stated that for improving
the security of healthcare data and communicating the data with accuracy Optimization-based
support vector machine (OW-SVM) approach is aimed in the context of smart health
environment. Further, Kronecker product-based bat algorithm is proposed towards privacy
preservation of healthcare data (Sodhro Pirbhulal & Sangaiah. 2018). Yet, the limitation
identified in the research is that the complex features are not monitored accurately (Karlekar
and Gomathi. 2017).

Figure 1: Infrastructure of data management techniques in cloud-based mobile health


information systems

In the data management techniques of the healthcare data of person with various techniques
are described in the mentioned question. Moreover, out of all the 30 journals papers, research
paper 3 of week 1 found most accurate and relevant to the healthcare data management
techniques that provides detailed information about the data management techniques in the

11
mobile cloud technology. The detailed journal includes mHealth data management diagram
towards managing healthcare parameters in mobile cloud environment. This emerging data
management technology used in the healthcare sector. Also, there are various components are
used in the system i.e. data management technique, cloud data storage.

Figure 2: State of the art

It has been identified that the previous publication found able to provide different data
management techniques used for managing the healthcare data but these solutions do not
contains the feasible approach that can define the adequate information about the healthcare
data management with high accuracy. Moreover, the existing study introduced accurate
results and it is useful for managing the healthcare data with efficiency.

12
Figure 3: Proposed solution

13
3. SYSTEM COMPONENTS

The section is introducing Data acquisition, Data management informatics, and Mobile health
(DDM) taxonomy that developed on the basis of mobile healthcare information management
through the data management techniques. In the same way, the DDM taxonomy is conducted
using Data acquisition, Data management informatics, and Mobile health that help to manage
the healthcare data. At last, verification, validation, and classification of the system are to be
undertaken.

While conducting the report, 120 researches are reviewed and used for addressing the issues
from the current research. Moreover, it has been notified that only 30 literatures were met the
requirements and standards of the research domain. In this research, the elaboration of
various data management techniques are done in the background of mobile health
information system because it would assist the system to manage cloud based healthcare data.

Furthermore, this report is introduced sophisticated data management techniques i.e. data
acquisition techniques. It has been identified that among 120 researchers, only 30 papers
have met the research domain requirements where other found less accurate and relevant.
Hence, remaining researches were dropped because they found not related to the research
domain. Also, the selected researches are accurate and reliable in the background of mobile
health data management in the clouds.

In the review based projects, detailed and thorough information and knowledge can be
gathered about mobile health data management which is helpful in improving the accuracy
and efficiency of mobile data management in cloud environment. In the way, to prepare
adequate research on the health data management, following parameters or facts are to be
considered –

 Provide the list of tools or techniques that can be used to manage the mobile health data
for maintaining the telecare environment?

 Provide the processes and methodologies that can be deployed to analyse the influence of
data management on cloud in the context of mobile healthcare?

 How the project area can be constructed to prepare an approach for smart and mobile
health data management for telecare environment?

14
Thus, the data management techniques based report is to be developed to provide secure and
effective data management of mobile health in the cloud environment. Also, major three
components of such as Data acquisition, Data management informatics, and Mobile health
are to be considered in the research.

The initial component in the proposed DDM taxonomy is Data acquisition which analysed
the health related vital data that going to be stored in the cloud or stored. Moreover, the data
acquisitions used for sampling the signals that contains real world physical conditions and
further simplify them by converting the signals into digital numeric values. The simplified
signals can be further manipulated by the computer system. In addition, Data management
informatics is the second component of proposed DDM taxonomy. The second components
help to manage the healthcare data by using robust healthcare monitoring techniques. Vital
healthcare parameters are collected through the data management or informatics. Finally, the
last component of taxonomy isMobile health where the health data is retrieved by the patient
or healthcare provider to manage the health or improve it by the required measurements.
Also, through the mobile health, various healthcare parameters can be measured and
communicated to the respected healthcare providers to get the diagnosis or prescription.

Further, these feasible components of DDM taxonomy are provided in Table 1 along with the
respective sub-classes and instances or examples for the same class or sub-class.

Table 1: DDM Taxonomy Classification Table

Factor/Class Main Attributes Common Instances


Data acquisition Input Textile electrodes, ECG signals,
sound signals
Wearable sensors Monitoring Acoustic sensors, throat microphones,
Electrocardiographic signals
Sensing Sensors Analyse, monitoring, tracking, signal
processing
Data management Process Human computer interaction, Block
informatics chain, push-pool mooring
Data management services Middleware Message routers, PaaS and SaaS,
healthcare data
Information system Cloud technologies Synchronisation algorithms,
encryption, open archive information
system (OAIS)
Mobile health Healthcare information Vital healthcare parameters, regular

15
system health monitoring, sensors
Classification Data processing Support Vector Machine, Mean
Square Error, Linear Discriminant
Analysis
Integrated Applications Self-management Telecare system, data integrity, cloud,
confidentiality, privacy
Healthcare surveillance Setting Hardware, software, wearable
sensors, mobile health

Figure 4: The above figure shows the three factors of data management taxonomy (i.e.
Data acquisition, Data management informatics, Mobile health)

Figure Analysis: In Figure 4, introduced components and sub-components of DDM


taxonomy is provided. The main components are data acquisition, data management
informatics, mobile health. Further, the DDM taxonomy stated the existing scenario between
components and sub-components along with its interconnection.

The outstanding section of the research is aimed on the verification, classification, and
evaluation of the proposed DDM taxonomy that executes with its components and sub-
components that delivers evaluation, processing and verification of the system. In the Figure
4, detailed information about components and sub-components is provided.

16
3.1 Data acquisition

In the data acquisition, two main sub-classes are fall that helps to accurately convert the
sampling signals that helps to monitor real world physical conditions. These signals are
further converted into digital numeric values by using data acquisition process.

The Wearable sensors works on monitoring various healthcare parameters. Moreover,


Acoustic sensors, throat microphones, Electrocardiographic signals are used as feasible
wearable sensing. Also, it provides precise sensing rate of vital healthcare parameters.

Second-sub class of data acquisition is Sensing. Once the data sensed from the body, the
signals are processed to the readable digital numeric values. Also, Acoustic sensors, throat
microphones, Electrocardiographic signals are used for transferring the healthcare data in
readable format.

Figure 5: Main attributes and instances of Data acquisition

3.2 Data management informatics

In the research, second factor is data management informatics which helps to manage the data
transferred from the data acquisition process. For data management, human computer
interaction and Blockchain-based data management is processed.

17
Involving the Data management services as the helping process for data informatics. It
includes Platform as a Service, Software as a Service, and message routers for feasible data
management.

In the information system all the gathered healthcare data is managed through the
Synchronisation algorithms, encryption, open archive information system (OAIS). The
healthcare data is synchronised and encrypted which helps to manage the healthcare data
security.

Figure 6: Data management Informatics and its classes

3.3 Mobile health


In the mobile health, the vital healthcare parameters are monitored and communicated
towards managing the health of the person living in the telecare environment. In this class,
three sub-classes are entertained.

Fist sub-class is classification where the data classification is done through the robust
support vector machine- based classifiers. The data is accurately classified in this section.
Further, integrated applications are used to manipulate the healthcare data which is
managed in the cloud environment. The common instances includes in the integrated
application are Telecare system, data integrity, cloud, confidentiality, privacy. These
instances are undertaken for healthcare data manipulation.

18
Third sub-classification of mobile health is healthcare surveillance. Here, the healthcare is
provided to the respective user in the telecare domain. Various hardware and software is used
for providing healthcare surveillance to the patient.

Figure 7: Mobile health and its sub-classes

 Data acquisition

The aim of considering the data acquisition as the part of healthcare data management is to
get the data managed accurately through the wearable sensors and sensing. The sensors are
sensed the data and communicate the sensed data to the respective healthcare provider or
patient.

 Data management informatics

The data management or informatics is the main aim of the research. This is because the
mobile health data found vulnerable to the security threats and lack of data communication.
Moreover, the sub-classes associated with the data management informatics are data
management services and information system.

 Mobile health

19
The mobile health is associated to the tele-health system where the healthcare of the person is
managed through the feasible data sensing and management to the clouds. The data can be
further manipulated accordingly. There are three major sub-classes of mobile health i.e.
classification of data, integrated applications, and health surveillance.

4. SYSTEM CLASSIFICATION

Initially, 130 results have been reviewed, and out of which 30 results have been carried out
because these results were met the requirement of research domain and found accurate and
effective in the context of research domain. Further, in the way to achieving more precise,
validated, and established information about the research domain, the journals those are
published in the year of 2018 to 2019 were majorly considered. Moreover, for maintaining
the quality of the research, the quality criteria have been focused i.e. Q1 and Q2.
Subsequently, the journals that were met the quality criteria of Q1 and Q2 were selected for
review purpose. Once, the quality and validation of journals have been done, the journals
selected on the basis of gesture and posture recognition techniques that were worked on the
smart sensor technology.

Overall, 30 publications have been finalised and reviewed. The selected papers are
presented in Table 2 with the help of proposed taxonomy. The selected journals have been
peer-reviewed and presented in various tables in tabular format. These tables are providing
verification, analysis, and classification of various selected journals.

20
In Table 2, all 30 journals are evaluated and classified in the basis of various parameters in the context of research domain. The parameter that
used for evaluating all the journals is data acquisition, data management informatics, mobile health. Further, sub-parameters are used for
evaluating journals with more detail and precision.

Table 2: Classification of Research work according to three factors of DDM management taxonomy

TABLE-2

S. Author Data Level of


No Name management Journal Data acquisition Data management informatics Mobile health

. techniques
Wearable Sensing Data Information Classification Integrated Healthcare
Sensors management System Applications Surveillance
services

1 Cheng Lee & Push-pull-mooring Q1 Acoustic Motion sensing Mobile personal Partial Least Voluntary Mobile Cloud Software
Choi. (2018) framework sensors cloud storage Squares (PLSs) switching
services intention

2 Kao et al. Android-based Q1 Acoustic Sound signal Mobile health Unified model Robust Domain Cloud-based Android OS
(2018) self-management sensors application language Analysis (DA) Tele-care
application (UML)

3 Mehmood et mHealthcare and Q1 Medical Signal Mobile cloud- Machine Comparative DNA Endoscopy
al. (2018) DNA data hiding sensors processing assisted paradigms learning analysis Steganography video analysis
algorithms

4 Pham et al. Cloud-based Smart Q1 Throat Sound signal Pioneer P3-DX and Hokuyo URG- Support Vector Data mining Wearable
(2018) Home Pan Tompkins Machine

21
Environment microphone algorithm 04LX-UG01 algorithm and cloud sensors

5 Faiola & mHealthy lifestyle Q1 Electrocardiogr Signal Patient portal Cognitive Linear Mhealth and SEIPS 2.0
Isola. (2018) management aphic signals processing technique systems Discriminant cloud
(MLM) engineering Analysis

6 Varatharajan Big data Q2 Kernel sensor Signal Multimedia Image Two-dimensinal Support Vector MapReduce Android OS
Manogaran & classification processing Pre-processing filter Machine and cloud
Priyan. approach computing
(2018)

7 Celesti et al. Open Archive Q1 Acoustic Data analyses MySQL-Database Cloud based- Mean Square Telecare HL7 v3 SIP
(2018) Information sensors management Hospital Error system
System System Information
Systems

8 Elhoseny et Industry 4.0big Q1 Industry 4.0. Data analyses Industry 4.0 big data Particle swarm pbest and gbest Data integrity First come
al. (2018) data applications Sensors application optimizer (PSO) first served
(FCFS)

9 Lomotey& Cloud-hosted Q1 Electrocardiogr Signal mHealth Middleware Timestamp and mhealth and Wireless
Deter. (2018) middleware mobile aphic signals processing architecture and layer E-tag and hybrid cloud bandwidth
architecture Software-as-a- clock
Service

10 Tao et al. Light-weight field Q1 IoT Networked Data sensing Hardware-based Lightweight KATAN cipher SecureData Slepian–Wolf
(2019) programmable gate Sensor cipher algorithm ciphers and Secret coding and
array (FPGA) cipher share Hardware
platform

11 Garcia et al. Cerebral stroke Q1 Textile Data sensing Cerebral stroke Feature Cerebral strokes Android Android API

22
(2018) detecting mobile electrodes detection app detection detection Mobile Vision 27 (v8.0
application system API and Oreo)SDK
Android API and CloudSim

12 Kaur et al. Blockchain-based Q2 Acoustic Data analyses Concept of Blocks Blockchain- Cloud based Mobile health
(2018) platform sensors cryptography connection based cloud Protocol
system management
system

13 Chen et al. SDN-based mobile Q1 IoT Networked Data sensing Software defined Data cognitive Greedy caching Small-cell Software
(2018) network Sensor networking engines strategy cloud and a platform
architecture macrocell
cloud t

14 Tao et al. Certificateless Q2 Kernel sensor Signal Cloud computing Hardware based Public-key Certificateless Software
(2019) public key processing based-mobile Secret ciphers encryption with public key platform
encryption with healthcare system keyword search encryption and
keyword search (MHS) (PEKS) cloud
(CLPEKS) scheme

15 Sharma Chen Toward practical Q2 Electrocardiogr Signal Cloud-Based Cryptographic Linear kHealth Mobile health
and Sheth. privacy-preserving aphic signals processing Healthcare Systems service provider Discriminant
(2018) analytics system Analysis

16 Hussain et al. Mobile health Q1 IoT Networked Data sensing mHealth apps Near Field Support Vector SD Card Android
(2018) applications on Sensor Communication Machine Storage Platform
android platform (NFC) and
Bluetooth

17 Karaca et al. Artificial Neural Q1 Textile Signal Random binary Multilayer Linear cloud system Virtual
(2019) Network (ANN) electrodes processing sequences Perceptron Discriminant Dedicated

23
module generation schemes (MLP) Analysis Server (VDS)
algorithm

18 Rahman Deoxyribonucleic Q1 Electrocardiogr Signal Lossless DNA data DNA sequence DNA Mobile cloud JAVA
Khalil and Acid (DNA) aphic signals processing hiding authentication steganography Standard
Yi. (2019) sequence hiding Edition (JSE)
method

19 Liu et al. Fine-grained EHR Q1 IoT Networked Data sensing Online/offline Cyphertext Hash sign Mobile cloud Mobile health
(2018) access control Sensor signature scheme policy switch paradigm
scheme and online and Attribute-based
offline cipher text encryption
system

20 Sodhro et al. Adaptive QoS Q1 Adaptive Data analyses Fog computing- QoS-QoE Support Vector Medium access Wearable
(2019) computation Sensor based adaptive correlation Machine control (MAC) sensors and
algorithm (AQCA) power control and mobile health
QoS management

21 Chang and Guest editorial: a Q1 IoT Networked Data sensing Mobile Degital Services Linear Data control Android
Oyama. roadmap for Sensor Health (MDH) Oriented Discriminant gateway Platform
(2018) mobile and cloud Computing Analysis
services (SOC),SaaS and
PasS

22 Yousuf Smartphone-based Q1 Adaptive Data analyses HearScreenTMapplic mHealth Binomial Maximum SPSS v24 and
Hussein et al. hearing screening Sensor ation service-delivery logistic permissible Mobile health
(2018) scheme model regression ambient noise
analysis levels based
application

24
23 Kao et al. Mobile health Q1 Adaptive Data analyses Android Operating Real Home box and Mobile cloud Mobile
(2018) application Sensor System smartphone Information Telecare service software
System (IS) model

24 Firdaus et al. Blockchain-based Q2 Kernel sensor Signal Blockchain-based Root exploit Static analysis K-means Android
(2018) medical data processing medical data detection and machine clustering debug bridge
management management system (RODS) learning algorithm (ADB)
(BMDM) and Logitboost
algorithms

25 Karlekar and Optimization- Q2 Adaptive Data analyses Kronecker product- Optimization‐ Support Vector Meta-heuristic Android
Gomathi. based support Sensor based bat algorithm based support Machine and algorithm Platform
(2018) vector machine vector machine Mean Squared
approach (OW- Error
SVM)

26 Sodhro et al. Internet of Medical Q1 IoT Networked Data sensing Product lifecycle Joint energy Duty cycle Heterogeneous Mobile health
(2018) Things (IoMT) or Sensor management harvesting and optimizer and platform of 5G,
Medical Internet of duty-cycle Decision IoT, Cloud-
Things (MIoT) optimization making strategy computing

27 Stamate et al. Android Platform Q1 Adaptive Data analyses CloudUPDRS app Synchronisation Recurrent Mobile cloud Android
(2018) Sensor algorithms convolutional Platform and
neural network software

28 Benhlima. Big data Q2 IoT Networked Data sensing Big data Stream Mean Squared mhealth and Mobile health
(2018) architecture Sensor management computing and Error cloud
technique framework batch
computing

25
29 Li et al. EdgeCare: Q1 Kernel sensor Signal EdgeCare approach Stackelberg Optimisation Attribute based Wearable
(2019) Leveraging Edge processing Game based algorithm encryption sensors and
Computing for optimization mobile health
Collabration Data algorithm
Management

30 Espasito et al. Mobile-based Self- Q1 Adaptive Data analyses Telecare service Breach Telecare service Flexible access Android
(2017) management Sensor model notification model control software
Application process

26
In Table 3, classification of research is made on the data management informatics and various components through numerous data management
techniques. The apparatus, usage, type of data, data processing, and operating language and programme are evaluated in the blow table. Also, the
expected beneficial outcomes are provided.

Table 3: Classification of Research on the Data management informatics Component through data management techniques

TABLE-3
Author Method Used Apparatus Usage Type of Data Processing Operating Beneficial
Name Data Programmes and Outcomes
language
Data Data
collection analysis
Hussain et al. Mobile health  Android Improve the Medical data Medical Partial Least Linux operating system The conceptual
(2018) (mHealth)  Medical data security of Imaging Data Squares (PLSs) (Ubuntu 14.04) framework has been
application mHealth app used and improved
the security by
6.98%.

Karaca et al. Artificial Neural  Mobile Cloud Highly accurate Medical data Genetic Data Multilayer Cryptogenic stroke The stroke diagnosis
(2019) Network (ANN) System while providing perception is provided with the
module  Virtual the assistance to algorithm accuracy rate of
Dedicated the stroke 85.3%.
Server
patients

Rahman Khalil Deoxyribonucleic  Mobile cloud Improving the Patient data Genetic Data DNA data DNA The authenticity of
and Yi. (2019) Acid (DNA)  Steganography healthcare data hiding and Steganographyand medical data is
sequence hiding providing with the

27
method authenticity Steganography JAVA Standard Edition accuracy of 67.7%.

Liu et al. Fine-grained EHR  Mobile cloud Improving the Digital Electronic Offline/Online Cyphertext policy It provides fine
(2018) access control computing security of medical data Health Record encryption grained access
scheme  E-Healthcare healthcare (EHR) algorithm control to the
records records healthcare data with
accuracy of 56.98%.

Sodhro et al. Adaptive QoS  Network layers Efficient Patient data Medical QoS QoS-QoE correlation The transmission
(2019) computation  Sensors monitoring of Imaging Data computation power noticed -15
algorithm various mechanism dBm with delay of
(AQCA) performance 100 ms.
indicators

Chang and Mobile Digital  Mobile digital Secure and fast Digital Electronic Multi-channels Software as a Service It provided data and
Oyama. (2018) Health (MDH) health communication medical data Health Record and multimodal and Platform as a control gateway that
 Cloud of healthcare sensing Service managed the vital
computing data data with accuracy of
98.7%.

Yousuf Maximum  Smartphone Accurately DigitalPatientl Healthcare data Binomial SPSS v24 Extracted the cloud
Hussein et al. permissible  Mobile health identified the data Surveillance logistic server based data to
(2018) ambient noise app effects of noise regression the excel sheet and
levels (MPANLs) on the ears of analysis analysed with the
based application elderly range of p < 0.05.

Kao et al. Mobile health  Mobile software Improving the Medical data Unstructured Real Blood pressure gauge Feasible health data
(2018) applications  Biomedical tele-health care Data Information communication has
indicators and sensing System (IS) been achieved with
vital signs the latency rate of

28
>1%.

Firdaus et al. Blockchain-based  Practical swarm For malware Patient data Medical K-means Androidmanifest.xml The Logitboost
(2018) medical data optimization free medical Imaging Data clustering achieved accuracy of
(PSO)
management data and Log File algorithm 90%
(BMDM)  Android debug management
bridge

Karlekar and Optimization-  Cloud Improving the Medical data Log File and Kronecker Ontology and whale The proposed
Gomathi. based support computing privacy of digital data product-based optimization solution performed
(2018) vector machine  Ontology medical data in bat algorithm with the accuracy of
approach cloud 83.21%.

Sodhro et al. Joint energy  Internet of Improve the Patient data Unstructured Product Ontology-based The Meta-heuristic
(2018) harvesting and medical things communication Data and Text Lifecycle programmes algorithmperformanc
duty-cycle  Mobile apps process and Data Management e is improved
optimization transfer (PLM) based accuracy of 88.1%,
(JEDHO) information global approach
algorithm from one
person to
another

Stamate et al. CloudUPDRS app  Nervous system It provides care Patientmedical Unstructured Recurrent JAVA Standard Edition Achieved
(2018)  Controls techniques to data Data convolutional Performance by RNN
learning the patient with neural network Classifier such as
video or audios. accuracy 0.78, F1-
score of 0.82 and
AUC of 0.87.

Benhlima. Big data technique  Mobile apps For Medical data Log File and Big data Stream computing and The accuracy of
(2018) improvement of digital data management batch computing handling data is 90%.

29
 Cloud computing health care technique
services

Li et al. (2019) EdgeCare:  Internet of Improve the Patientmedical Unstructured Optimisation Stackelberg Game The healthcare data is
Leveraging Edge Things security of data medical Data algorithm protected with the
Computing  Edge computing healthcare data rate of 16% from the
current solution.

Espasito et al. Microservices  Clouds It reduces the Digital Electronic Cloud-based Breach notification Microscopic
(2017) approach  Flexible access chances of medical data Health Record data process approach that
control healthcare data management improved the
loss. healthcare data
access control with
the improvement of
16%.

30
In Table 4, various parameters are evaluated and classified on the basis of healthcare tools, various generic algorithm, and vulnerabilities of the
system that can be seen. Further, the table is making classification of research on the basis of various healthcare parameters and data
management techniques.

Table 4: Classification of Research on the various healthcare parameters and data management

TABLE-4
Author Health Specific Tools Domain Efficient Parameters Health Vulnerabilities Statistical
Name & application (Level Generic system analysis
year frameworks which algorithm Accuracy Falling attributes
will Precisions criteria
benefit)
Cheng Lee Push-pull-  Mobile cloud Individual Partial least Voluntary Voltage Sustainability Cross-cultural The effect of
& Choi. mooring squares (PLS) switching regulator is and resilience investigations are habit (−0.139)
 Voluntary switching
(2018) framework Algorithm intention required not accurately was slightly
intention performed stronger than
that of
switching costs
(−0.130).

Kao et al. Android-based  Mobile health Self Unified model Chronic Care Time- Efficiency and Generalization of The effect of
(2018) self- application mangement language Model consuming quality data is difficult security risk
management (UML) processes (0.248) was
 Smartphone
application approach much greater
than that of
privacy risk
(0.178).

Mehmood et mHealthcare and  Mobile cloud Health-care Machine DNA Low accuracy Equity and High time Real-time
al. (2018) DNA data organizatio learning steganograph Accountabilit consumption healthcare data

31
hiding  Cloud computing n algorithms y algorithm y management
has been
achieved an
accuracy of
86.7%.

Pham et al. Cloud-based  Internet of things Health Gradient Support High energy Sustainability Inaccurate data Support vector
(2018) Smart Home system Boosting vector consumption and resilience management machine
 Acoustic sensors
Environment decision tree machine algorithm
algorithm algorithm achieved
accuracy of
89.12%.

Faiola & mHealthy  Motivational Health Cognitive Patient portal Low level Equity and High complexity in Patient portal
Isola. (2018) lifestyle interviewing service systems technique performance of Accountabilit the system technique
management provider engineering software y provides 94%
 Patient portal
(MLM) (CSE) accuracy.

Varatharaja Big data  Electrocardiographi Health Support Vector Linear Low resolution Sustainability Frequency The support
n classification c (ECG) signals service Machine Discriminant and resilience synchronization in vector
Manogaran approach provider (SVM) Analysis inaccurate machines
 Linear Discriminant
& Priyan. algorithm (LDA) accuracy
Analysis (LDA)
(2018) achieved
89.76%.

Celesti et al. Open Archive  Cloud computing Health-care Cloud-based NoSQL Complexity in Sustainability The high data has The risk rate
(2018) Information organizatio Open Archive column- data and resilience not been managed has reduced to
System  MySQL clinical n Information oriented Data management 13.8%.
documents System Base
Management

Elhoseny et Industry 4.0big  Big data Industry Health Particle swarm Parallel The sub- Efficiency and Less accurate for Particle swarm
al. (2018) data applications 4.0 system optimizer Particle swarms are not quality managing healthcare optimizer
(PSO) swarm identified data provides
 Cloud computing
optimization 89.14%

32
algorithm (PPSO) accurately. accuracy.

Lomotey & Cloud-hosted  Mobile devices Health-care Synchronisatio Middleware Synchronizatio Equity and Limited bandwidth Synchronisatio
Deter. middleware organizatio n algorithm technique n of data is Accountabilit n algorithm
 Middleware
(2018) mobile n required y achieved
architecture accuracy of
89.12%.

Tao et al. Light-weight  IoT network Health Hardware- Secret cipher Low data Equity and Inaccurate The results
(2019) field system based cipher share privacy Accountabilit identification of reveal that the
programmable  Sensors algorithm algorithm y cipher sizes data security
gate array has been
(FPGA) improved by
89.67%.

García et al. Cerebral stroke  Cloud Health CloudSim and Android Limited Sustainability The fitness Accuracy of
(2018) detecting mobile service Cerebral stroke Mobile processors and resilience functions are not data
 Mobile application
application provider detection Vision API calculated management
accurately 71.59% has
been achieved.

Kaur et al. Blockchain-  Wi-fi Individual Concept of Knowledge Inaccurate data Efficiency and Limited bandwidth The risk rate
(2018) based platform cryptography Discovery in communication quality has reduced to
 mHealth Databases 14.5%.
(KDD)

Chen et al. SDN-based  5G networks Health Augmented Resource Inaccurate Efficiency and Limited hardware Accuracy of
(2018) mobile network system reality gaming cognitive server quality resources data privacy
 Communication
architecture engine allocation 98.7% has been
network achieved.

Tao et al. Certificateless  IoT network Health Certificateless Public-key Complex Sustainability Process is cost The accuracy of
(2019) public key service public key encryption structure of and resilience effective handling data
encryption with  Mobile device provider encryption with keyword cloud platform management is
keyword search  IoT sensor system search 87.60%.

33
(CLPEKS) (PEKS)
scheme schemes

Sharma Toward practical  Electronic health Health Cryptographic Public-cloud External Efficiency and Inefficient to It improved the
Chen and privacy- records system service infrastructures hacking and quality analyse symptoms security by
Sheth. preserving provider attacks are 5.98%
 Internet of things
(2018) analytics system activated
Sensor

 Health readers

34
Table 5, Is presenting the classification of cloud-based mobile healthcare information system on the basis of various journals that have been
selected in the making of this research. Moreover, parameters such as positive key attributes, justification criteria and privacy assessment of
healthcare data is aimed in the below described table.

Table 5: Classification of Research on the Cloud-based mobile health information systems

TABLE-5

Author Cloud-based Research Aim Positive key Cloud Justification Criteria Privacy Effective Output
data attributes Platform Assessment
management
method
Dependent Independent

(Varatharajan Big data Latency reduction  Linear Web services Two- Image feature  2D filter The use of MapReduce has improved
Discriminan
Manogaran & classification in distributed t Analysis dimensinal extraction method  Support
Priyan. 2018) approach mobile network  Support filter Vector
Vector
Machine the SVMs
Machine

(Celesti et al. Open Archive Group  Database Mobile cloud Virtualization SQL technologies  NoSQL The cloud storage is used as NoSQL.
2018) Information collaboration and managemen PaaS approaches The risk rate has reduced to 13.8%.
System data t System  Cloud storage
synchronization in  MySQL
mobile networks

(Elhoseny et Industry 4.0big Different mobile  Particle Web services Virtual Modified PSO  Industry 4.0 The acceleration parameters and
swarm
al. 2018) data applications data transmission optimizer machines algorithm apps random variables are measured.

35
(PSO) placement  Support
 Parallel
Vector
Particle
swarm Machine
optimizatio
n

(Lomotey & mHealth Managing the  Middleware Mobile cloud Global time Middleware’s  Synchronisati The medical terms are accurately
on algorithm
Deter. 2018) architecture healthcare layer clock managed through the two-space
 Software-as-
information using  Two-space Bernoulli models.
a-Service
middleware. Bemouilli
models

(Tao et al. Light-weight Offline data  KATAN Google Slepian–Wolf Secret cipher  Secret cipher To prevent from cipher attacks and
share
2019) field accessibility algorithm cloud coding sharing algorithm algorithm secure data transmission by:
programmable  Fog  Hardware-
computing based cipher
gate array
algorithm
framework

(Garcia et al. Cerebral stroke Manage the high  Particle Mobile cloud Smile Cerebral strokes  Cerebral The big data is efficiently managed.
detection
2018) solution volume of swarm Detection detection stroke The results reveal that the rate of
healthcare data optimizer detecting execution has achieved 50%.

 Android mobile

API 27 application

 CloudSim

(Kaur et al. Blockchain- Mobile peer-to-  Electronic Web services Digital Peer-to-peer  Concept of The medical data is identified
2018) based peer health healthcare data networking cryptography through:
architecture, communication record auditable  Blocks
Electronic health  Mobile transaction connection
record computing model

36
(Chen et al. Resource Wireless  5G Google Content Augmented  Support The proposed solution has accurately
cognitive engine
2018) bandwidth networks cloud delivery reality gaming Vector reduced the latency in the 5G
framework
management and  Cognitive Machine networks.
reducing the intelligence  Data
latency in the cognitive
system. engines

(Tao et al. Public-key Wireless  Certificatele Microsoft Light-weight KATAN ciphers  Hardware Provides privacy sensitive data of
based secret
2019) encryption with bandwidth ss public Azure FPGA ciphers patients-
keyword search management key hardware
 KATAN
scheme encryption
ciphers
 Public-key
encryption
(Sharma Chen k-health digital Mobile data  K-health Mobile cloud Cryptographic Public-cloud  Cryptographi k-health digital health monitoring
and Sheth. health security and Service infrastructures c service system based on cloud network to
 Analytical
2018) monitoring trustworthiness provider provider for identifying disease in healthcare.
models
system  Public-cloud
infrastructure
s
(Hussain et al. Mobile health Ensuring data  Misuse Google Rule based Kirin security  Cloud based The security checks of remote
2018) (mHealth) consistency and detection cloud system detection servers are done and battery energy
application conflict resolution  Android  AppFence achieved accuracy of 89.7%.

security
model
(Karaca et al. Multilayer Mobile data  Application Web services Fog computing Textile electrodes  Artificial The accuracy rate of 88.4% has been
2019) perceptron security and of ANN neural achieved through the ANN
algorithm (MLP) trustworthiness module networks algorithm.

37
 Fog algorithm
computing  Multilayer
Perceptron
(Rahman Deoxyribonuclei For improving the  2D matrix Mobile cloud DNA DNA sequence  DNA The authenticity of medical data is
Khalil & Yi. c Acid (DNA) healthcare data representati steganography authentication steganograph providing with the accuracy of
2018) sequence hiding authenticity on y 67.7%.
method  Stego  DNA data
sequences hiding
(Liu et al. Fine-grained Improving the  Hash sign Web services Ciphertext data Encryption  Attribute- It provides fine grained access
2018) EHR access security of switch mechanism based control to the healthcare data with
control scheme healthcare paradigm encryption accuracy of 56.98%.
records.  Online/offli  Online/offline
ne encryption
encryption

(Sodhro et al. Adaptive QoS For efficient  Energy Google Radio resource QoE assessment  Support The QoS is identified through the:
2019) computation monitoring of saving cloud management Vector
algorithm various mechanism Machine
performance  Quality of  Quality of
indicators. Service Services
assessment assessment

38
4.1 Data acquisition
In the research, various papers are aimed on the implementation of wearable sensors. On the
other hand, various researchers are focused on the sensing in the context of data acquisition.
The wearable sensors based data found as the major type of data that is used in the research
as is focused on the healthcare data management techniques. In this way Cheng Lee & Choi.
(2018) stated that Aucostic sensors are important towards collection information about the
elderly peron in the smart home envirionment. Medical sensors are also proposed for tracking
and sensing various healthcare parameters Mehmood et al. (2018). Also, Garcia et al. (2018)
introduced that the textile electrodes can be used for sensing vital healthcare parameters. The
textile electrodes helps to identify useful information through the cloth mounted sensors.

4.2 Data management informatics


The management informatics is used for managing healthcare data and storing in the
information system. The data management informatics are sub-classified into two different
sub-classes i.e. data management services, information system. Towards that, mobile health
applications can be used for managing healthcare data with accuracy and security. The
healthcare data is first managed and then stored in the information system Kao et al. (2018).
Pioneer P3-DX and Pan Tompkins algorithm are used for providing feasible healthcare
information system. Further, mHealth service-delivery model and Cognitive systems
engineering are used for healthcare data management in the healthcare environment Faiola &
Isola. (2018) and Yousuf Hussein et al. (2018).

4.3 Mobile health


After sensing and managing the healthcare information, the mobile health systems are
communication and manage the healthcare data within the healthcare environment.
Moreover, the mobile health component is sub-classified into three different sub-components
i.e. classification, integrated applications, and healthcare surveillance. Towards that, mobile
operating systems are used for manipulating healthcare data within the mobile to mobile Kao
et al. (2018).

39
4.4 System Components Validation and Evaluation

While determining various factors that are related and relevant to the data mining techniques,
the various components are also evaluated and validated that helps to improve the system. It
is important to validate and evaluate the components if they are adding value to the system.
Moreover, the used publications in the research are using different type of validation and
evaluating model. In the other words, various literatures and papers are focused on the
management of healthcare related data in the context of medical domain. Also, it has been
identified that the data management is crucial and tough to manipulate due to data storage.
Therefore, adequate methods need to be used for data management in the mobile cloud
environment.

Table 6: Validation and Evaluation of data management techniques

References Study Healthcar Component Validation and Results


Criteria e Context validated Evaluation Criteria
or
evaluated Input Output

Cheng Lee & Mobile Mobile Performance Push-pull- Cloud storage The effect of
Choi. (2018) health personal of data mooring services are security risk
informatio cloud storage management network accurately (0.248) was much
n services maintained greater than that
manageme of privacy risk
nt (0.178).

Kao et al. Mobile Android- Interface and Unified model Maintain the It has been noticed
(2018) healthcare based self- information language flow of data that the telecare
data management quality (UML) communicatio system has
manageme application approach n improved 80%.
nt

Mehmood et mHealthca DNA Medical DNA Deoxyribonucl The security of


al. (2018) re steganograph Quality of steganography eic acid used data has been
y Services algorithm for determine improved 75.8%.
and
the genetics
Anomaly
and gens.
detection

Pham et al. Cloud- Cloud Accurate data Smart garment Performed a Achieved
(2018) based infrastructure processing and used Pan band pass accuracy of
Smart data storage Tompkins filter (5– 15 89.12% using 6-
Home algorithm Hz). fold cross
Environme validation.
nt

Faiola & mHealthy Sustainable Performance SEIPS 2.0 Improved the Patient portal
Isola. (2018) lifestyle healthcare sustainability sustainability technique
manageme provides 94%

40
nt of living accuracy.

Varatharajan Multimedi Electrocardio Principal Linear Improved the The improvement


Manogaran & a feature graphic Component Discriminant ECG signal of ECG signal
Priyan. classificati (ECG) Analysis Analysis processing processing and
(2018) on signals (LDA) reducing the
unwanted
frequencies.

Celesti et al. Healthcare NoSQL Managing the Cloud-based Accurately The cloud storage
(2018) data column- HL7 clinical Open Archive managed the is used as NoSQL.
manageme oriented Data documents Information HL7 The risk rate has
nt Base System reduced to 13.8%.
Management

Elhoseny et Healthcare Cloud Accuracy of Parallel Accurately The accuracy in


al. (2018) data environment health service Particle swarm managed big big data health
manageme applications optimization amount data services is
nt (PPSO) identified.

Lomotey & Healthcare Electronic Managing the Timestamp Accurately The results
Deter. (2018) informatio health record healthcare and E-tag managed the revealed that the
n related data techniques healthcare data latency in the
Manageme system has been
nt reduced.

Tao et al. Healthcare IoT Secure data Secret cipher Enhance The result reveals
(2019) data networked transmission share security of that the data
manageme layer algorithm healthcare data security has been
nt improved by
89.67%.

Garcia et al. Healthcare Cerebral Patient real Cerebral Big data is The results reveal
(2018) service stroke time condition stroke efficiently that the rate of
application detection detecting managed execution has
mobile achieved 50%.
application

Kaur et al. Medical Knowledge Accuracy of Concept of Medical data The results reveal
(2018) data Discovery in data cryptography is accurately that the latency
manageme Databases management managed has reduced.
nt

Chen et al. Health data Resource Accuracy of 5G networks Communicatio It helps to utilized
(2018) communic cognitive physical, and SDN- n capacity is to effectively
ation engine application based mobile improved reduce the latency.
and control network
layers

Tao et al. Mobile Hardware Data safety in Public-key Improved The privacy
(2019) healthcare based secret health encryption efficiency in performance in
data ciphers monitoring with keyword data data storage and
search communicatio transmission and
n reduced errors by
12%.

Sharma Chen Cloud- Public-cloud Storage and K-health Identifying Technique helps

41
and Sheth. based infrastructure computing monitoring disease in digital
(2018) healthcare s elasticity system monitoring of
system patient with high
accuracy.

Hussain et al. Healthcare Mobile Security of Android Improved the The security
(2018) security Health mHealth apps security model security by checks of remote
environment 6.98% servers are done
and battery energy
achieved accuracy
of 89.7%

Karaca et al. Healthcare Real-time Signal quality Artificial Accuracy rate The accuracy rate
(2019) data healthcare optimisation Neural of 85.3% of 88.4% has been
manageme monitoring Network achieved through
nt algorithm the ANN
algorithm.

Rahman Healthcare Mobile cloud Error rate in Deoxyribonucl Lossless DNA The authenticity
Khalil and Yi. data the healthcare eic acid data hiding of medical data is
(2019) authenticit data steganography providing with the
y accuracy of
67.7%.

Liu et al. Healthcare Online/offlin Security of Attribute- Error rate is Fine grained
(2018) record e encryption healthcare based reduced access control to
security records encryption the healthcare data
with accuracy of
56.98%

Sodhro et al. Intelligent Medical data Monitoring of QoS Transmission The intelligent
(2019) healthcare processing performance computation power noticed healthcare
application indicators algorithm applications are
accurately
processed the
medical data with
duty cycle of 10%.

Chang and Mobile Internet of Secure and Services Improved data The data and
Oyama. digital Medical fast Oriented accuracy control gateway
(2018) health Things communicatio Computing that managed the
n vital data with
accuracy of
98.7%.

Yousuf Healthcare Smartphone Noise levels HearScreenTM Recorded Extracted the


Hussein et al. data healthcare tester quality, applications noise quality cloud server based
(2018) application and quality index data to the excel
indices sheet and analysed
with the range of p
< 0.05.

Kao et al. Telecare Biomedical Integrated Telecare Feasible health The resukt revals
(2018) system indicators database service model data that the range of
communicatio 80-140 kPa with
n high accuracy.

Firdaus et al. Medical Data Static analysis Root exploit Calculated the The Logitboost

42
(2018) data information and detection probability achieved accuracy
manageme representatio Segregation system and estimates (xi) = of 90%.
nt n Logitboost 1/2
algorithms

Karlekar and Medical Cloud Privacy of Kronecker Improved the The proposed
Gomathi. data environment medical data product-based performance solution
(2018) classificati bat algorithm performed with
on the accuracy of
83.21%.

Sodhro et al. Medical Internet of Integration of Joint energy Reduce the The Meta-
(2018) health care medical IoMT harvesting and communicatio heuristic
things duty-cycle n problems algorithm
optimization performance is
improved
accuracy of
88.1%,

Stamate et al. Healthcare CloudUPDR Investigations Recurrent Assesses the Achieved


(2018) data S app Observations convolutional PD patients Performance by
manageme neural network RNN Classifier
nt such as accuracy
0.78, F1-score of
0.82 and AUC of
0.87.

Benhlima. Health care Accuracy of Accuracy of Big data Accuracy of It improves the
(2018) system data storage handling data techniques handling data quality of health
is 90% care delivery
system.

Li et al. Healthcare Medical data Accuracy of Stackelberg Protected with The results reveal
(2019) data storage and medical data Game based the rate of that increment in
security processing security optimization 16% percentage
algorithm revenue is
achieved 79% at
the time.

Espasito et al. Healthcare Cloud-based Privacy Breach Healthcare The improved the
(2017) data data preserving notification data stored at healthcare data
manageme management healthcare process cloud access control
nt data sharing with the
improvement of
86%.

43
Table 7: Evaluation Table of Data acquisition

S. Author Cloud based infrastructure Data Model Access


No Name managemen efficiency control
. Signal strength Operating t System accurac
voltage range y

1 Cheng Lee & 15 Hz–12 000 Hz 2.1 V to 4.5 V Medical data Slightly 63.7%
Choi. (2018) stronger

2 Kao et al. 10 Hz–14 000 Hz 3.0 V to 3.5 V Healthcare Slightly 76.2%


(2018) data robust

3 Mehmood et 12 Hz–16 000 Hz 2.3 V to 5.1 V Clinical data Slightly 80.1%


al. (2018) resilient

4 Pham et al. 20 Hz–16 000 Hz 4.0 V to 5.5 V Hospital Slightly 89.12%


(2018) Information stronger

5 Faiola & 17 Hz–11 000 Hz 3.1 V to 5.5 V HL7 clinical Slightly 65.7%
Isola. (2018) resilient

6 Varatharajan 11 Hz–13 000 Hz 2.2 V to 4.3 V Mobile Slightly 93.4%


Manogaran & medical data robust
Priyan. (2018)

7 Celesti et al. 20 Hz–15 000 Hz 3.2 V to 4.5 V Big Data Slightly 67.4%
(2018) stronger

8 Elhoseny et al. 14 Hz–16 000 Hz 2.1 V to 4.5 V Healthcare Slightly 74.7%


(2018) data resilient

9 Lomotey & 12 Hz–14 000 Hz 3.1 V to 4.2 V Healthcare Slightly 68.2%


Deter. (2018) data stronger

10 Tao et al. 20 Hz–16 000 Hz 1.1 V to 4.1 V Clinical data Slightly 89.67%
(2019) robust

44
Table 8: Evaluation Table of Data management informatics

S. Author Data e-healthcare records Algorithm used in Frequency


No. security the process strength (%)

Accessibl Non-
High Low
e accessible

1. Garcia et al. Healthcare ✓ Particle swarm 86.7 -


(2018) application optimizer (PSO)

2. Kaur et al. Healthcare ✓ Knowledge Discovery - 59.1


(2018) data in Databases (KDD)

3. Chen et al. Transmitted ✓ Resource cognitive 91.3 -


(2018) data engine

4. Tao et al. mHealth ✓ Public-key encryption 89.7 -


(2019) applications with keyword search
(PEKS)

5. Sharma Chen Healthcare ✓ K-health monitoring - 52.9


and Sheth. application system
(2018)

6. Hussain et al. mHealth ✓ Dynamic taint 92.8 -


(2018) applications analysis

7. Karaca et al. Clinical ✓ Multilayer Perceptron - 61.9


(2019) Transmitted algorithm
data

8. Rahman Healthcare ✓ DNA steganography - 62.3


Khalil and Yi. data
(2019)

9. Liu et al. Medical data ✓ Online/offline 87.4 -


(2018) encryption

10. Sodhro et al. Mobile cloud ✓ Adaptive QoS 93.6 -


(2019) computing computation algorithm

45
Table 9: Evaluation Table of Mobile health

S. Author Data storage type Healthcar Accuracy of Privacy of medical data


No Name e malware
Cloud Mobile High Medium Low
. indicators detection (in
storage %)

1. Chang and Applicable __ Biomedical Vital data with ✓


Oyama. accuracy of
(2018) 98.7%

2. Yousuf Applicable __ Universal Vital Sign with ✓


Hussein et indicator accuracy of
al. (2018) 78.3%

3. Kao et al. __ Applicable Clinical Performed with ✓


(2018) Preventive the accuracy of
Services 53.1%

4. Firdaus et Applicable __ Access to Logitboost ✓


al. (2018) Health achieved
Services accuracy of
90%

5. Karlekar __ Applicable Environmen Performed with ✓


and tal Quality the accuracy of
Gomathi. 73.21%
(2018)

6. Sodhro et Applicable Universal Vital data with ✓


al. (2018) indicator accuracy of
98.7%

7. Stamate et Applicable __ Biomedical Detection with ✓


al. (2018) the accuracy of
83.21%

8. Benhlima. Applicable __ Environmen Accuracy of ✓


(2018) tal Quality handling data is
80.3%

9. Li et al. __ Applicable Biomedical Vital data with ✓


(2019) accuracy of
91.7%

10. Espasito et Applicable __ Access to Detection with ✓


al. (2017) Health the accuracy of
Services 53.21%

46
In table, various parameters are used for evaluating and validating the system. In the other
words, data management techniques are evaluated on the basis of healthcare service
applications that is stated in [3][4][6][10][19][21][22][24][26][28][30]. Moreover, data
storage is also aimed in [2][5][11][12][14][15][20]. Here, the data management of healthcare
information is aimed in the system. Thus, the major components of the research are data
management and data storage.

The certain literature used in this research model does not provide complete dataset because it
considered as a single dataset. Moreover, all these literatures were not tested and verified for
diverse and complex dataset. Also, the guaranteed performance has not been provided in the
single dataset validation because of that the abilities of data management techniques got
lacked in the performance basis. The lack in the data management is identified due to the
competences of the system to maintain the healthcare data to the mobile cloud environment.
Hence, the data management and manipulation of healthcare data is quite crucial in the
evaluation and validation of the system.

The performance of mobile cloud technology based mobile device storage is one more
important component in the evaluation and validation of the system. Thus, the healthcare data
management need to be done on the regular period of time and the healthcare data
management need to be done in mannered way. Moreover, the data management technique
should be performed up-to the anticipation and deliver results to the system.

In the research, various literatures papers on which the evaluation of the system has not
accurately performed through the experiments and simulation. In addition, it has identified
that the concept of majority of the papers are demonstrated through the numerical analysis of
the model with the assistance of data management techniques. The literature that is used in
system did not detail the data which is evaluated with the healthcare data management.

47
5. SYATEM VERIFICATION
The task of analysing various major components of proposed system is an important step to
be done. In the same way, quantitative and qualitative methods are implemented in a
collective way in the way to evaluating the proposed system components. Moreover, the
numerical analysis method was used for evaluating the system. In this the issues of data
storage and inaccurate data management has been eliminated through the DDM taxonomy.
Moreover, the qualitative method has been used and the components that are occurred can be
associated with the detailed taxonomy. The occurrence of the taxonomy is noticed in
quantity.

5.1 System identification

Towards evaluating the DDM taxonomy, initially, test of overlay has been performed. In this
test, occurrence of instances and terms in the quantity of analysed review has prepared.
Moreover, data management techniques have been observed that of what time the existence
has been noticed.

5.2 Completeness

In the way, to ensure the completeness of the system, analysis of various components and
sub-components in the state-of-art-solution. In the way to this, 30 papers have been selected
those are Q1 and Q2 journal and these journals found relevant to the research goal. Towards
that, majority of papers were aimed on the data management techniques and mobile cloud
technology.

In Figure 8, protests of the components and sub-components are provided in the % with the
graphical formation.

48
Figure 8: Occurrence of components and sub-components in the literatures

Figure 8, presented the evaluation of numerous components and sub-components. Also, the
existing taxonomy can be reproached on the basis of Support Vector Machine and message
router. Moreover, it has identified that the manifestation of these terms is least. This specified
that these components are least repeated. Thus, the DDM taxonomy can also be punished if
the components will not be implantable to the healthcare data management system.

Table 10: Frequency Table of 30 publishers

Term Frequency Term Frequency Term Frequency


Network Cloud
45 79 Ontology 55
externality Computing
Data collection Support Vector
108 65 Middleware layer 38
Machine
Data
65 Clinical record 72 Synchronization 79
Classification
Mobile health Hardware-based
115 Health services 89 84
application security
Internet of Mobile
Wearable unit 48 104 110
Things communication
Cloud Mobile Software define
105 98 47
infrastructure computing networks
Healthcare data 117 Electronic 82 Latency analysis 35

49
health record
Security Data Threat
56 45 46
assessment authenticity identification
Mobile digital Adaptive
84 56 QoS computation 28
health Sensor

50
6. DISCUSSION

The discussion part contains components of the research that used least and discussed quite
infrequently. Towards introducing the importance of such components and sub-components,
feasible examples are provided from the literature that is linked to the components used in
DDM (Data acquisition, Data management informatics, and Mobile health) taxonomy with
the respective values. Furthermore, the value of evaluation of various taxonomy components
is underlined in the section.

6.1 Component one – Data acquisition

6.1.1 Sub-component – Sensing

In the research, it has been noticed that nearly each author has discusses the wearable sensors
along with the sensors that are used in the literature. Moreover, the monitoring and tracking
of the healthcare data is also discussed thoroughly. Nevertheless, it is noticed that sensing
devices are not discussed in the research. The term sensing using for providing sensed
healthcare data and monitor in the real-time environment. Moreover, sensing also helps to
regular track the healthcare of data but the authors found least interested for focusing on
sensing. Only 2 papers are detailing about sensing in their researches.

Towards maintaining healthcare data management various sensing techniques can be used
that provides accurate detail about the sensed data. But it has been identified that the
Analysis, monitoring, tracking, signal processing of healthcare data. Hence, the transmission
and sensing of data will not affect the sensing process.

Even though, various evaluation and sensing methods are used for monitoring various
healthcare parameters that are discussed more thoroughly in the literature section.

The research reviewed overall 30 journal papers for providing healthcare data management.
Towards that it has been identified that only 2 journal papers included information about
sensing. Also, Kao et al. (2018) introduced mobile healthcare application that used smart
sensors for collection information about vital healthcare sign of person and communication of
same data to the respective storage. Moreover, Kaur et al. (2018) stated that blockchain-
based architecture can be used for providing mobile health environment that provides sensing
and communication of data to the mobile storage.

51
6.2 Component two – Data management informatics

6.2.2 Sub-component – Information system

It has been identified that very few literatures in the research contains information and data
about healthcare information system. In the way to manage healthcare related data various
data management techniques are used in the research so far. In this way, the implementation
of healthcare information system can reduce the fatigue in maintaining the huge healthcare
data from the mobile devices to the mobile cloud system. Yet, only 1 literature paper has
been discussed about the healthcare information system. Subsequently, towards obtaining the
healthcare data management the application and discussion of information system should be
provided with more detail.

There are various information systems which have not been discussed so far in the literature
papers such as Synchronisation algorithms, encryption, and open archive information system
(OAIS) etcetera. Although, the use of these components hardly affect the literature due to its
less importance. Moreover, the healthcare data management found more discussed in the
literature section because it helps in getting accurate management of mobile healthcare data.

Overall 30 journals were reviewed in the research out of which only 1 paper contains
information about healthcare information system. In the same way, Celesti et al. (2018),
proposed open archive information system (OAIS) healthcare architecture that provides
feasible management of healthcare data in the mobile storage to the mobile cloud storage.

6.3 Component three – Mobile health

6.3.3 Subclass – Healthcare surveillance

Nearly each journals used in the research contains information about the mobile health data
management using various integrated applications and mobile cloud. Yet, only 1 journals
paper has discussed about healthcare surveillance but there is requirement of discussing
healthcare surveillance in the context of mobile health data management. In the way to
achieve accuracy in the healthcare data management, healthcare surveillance needs to be
aimed in the research.

Hardware, software, wearable sensors, mobile health is the type of healthcare surveillance
which has been least appeared in the literature section. Moreover, only one publication in the
research has discussed about healthcare surveillance. Thus, the mentioned terms are least
reliable and not latest while providing mobile healthcare data management.

52
The result conclusion connected to the various processes and ways such as management of
mobile healthcare data to the mobile cloud environment through the smart sensing network.
More precisely, sensing done for accurate data acquisition, information system provides
through the feasible information system and mobile health is providing healthcare
surveillance in the context of mobile healthcare data management.

The healthcare surveillance includes mobile health, and software defined healthcare. Further,
it has been identified that the healthcare surveillance terms occurred in only 1 journal paper.
Elhoseny et al. (2018), introduced feasible big data application based healthcare data
management. The virtual machines are identified for achieving fine healthcare data
management. Hence, the healthcare surveillance related information gained through only 1
journal paper in the 30 journals reviewed in the research.

The lack of occurrence of components such as sensing, information system, and healthcare
surveillance found least relevant to the research domain. Meanwhile, the implementation of
these components is somehow valuable for the research work for accurate mobile healthcare
data management.

 Component one – Data acquisition

Sub-component – Sensing

In the research it has identified that the detailed system found resisted to produce a model
towards communicating and manipulating healthcare data management. So far, information
about sensing system has aimed by number of journals papers. Moreover, there are numerous
ways to manage mobile health data i.e. signal processing. Yet, these types of sensing have not
discussed for far in the research.

 Component two – Data management informatics

Sub-component – Information system

Very few literatures are considering information in the research for healthcare data
management. The introduced model endeavors to provide a model that feasibly evaluates the
sensed medical data. Even through, these components are valuable for medical mobile data
management but the occurrence of these components found least.

 Component three – Mobile health

Subclass – Healthcare surveillance

53
There are various journals papers that were selected in the research for aiming on the mobile
healthcare data management but the healthcare surveillance has been least aimed by the
researchers in research. Meanwhile, numerous steps have been introduced for healthcare
surveillance but these sub-components found least focused by the research publications

54
7. Conclusion

The focus of research is to advance a data management techniques in cloud-based mobile


health information systems that introduced an appropriate system that has the ability to
eliminate problems and issues from the research domain through analysis the existing
available papers and literature with the solution provided in the research on the base of its
accuracy and efficiency of manipulating mobile health data using data management
techniques to the mobile cloud environment.

The research further underling the findings that includes a combination of data management
techniques and mobile cloud health environment along with various data manipulation with
special solution provided in the basis its healthcare data management accuracy and healthcare
information system feasibility.

Yet, the limitations and issues of the system are inaccurate management of mobile healthcare
data in the real-time practices. Also, the management of healthcare information has not done
feasibly in the existing solution. Also, the exclusive model has not tested and verified so far
in the research. Thus, there are the possibilities of future work of the research.

The future direction of the research shall be aimed on application of introduced system in the
real time environment. This is to verify system in the context of usability and applicability for
the research domain. Therefore, the system needs to find and deploy such tools that can
accurately manage the healthcare information in the mobile cloud environment.

55
References

Ali, O., Shrestha, A., Soar, J., & Wamba, S. F. (2018). Cloud computing-enabled healthcare
opportunities, issues, and applications: A systematic review. International Journal of
Information Management, 43(10), 146-158.
doi:https://doi.org/10.1016/j.ijinfomgt.2018.07.009

Batalla, J. M., Krawiec, P., Mavromoustakis, C. X., Mastorakis, G., Chilamkurti, N., Negru,
D., et al. (2017). Efficient media streaming with collaborative terminals for the smart
city environment. IEEE Communications Magazine, 55(1), 98-104.
doi:10.1109/MCOM.2017.1600225CM

Benhlima, L. (2018). Big Data Management for Healthcare Systems: Architecture,


Requirements, and Implementation. Advances in bioinformatics, 2018(1), 36-55.
doi:10.1155/2018/4059018

Bhavnani, S. P., Narula, J., & Sengupta, P. P. (2016). Mobile technology and the digitization
of healthcare. European heart journal, 37(18), 1428-1438.
doi:https://doi.org/10.1093/eurheartj/ehv770

Carvalho, J. V., Rocha, A., Vasconcelos, J., & Abreu, A. (2018). A health data analytics
maturity model for hospitals information systems. International Journal of
Information Management, 46(1), 278-285.
doi:https://doi.org/10.1016/j.ijinfomgt.2018.07.001

Celesti, A., Fazio, M., Romano, A., Bramanti, A., Bramanti, P., & Villari, M. (2018). An
oais-based hospital information system on the cloud: Analysis of a nosql column-
oriented approach. IEEE journal of biomedical and health informatics, 22(3), 912-
918. doi:10.1109/JBHI.2017.2681126

Chandwani, R. (2017). Doctor-patient interaction in telemedicine: Logic of choice and logic


of care perspectives. Information Systems Frontiers, 19(4), 955-968.
doi:10.1007/s10796-016-9643-0

Chang, C. K., & Oyama, K. (2017). Guest editorial: a roadmap for mobile and cloud services
for digital health. IEEE Transactions on Services Computing, 11(2), 232-235.
doi:10.1109/TSC.2017.2778658

56
Chang, V. (2017). Towards data analysis for weather cloud computing. Knowledge-Based
Systems, 127(11), 29-45. doi: https://doi.org/10.1016/j.knosys.2017.03.003

Chen, M., Qian, Y., Hao, Y., Li, Y., & Song, J. (2018). Data-driven computing and caching
in 5G networks: Architecture and delay analysis. IEEE Wireless Communications,
25(1), 70-75. doi:https://doi.org/10.1016/j.chb.2018.10.035

Cheng, S., Lee, S. J., & Choi, B. (2019). An empirical investigation of users’ voluntary
switching intention for mobile personal cloud storage services based on the push-pull-
mooring framework. Computers in Human Behavior, 92(1), 198-215.
doi:https://doi.org/10.1016/j.chb.2018.10.035

Cimperman, M., Brenčič, M. M., & Trkman, P. (2016). Analyzing older users’ home
telehealth services acceptance behavior—applying an Extended UTAUT model.
International journal of medical informatics, 90(2), 22-31.
doi:https://doi.org/10.1016/j.ijmedinf.2016.03.002

da Cruz, M. A., Rodrigues, J. P., Al-Muhtadi, J., Korotaev, V. V., & de Albuquerque, V. C.
(2018). A reference model for internet of things middleware. IEEE Internet of Things
Journal, 5(2), 871-883. doi:10.1109/JIOT.2018.2796561

Darwish, A., Hassanien, A. E., Elhoseny, M., Sangaiah, A. K., & Muhammad, K. (2017). The
impact of the hybrid platform of internet of things and cloud computing on healthcare
systems: Opportunities, challenges, and open problems. Journal of Ambient
Intelligence and Humanized Computing, 14(2), 1-16.
doi:https://doi.org/10.1007/s12652-017-0659-1

de Albuquerque, V. C., Nunes, T. M., Pereira, D. R., Luz, E. S., Menotti, D., Papa, J. P., et al.
(2018). Robust automated cardiac arrhythmia detection in ECG beat signals. Neural
Computing and Applications, 29(3), 679-693. doi:https://doi-
org.ezproxy.csu.edu.au/10.1007/s00521-016-2472-8

Do, H. M., Sheng, W., Liu, M., & Zhang, S. (2016). Context-aware sound event recognition
for home service robots. In 2016 IEEE International Conference on Automation
Science and Engineering (CASE), 29(1), 739-744.
doi:10.1109/COASE.2016.7743476

57
Elhoseny, M., Abdelaziz, A., Salama, A. S., Riad, A. M., Muhammad, K., & Sangaiah, A. K.
(2018). A hybrid model of internet of things and cloud computing to manage big data
in health services applications. Future generation computer systems, 86(4), 1383-
1394. doi:https://doi.org/10.1016/j.future.2018.03.005

Esposito, C., Castiglione, A., Tudorica, C. A., & Pop, F. (2017). Security and privacy for
cloud-based data management in the health network service chain: a microservice
approach. IEEE Communications Magazine, 55(9), 102-108.
doi:10.1109/MCOM.2017.1700089

Esposito, C., De Santis, A., Tortora, G., Chang, H., & Choo, K. R. (2017). Security and
privacy for cloud-based data management in the health network service chain: a
microservice approach. IEEE Communications Magazine, 55(9), 102-108.
doi:10.1109/MCOM.2017.1700089

Faiola, A., & Holden, R. J. (2017). Consumer health informatics: Empowering healthy-
living-seekers through mHealth. Progress in cardiovascular diseases, 59(5), 479-486.
doi:https://doi.org/10.1016/j.pcad.2016.12.006

Faiola, A., & Isola, M. (2018). Empowering the aging with mobile health: A mhealth
framework for supporting sustainable healthy lifestyle behavior. Current problems in
cardiology, 29(1), 45-85. doi:https://doi.org/10.1016/j.cpcardiol.2018.06.003

Feng, Y., Chang, C. K., & Ming, H. (2017). Recognizing activities of daily living to improve
well-being. IT Professional, 19(3), 31-37. doi:10.1109/MITP.2017.51

Firdaus, A., Anuar, N. B., AbRazak, M. F., Hashem, I. T., Bachok, S., & Sangaiah, A. K.
(2018). Root exploit detection and features optimization: mobile device and
blockchain based medical data management. Journal of medical systems, 42(6), 112.
doi:https://doi-org.ezproxy.csu.edu.au/10.1007/s10916-018-0966-x

García, L., Tomás, J., Parra, L., & Lloret, J. (2018). An m-health application for cerebral
stroke detection and monitoring using cloud services. International Journal of
Information Management, 45(1), 319-327.
doi:https://doi.org/10.1016/j.ijinfomgt.2018.06.004

Gomes, S. L., Rebouças, E. S., Neto, E. C., Papa, J. P., de Albuquerque, V. H., Rebouças
Filho, P. P., et al. (2017). Embedded real-time speed limit sign recognition using

58
image processing and machine learning techniques. Neural Computing and
Applications, 28(1), 573-584. doi:https://doi-org.ezproxy.csu.edu.au/10.1007/s00521-
016-2388-3

Gong, J., Xu, Y., & Zhao, X. (2018). A Privacy-preserving Image Retrieval Method Based on
Improved BoVW Model in Cloud Environment. IETE Technical Review, 11(1), 1-9.
doi:https://doi.org/10.1080/02564602.2018.1526654

Habeeb, R. A., Nasaruddin, F., Gani, A., Hashem, I. T., Ahmed, E., & Imran, M. (2018).
Real-time big data processing for anomaly detection: A Survey. International Journal
of Information Management, 10(2), 1-15.
doi:https://doi.org/10.1016/j.ijinfomgt.2018.08.006

Han, Y., Chan, J., Alpcan, T., & Leckie, C. (2017). Using virtual machine allocation policies
to defend against co-resident attacks in cloud computing. IEEE Transactions on
Dependable and Secure Computing, 14(1), 95-108. doi:10.1109/TDSC.2015.2429132

Hoque, R., & Sorwar, G. (2017). Understanding factors influencing the adoption of mHealth
by the elderly: An extension of the UTAUT model. International journal of medical
informatics, 101(12), 75-84. doi: https://doi.org/10.1016/j.ijmedinf.2017.02.002

Hussain, M., Zaidan, A. A., Zidan, B. B., Iqbal, S., Ahmed, M. M., Albahri, O. S., et al.
(2018). Conceptual framework for the security of mobile health applications on
android platform. Telematics and Informatics, 35(5), 1335-1354.
doi:https://doi.org/10.1016/j.tele.2018.03.005

Hussein, A. F., Burbano-Fernandez, M., Ramírez-González, G., Abdulhay, E., & De


Albuquerque, V. C. (2018). An automated remote cloud-based heart rate variability
monitoring system. IEEE Access, 6(3), 77055-77064.
doi:10.1109/ACCESS.2018.2831209

Kalid, N., Zaidan, A. A., Zaidan, B. B., Salman, O. H., Hashim, M., & Muzammil, H. (2018).
Based real time remote health monitoring systems: A review on patients prioritization
and related" big data" using body sensors information and communication
technology. Journal of medical systems, 42(2), 30.
doi:https://doi.org/10.1007/s10916-017-0883-4

59
Kalid, N., Zaidan, A. A., Zaidan, B. B., Salman, O. H., Hashim, M., Albahri, O. S., et al.
(2018). Based on real time remote health monitoring systems: A new approach for
prioritization “large scales data” patients with chronic heart diseases using body
sensors and communication technology. Journal of medical systems, 42(4), 69.
doi:https://doi.org/10.1007/s10916-018-0916-7

Kao, H. Y., Wei, C. W., Yu, M. C., Liang, T. Y., Wu, W. H., & Wu, Y. J. (2018). Integrating
mobile health applications for self-management to enhance Telecare system.
Telematics and Informatics, 35(4), 815-825.
doi:https://doi.org/10.1016/j.tele.2017.12.011

Karaca, Y., Moonis, M., Zhang, Y. D., & Gezgez, C. (2019). Mobile cloud computing based
stroke healthcare system. International Journal of Information Management, 45(4),
250-261. doi:https://doi.org/10.1016/j.ijinfomgt.2018.09.012

Karambakhsh, A., Kamel, A., Sheng, B., Li, P., Yang, P., & Feng, D. D. (2018). Deep
gesture interaction for augmented anatomy learning. International Journal of
Information Management, 33(4), 11-18.
doi:https://doi.org/10.1016/j.ijinfomgt.2018.03.004

Karlekar, N. P., & Gomathi, N. (2018). OW-SVM: Ontology and whale optimization‐based
support vector machine for privacy‐preserved medical data classification in cloud.
International Journal of Communication Systems, 31(12), e3700.
doi:https://doi.org/10.1002/dac.3700

Kaur, H., Alam, M. A., Jameel, R., Mourya, A. K., & Chang, V. (2018). A Proposed Solution
and Future Direction for Blockchain-Based Heterogeneous Medicare Data in Cloud
Environment. Journal of medical systems, 42(8), 156. doi:https://doi-
org.ezproxy.csu.edu.au/10.1007/s10916-018-1007-5

Khan, M. A., Debnath, H., Paiker, N. R., Gehani, N., Ding, X., Curtmola, R., et al. (2016).
Moitree: A middleware for cloud-assisted mobile distributed apps. In 2016 4th IEEE
International Conference on Mobile Cloud Computing, Services, and Engineering
(MobileCloud), 42(3), 21-30. doi:10.1109/MobileCloud.2016.21

60
Kim, S. H., & Kim, J. K. (2018). Determinants of the adoption of mobile cloud computing
services: a principal-agent perspective. Information Development, 34(1), 44-63.
doi:https://doi.org/10.1177/0266666916673216

Kueppers, S., Daskalopoulos, I., Jha, A., Fragopanagos, N. F., Kassavetis, P., Nomikou, E., et
al. (2017). From Wellness to Medical Diagnostic apps: The Parkinson’s Disease Case.
In eHealth 360°, 181(15), 384-389. doi:https://doi-
org.ezproxy.csu.edu.au/10.1007/978-3-319-49655-9_46

Lakshmanaprabu, S. K., Shankar, K., Khanna, A., Gupta, D., Rodrigues, J. J., Pinheiro, P. R.,
et al. (2018). Effective features to classify big data using social internet of things.
IEEE access, 6(2), 24196-24204. doi:10.1109/ACCESS.2018.2830651

Li, X., Huang, X., Li, C., Yu, R., & Shu, L. (2019). EdgeCare: Leveraging Edge Computing
for Collaborative Data Management in Mobile Healthcare Systems. IEEE Access,
7(1), 22011-22025. doi:10.1109/ACCESS.2019.2898265

Li, Z., Zhang, L., Zhong, R., Fang, T., Zhang, L., & Zhang, Z. (2017). Classification of urban
point clouds: A robust supervised approach with automatically generating training
data. IEEE Journal of Selected Topics in Applied Earth Observations and Remote
Sensing, 10(3), 1207-1220. doi:10.1109/JSTARS.2016.2628399

Lin, Q., Li, J., Huang, Z., Chen, W., & Shen, J. (2018). A short linearly homomorphic proxy
signature scheme. IEEE Access, 6(1), 12966-12972.
doi:10.1109/ACCESS.2018.2809684

Liu, Y., Zhang, Y., Ling, J., & Liu, Z. (2018). Secure and fine-grained access control on e-
healthcare records in mobile cloud computing. Future Generation Computer Systems,
78(14), 1020-1026. doi:https://doi.org/10.1016/j.future.2016.12.027

Liu, Z., Weng, J., Li, J., Yang, J., Fu, C., & Jia, C. (2016). Cloud-based electronic health
record system supporting fuzzy keyword search. Soft Computing, 20(8), 3243-3255.
doi:https://doi.org/10.1007/s00500-015-1699-0

Lomotey, R. K., & Deters, R. (2018). Middleware for mobile medical data management with
minimal latency. Information Systems Frontiers, 20(6), 1281-1296.
doi:10.1007/s10796-016-9729-8

61
Lu, W. H., Lee, W. J., Chen, L. K., & Hsiao, F. Y. (2016). Comparisons of annual health care
utilization, drug consumption, and medical expenditure between the elderly and the
general population in Taiwan. Journal of Clinical Gerontology and Geriatrics, 7(2),
44-47. doi:https://doi.org/10.1016/j.jcgg.2015.08.002

Luo, E., Bhuiyan, M. A., Wang, G., Rahman, M. A., Wu, J., & Atiquzzaman, M. (2018).
PrivacyProtector: privacy-protected patient data collection in IoT-based healthcare
systems. IEEE Communications Magazine, 56(2), 163-168.
doi:10.1109/MCOM.2018.1700364

Ma, M., He, D., Khan, M. K., & Chen, J. (2018). Certificateless searchable public key
encryption scheme for mobile healthcare system. Computers & Electrical
Engineering, 65(22), 413-424. doi:https://doi.org/10.1016/j.compeleceng.2017.05.014

Mehmood, I., Lv, Z., Zhang, Y. D., Ota, K., Sajjad, M., & Singh, A. K. (2018). Mobile
cloud-assisted paradigms for management of multimedia big data in healthcare
systems: Research challenges and opportunities. International Journal of Information
Management, 45(10), 246-249. doi:https://doi.org/10.1016/j.ijinfomgt.2018.10.020

Mengistu, Y., Pham, M., Do, H. M., & Sheng, W. (2016). AutoHydrate: A wearable
hydration monitoring system. In 2016 IEEE/RSJ International Conference on
Intelligent Robots and Systems (IROS), 29(4), 1857-1862.
doi:10.1109/IROS.2016.7759295

Mohd, B. J., Hayajneh, T., Yousef, K. A., Khalaf, Z. A., & Bhuiyan, M. A. (2018). Hardware
design and modeling of lightweight block ciphers for secure communications. Future
Generation Computer Systems, 83(12), 510-
521.doi:https://doi.org/10.1016/j.future.2017.03.025

Moraes, J., Rocha, M., Vasconcelos, G., Vasconcelos Filho, J., de Albuquerque, V., &
Alexandria, A. (2018). Advances in photopletysmography signal analysis for
biomedical applications. Sensors, 18(6), 1894. doi:10.3390/s18061894

Moraes, J., Rocha, M., Vasconcelos, G., Vasconcelos Filho, J., de Albuquerque, V., &
Alexandria, A. (2017). Advances in photopletysmography signal analysis for
biomedical applications. IEEE access, 6(2), 24196-24204. doi:10.3390/s18061895

62
Mulwafu, W., Ensink, R., Kuper, H., & Fagan, J. (2017). Survey of ENT services in sub-
Saharan Africa: little progress between 2009 and 2015. Global health action, 10(1),
1289736. doi:https://doi.org/10.1080/16549716.2017.1289736

Nadareishvili, I., Mitra, R., McLarty, M., & Amundsen, M. (2016). Microservice
architecture: aligning principles, practices, and culture. " O'Reilly Media, Inc.", 10(2),
11-18. doi:10.3390/s180618895

Olaronke, I., & Oluwaseun, O. (2016). Big data in healthcare: Prospects, challenges and
resolutions. In 2016 Future Technologies Conference (FTC) IEEE, 140(25), 1152-
1157. doi:10.1109/FTC.2016.7821747

Pham, M., Mengistu, Y., Do, H., & Sheng, W. (2018). Delivering home healthcare through a
cloud-based smart home environment (CoSHE). Future Generation Computer
Systems, 81(14), 129-140. doi:https://doi.org/10.1016/j.future.2017.10.040

Rahman, M. S., Khalil, I., & Yi, X. (2018). A lossless DNA data hiding approach for data
authenticity in mobile cloud based healthcare systems. International Journal of
Information Management, 46(11), 210-215.
doi:https://doi.org/10.1016/j.ijinfomgt.2018.08.011

Ren, Y., Shen, J., Zheng, Y., Wang, J., & Chao, H. C. (2016). Efficient data integrity auditing
for storage security in mobile health cloud. Peer-to-Peer Networking and
Applications, 9(5), 854-863. doi: https://doi.org/10.1007/s12083-015-0346-y

Rodrigues, J. J., Segundo, D. R., Junqueira, H. A., Sabino, M. H., Prince, R. M., Al-Muhtadi,
J., et al. (2018). Enabling technologies for the internet of health things. IEEE Access,
6(1), 13129-13141. doi:10.1109/ACCESS.2017.2789329

Sendra, S., Parra, L., Lloret, J., & Tomás, J. (2018). Smart system for children's chronic
illness monitoring. Information Fusion, 40(12), 76-86.
doi:https://doi.org/10.1016/j.inffus.2017.06.002

Sharma, S., Chen, K., & Sheth, A. (2018). Toward practical privacy-preserving analytics for
iot and cloud-based healthcare systems. IEEE Internet Computing, 22(2), 42-51.
doi:10.1109/MIC.2018.112102519

63
Sharma, S., Powers, J., & Chen, K. (2016). Privacy-preserving spectral analysis of large
graphs in public clouds. In Proceedings of the 11th ACM on Asia Conference on
Computer and Communications Security ACM, 8(3), 71-82.
doi:10.1145/2897845.2897857

Sodhro, A. H., Chen, L., Sekhari, A., Ouzrout, Y., & Wu, W. (2018). Energy efficiency
comparison between data rate control and transmission power control algorithms for
wireless body sensor networks. International Journal of Distributed Sensor Networks,
14(1), 1550147717750030. doi:https://doi.org/10.1177/1550147717750030

Sodhro, A. H., Li, Y., & Shah, M. A. (2017). Green and friendly media transmission
algorithms for wireless body sensor networks. Multimedia Tools and Applications,
76(19), 20001-20025. doi:https://doi-org.ezproxy.csu.edu.au/10.1007/s11042-016-
4084-9

Sodhro, A. H., Luo, Z., Sangaiah, A. K., & Baik, S. W. (2019). Mobile edge computing based
QoS optimization in medical healthcare applications. International Journal of
Information Management, 45(14), 308-318.
doi:https://doi.org/10.1016/j.ijinfomgt.2018.08.004

Sodhro, A. H., Malokani, A. S., Sodhro, G. H., Muzammal, M., & Zongwei, L. (2019). An
adaptive QoS computation for medical data processing in intelligent healthcare
applications. Neural Computing and Applications(14), 1-12. doi:https://doi-
org.ezproxy.csu.edu.au/10.1007/s00521-018-3931-1

Sodhro, A. H., Pirbhulal, S., & Sangaiah, A. K. (2018). Convergence of IoT and product
lifecycle management in medical health care. Future Generation Computer Systems,
86(14), 380-391. doi:https://doi.org/10.1016/j.future.2018.03.052

Sodhro, A. H., Pirbhulal, S., Qaraqe, M., Lohano, S., Sodhro, G. H., Junejo, N. R., et al.
(2018). Power control algorithms for media transmission in remote healthcare
systems. IEEE Access, 6(1), 42384-42393. doi:10.1109/ACCESS.2018.2859205

Sodhro, A. H., Pirbhulal, S., Sodhro, G. H., Gurtov, A., Muzammal, M., & Luo, Z. (2018). A
joint transmission power control and duty-cycle approach for smart healthcare system.
IEEE Sensors Journal, 8(1), 55-63. doi:10.1109/JSEN.2018.2881611

64
Stamate, C., Magoulas, G. D., Küppers, S., Nomikou, E., Daskalopoulos, I., Jha, A., et al.
(2018). The cloudUPDRS app: A medical device for the clinical assessment of
Parkinson’s Disease. Pervasive and mobile computing, 43(22), 146-166.
doi:https://doi.org/10.1016/j.pmcj.2017.12.005

Stamate, C., Magoulas, G. D., Küppers, S., Nomikou, E., Daskalopoulos, I., Luchini, M. U.,
et al. (2017). Deep learning Parkinson's from smartphone data. In 2017 IEEE
International Conference on Pervasive Computing and Communications (PerCom),
40(14), 31-40. doi:10.1109/PERCOM.2017.7917848

Sun, Y., Liu, D., Chen, S., Wu, X., Shen, X. L., & Zhang, X. (2017). Understanding users'
switching behavior of mobile instant messaging applications: An empirical study from
the perspective of the push-pull-mooring framework. Computers in Human Behavior,
75(18), 727-738. doi:https://doi.org/10.1016/j.chb.2017.06.014

Tao, H., Bhuiyan, M. A., Abdalla, A. N., Hassan, M. M., Zain, J. M., & Hayajneh, T. (2019).
Secured data collection with hardware-based ciphers for iot-based healthcare. IEEE
Internet of Things Journal, 6(1), 410-420. doi:10.1109/JIOT.2018.2854714

Varatharajan, R., Manogaran, G., & Priyan, M. K. (2018). A big data classification approach
using LDA with an enhanced SVM method for ECG signals in cloud computing.
Multimedia Tools and Applications, 77(8), 10195-10215. doi:
https://doi.org/10.1007/s11042-017-5318-1

Wang, S., Zhang, X., Zhang, Y., Wang, L., Yang, J., & Wang, W. (2017). A survey on
mobile edge networks: Convergence of computing, caching and communications.
IEEE Access, 5(1), 6757-6779. doi:10.1109/ACCESS.2017.2685434

Wang, X. A., Ma, J., Xhafa, F., Zhang, M., & Luo, X. (2017). Cost-effective secure E-health
cloud system using identity based cryptographic techniques. Future Generation
Computer Systems, 67(14), 242-254. doi: https://doi.org/10.1016/j.future.2016.08.008

Wazid, M., Das, A. K., Odelu, V., Kumar, N., Conti, M., & Jo, M. (2018). Design of secure
user authenticated key management protocol for generic iot networks. IEEE Internet
of Things Journal, 5(1), 269-282. doi:10.1109/JIOT.2017.2780232

65
Wen, J., & Chang, X. W. (2017). Success probability of the Babai estimators for box-
constrained integer linear models. IEEE Transactions on Information Theory, 63(1),
631-648. doi: 10.1109/TIT.2016.2627082

Wilson, B. S., Tucci, D. L., Merson, M. H., & O'Donoghue, G. M. (2017). Global hearing
health care: new findings and perspectives. The Lancet, 390(10111), 2503-2515.
doi:https://doi.org/10.1016/S0140-6736(17)31073-5

Xia, Q., Sifah, E., Smahi, A., Amofa, S., & Zhang, X. (2017). BBDS: Blockchain-based data
sharing for electronic medical records in cloud environments. Information, 8(2), 44.

Yadava, M., Kumar, P., Saini, R., Roy, P. P., & Dogra, D. P. (2017). Analysis of EEG signals
and its application to neuromarketing. Multimedia Tools and Applications, 76(18),
19087-19111. doi: https://doi.org/10.1007/s11042-017-4580-6

Yang, C., Chen, X., & Xiang, Y. (2018). Blockchain-based publicly verifiable data deletion
scheme for cloud storage. Journal of Network and Computer Applications, 103(25),
185-193.

Yousuf Hussein, S., Swanepoel, D. W., Mahomed, F., & Biagio de Jager, L. (2018).
Community-based hearing screening for young children using anmHealth service-
delivery model. Global health action, 11(1), 1467077.
doi:https://doi.org/10.1080/16549716.2018.1467077

Zapata, B. C., Fernández-Alemán, J. L., Toval, A., & Idri, A. (2018). Reusable Software
usability specifications for mHealth applications. Journal of medical systems, 42(3),
45. doi:https://doi.org/10.1007/s10916-018-0902-0

Zhang, K., Mao, Y., Leng, S., He, Y., & Zhang, Y. (2017). Mobile-edge computing for
vehicular networks: A promising network paradigm with predictive off-loading. IEEE
Vehicular Technology Magazine, 12(2), 36-44. doi:10.1109/MVT.2017.2668838

Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy
protection and fast decryption for outsourced data security in mobile cloud
computing. Information Sciences, 379(22), 42-61.
doi:https://doi.org/10.1016/j.ins.2016.04.015

66

You might also like