dc.contributor.author | Kraemer, Frank Alexander | |
dc.contributor.author | Bråten, Anders Eivind | |
dc.contributor.author | Tamkittikhun, Nattachart | |
dc.contributor.author | Palma, David | |
dc.date.accessioned | 2017-10-16T11:47:07Z | |
dc.date.available | 2017-10-16T11:47:07Z | |
dc.date.created | 2017-05-22T20:59:15Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | IEEE Access. 2017, 5 9206-9222. | nb_NO |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | http://hdl.handle.net/11250/2460298 | |
dc.description.abstract | Fog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, classify, and discuss different application use cases presented in the literature. For that, we categorize applications into use case classes and list an inventory of application-specific tasks that can be handled by fog computing. We discuss on which level of the network such fog computing tasks can be executed, and provide tradeoffs with respect to requirements relevant to healthcare. Our review indicates that: 1) there is a significant number of computing tasks in healthcare that require or can benefit from fog computing principles; 2) processing on higher network tiers is required due to constraints in wireless devices and the need to aggregate data; and 3) privacy concerns and dependability prevent computation tasks to be completely moved to the cloud. These findings substantiate the need for a coherent approach toward fog computing in healthcare, for which we present a list of recommended research and development actions. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | nb_NO |
dc.relation.uri | http://ieeexplore.ieee.org/document/7927714/ | |
dc.title | Fog Computing in Healthcare – A Review and Discussion | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | publishedVersion | nb_NO |
dc.source.pagenumber | 9206-9222 | nb_NO |
dc.source.volume | 5 | nb_NO |
dc.source.journal | IEEE Access | nb_NO |
dc.identifier.doi | 10.1109/ACCESS.2017.2704100 | |
dc.identifier.cristin | 1471446 | |
dc.description.localcode | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This is the authors' accepted and refereed manuscript to the article. | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |