Vis enkel innførsel

dc.contributor.authorKraemer, Frank Alexander
dc.contributor.authorBråten, Anders Eivind
dc.contributor.authorTamkittikhun, Nattachart
dc.contributor.authorPalma, David
dc.date.accessioned2017-10-16T11:47:07Z
dc.date.available2017-10-16T11:47:07Z
dc.date.created2017-05-22T20:59:15Z
dc.date.issued2017
dc.identifier.citationIEEE Access. 2017, 5 9206-9222.nb_NO
dc.identifier.issn2169-3536
dc.identifier.urihttp://hdl.handle.net/11250/2460298
dc.description.abstractFog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, classify, and discuss different application use cases presented in the literature. For that, we categorize applications into use case classes and list an inventory of application-specific tasks that can be handled by fog computing. We discuss on which level of the network such fog computing tasks can be executed, and provide tradeoffs with respect to requirements relevant to healthcare. Our review indicates that: 1) there is a significant number of computing tasks in healthcare that require or can benefit from fog computing principles; 2) processing on higher network tiers is required due to constraints in wireless devices and the need to aggregate data; and 3) privacy concerns and dependability prevent computation tasks to be completely moved to the cloud. These findings substantiate the need for a coherent approach toward fog computing in healthcare, for which we present a list of recommended research and development actions.nb_NO
dc.language.isoengnb_NO
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)nb_NO
dc.relation.urihttp://ieeexplore.ieee.org/document/7927714/
dc.titleFog Computing in Healthcare – A Review and Discussionnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber9206-9222nb_NO
dc.source.volume5nb_NO
dc.source.journalIEEE Accessnb_NO
dc.identifier.doi10.1109/ACCESS.2017.2704100
dc.identifier.cristin1471446
dc.description.localcode© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This is the authors' accepted and refereed manuscript to the article.nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel