Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2019.9.3.140

An Efficient Personal Information Collection Model Design Using In-Hospital IoT System  

Jeong, Yoon-Su (Department of information Communication Convergence Engineering, Mokwon University)
Publication Information
Journal of Convergence for Information Technology / v.9, no.3, 2019 , pp. 140-145 More about this Journal
Abstract
With the development of IT technology, many changes are taking place in the health service environment over the past. However, even if medical technology is converged with IT technology, the problem of medical costs and management of health services are still one of the things that needs to be addressed. In this paper, we propose a model for hospitals that have established the IoT system to efficiently analyze and manage the personal information of users who receive medical services. The proposed model aims to efficiently check and manage users' medical information through an in-house IoT system. The proposed model can be used in a variety of heterogeneous cloud environments, and users' medical information can be managed efficiently and quickly without additional human and physical resources. In particular, because users' medical information collected in the proposed model is stored on servers through the IoT gateway, medical staff can analyze users' medical information accurately regardless of time and place. As a result of performance evaluation, the proposed model achieved 19.6% improvement in the efficiency of health care services for occupational health care staff over traditional medical system models that did not use the IoT system, and 22.1% improvement in post-health care for users who received medical services. In addition, the burden on medical staff was 17.6 percent lower on average than the existing medical system models.
Keywords
Cloud services; IoT systems; User privacy; Medical information; Personal information collection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. W. Kim, K. H. Park, S. H. Yi & H. C. Kim. (2014, June). A Big Data Framework for u-Healthcare Systems Utilizing Vital Signs. Proceedings of the 2014 International Symposium on Computer, Consumer and Control(IS3C), 494-497.
2 F. Touati, R. Tabish & A. Ben Mnaouer. (2014, Apr). Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring. Proceedings of the 2013 6th Joint IFIP Wireless and Mobile Networking Conference(WMNC), (pp. 1-4).
3 Y. S. Lee, N. Bruce, T. Non, E. Alasaarela & H. Lee. (2015, Mar). Hybrid Cloud Service Based Healthcare Solutions. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), (pp. 25-30).
4 X. Cui, P. Zhu, X. Yang, K. Li & C. Ji. (2014). Optimized big data K-means clustering using MapReduce. Journal of Supercomputing, 70(3), 1249-1259.   DOI
5 W. Zhao, H. Ma & Q. He. (2009, Dec). Parallel k-means clustering based on mapreduce. Proceedings of the 1st International Conference on Cloud Computing, (pp. 674-679).
6 B. Bahmani, B. Moseley, A. Vattani, R. Kumar & S. Vassivitskii. (2012). Scalable $k-means^{{+}{+}}$. Proceedings of the VLDB Endowment, 5(7), 622-633.   DOI
7 X. Cai, F. Nie & H. Huang. (2013). Multi-view k-means clustering on big data. Proceedings of the Twenty-Third international joint conference on Artificial Intelligence, AAAI Press, (pp. 2598-2604).
8 Z. A. Khattak, S. Sulaiman & J. A. Manan. (2010). A study on threat model for federated identities in federated identity management system. 2010 International Symposium in Information Technology(ITSim), 2, 618-623.
9 H. Gao, J. Yan & Y. Mu. (2010). Dynamic Trust Model for Federated Identity Management. 2010 4th International Conference on Network and System Security(NSS), (pp. 55-61).
10 Y. Zhou, Z. Cao & R. Lu. (2005). Provably secure proxy-protected signature schemes based on factoring. Appl. Math. Comput. 164(1), 83-98.   DOI
11 M. Mambo, K. Usuda & E. Okamoto. (1996). Proxy signatures for delegating signing operation., Proceeding of the Third ACM Conf. on Computer and Communications Security, (pp. 48-57).