Fig 1. Scenarions process of new medical service l
Fig 2. Overview Operation Process of Proposed Model
Fig 3. Configuring IoT systems handled in a cloud environment
Fig. 4. IoT Device function of Proposed Model
Table 1. Simulation Setting
References
- T. W. Kim, K. H. Park, S. H. Yi & H. C. Kim. (2014, June). A Big Data Framework for u-Healthcare Systems Utilizing Vital Signs. Proceedings of the 2014 International Symposium on Computer, Consumer and Control(IS3C), 494-497.
- F. Touati, R. Tabish & A. Ben Mnaouer. (2014, Apr). Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring. Proceedings of the 2013 6th Joint IFIP Wireless and Mobile Networking Conference(WMNC), (pp. 1-4).
- Y. S. Lee, N. Bruce, T. Non, E. Alasaarela & H. Lee. (2015, Mar). Hybrid Cloud Service Based Healthcare Solutions. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), (pp. 25-30).
- X. Cui, P. Zhu, X. Yang, K. Li & C. Ji. (2014). Optimized big data K-means clustering using MapReduce. Journal of Supercomputing, 70(3), 1249-1259. https://doi.org/10.1007/s11227-014-1225-7
- W. Zhao, H. Ma & Q. He. (2009, Dec). Parallel k-means clustering based on mapreduce. Proceedings of the 1st International Conference on Cloud Computing, (pp. 674-679).
-
B. Bahmani, B. Moseley, A. Vattani, R. Kumar & S. Vassivitskii. (2012). Scalable
$k-means^{{+}{+}}$ . Proceedings of the VLDB Endowment, 5(7), 622-633. https://doi.org/10.14778/2180912.2180915 - X. Cai, F. Nie & H. Huang. (2013). Multi-view k-means clustering on big data. Proceedings of the Twenty-Third international joint conference on Artificial Intelligence, AAAI Press, (pp. 2598-2604).
- Z. A. Khattak, S. Sulaiman & J. A. Manan. (2010). A study on threat model for federated identities in federated identity management system. 2010 International Symposium in Information Technology(ITSim), 2, 618-623.
- H. Gao, J. Yan & Y. Mu. (2010). Dynamic Trust Model for Federated Identity Management. 2010 4th International Conference on Network and System Security(NSS), (pp. 55-61).
- Y. Zhou, Z. Cao & R. Lu. (2005). Provably secure proxy-protected signature schemes based on factoring. Appl. Math. Comput. 164(1), 83-98. https://doi.org/10.1016/j.amc.2004.04.032
- M. Mambo, K. Usuda & E. Okamoto. (1996). Proxy signatures for delegating signing operation., Proceeding of the Third ACM Conf. on Computer and Communications Security, (pp. 48-57).