1. Introduction
The World Health Organization has now declared the Coronavirus pandemic a global health emergency (WHO). The vast volume of data collected to fight the COVID-19 pandemic poses many security and privacy issues during this period. The integrity of their authentication is essential to guarantee the protection of patient information in the transition process. In innovative healthcare, proper medical data protection is, therefore, becoming equally crucial. They are motivated by these new concepts, methods, theories, and practices focusing on data protection and privacy solutions for intelligent healthcare industries.
The Internet of Medical Things (IoMT) system is an emerging healthcare monitor paradigm that consists of devices, sensors, wireless network, and fog-cloud computing [
1,
2]. The sensors could be mobile devices, heartbeat sensors, blood pressure IoT sensors, ECG sensors, and many sensors connected with mobile devices [
3]. The invention of the 5G communication technology encourages more and more devices to intercommunicate with external resources. Fog-cloud is a cooperative computing network where remote cloud offers via internet and fog computing provide services at the edge of the network [
4]. Many healthcare applications have been developed based on the IoMT system, where many patients practised these applications with mobile devices [
5]. Simultaneously, healthcare sensors are directly connected to the fog-cloud servers to perform any healthcare task for patients [
6]. However, resource-constrained devices offload compute-intensive tasks to the fog cloud for further execution. Generally, devices act as the thin client, and fog-cloud nodes are thick to process all requests with enriching resources in the IoMT system. This offloading mechanism poses many research challenges for healthcare applications, such as data security, malware attack, denial of services and storage issue with unknown external servers [
7].
The fog-cloud computing nodes offer distributed paid healthcare services to execute all classes and type of application [
7]. There are three cost models for services: on-demand, on-reserved, and spot-instances based on hourly, weekly, monthly, and yearly duration with different prices. Generally, these applications are workflow applications and require a sequence of processes to run users requests into other orders [
8]. When needed, they needed services based on their execution, preferably provisionally for an hour or weekly for actions. Therefore, it is a challenge to design a cost-efficient system for healthcare IoMT applications. Generally, vendors offer these paid services (e.g., fog-cloud, such as Amazon, Cloud, Alibaba, and Azure) to run the applications under their Quality of Service (QoS) requirements [
9]. Recently, serverless computing is a model for fog-cloud computing execution in which the server runs applications with a function inside containers. The pricing is based on the application’s actual number of resources per number of performances, not on the volume units’ provisioning servers [
9].
Data will encrypt in the IoMT application due to security concerns before they are sent to the server. At the same time, the client will face some problems [
10]. The main reason for these is that the service provider has to perform data computation to respond to the client’s requests, so the client must provide the server with the key to decrypt the data before performing the appropriate calculation, affecting the cloud’s data confidentiality [
10]. Ethereum is a decentralized, open-source blockchain that allows users to create smart contracts with their own rules and regulations. The platform’s native cryptocurrency is Ether. The Ethereum blockchain is the most widely used in the peer-to-peer network and applications for the distributed system. Ethereume blockchain is a group of blocks (data blocks) that are unalterable and well structured, and it records the logs of all transactions, in the form of a file system, the data blocks in the blockchain stored data in each node [
11]. Each block contains data for many transactions, the number of which can vary between different blocks. However, besides the benefit of serverless fog-cloud computing to run IoMT applications, many challenges are being further investigated. The tradeoff between cheap cost-and-demand QoS is a conflicting problem during execution. Due to the external services, the security of the offloaded data of different users has posed a challenge. Therefore, secure and cost-efficient task scheduling in an edge computing, serverless, decentralized system is becoming a challenge [
12].
In this paper, the study investigates the cost-efficient task scheduling problem and security mechanism in the blockchain-enabled fog-cloud network [
13]. The objective is to minimize the application cost during offloading and scheduling in the blockchain-enabled fog-cloud network. The study considers the workflow healthcare application, where the precedence-constraints sequence constrains all tasks. In the workflow, each task has a deadline and needs to be completed before a given threshold. The study considers the serverless, decentralized fog-cloud network, which consists of different functions which run inside containers. In order to solve the task scheduling problem in the IoMT workflow application, the study proposed the Blockchain-Enable Smart-Contract Cost-Efficient Scheduling Algorithm Framework (BECSAF), which consists of the following schemes: Smart-Contract-Scheme, Function Verification Pool, Task and Function Sequencing, Resource Matching, Smart-Contract Aware Blockchain-Enable Task-Scheduling. Algorithm 1 uses the BECSAF to solve the problem in different steps.
Algorithm 1: BECSAF. |
|
The study presents the following main contributions to the state of the art:
Initially, the study devises the Blockchain-Enable Smart-Contract Cost-Efficient Scheduling Algorithm (BECSAF), consisting of the following schemes: Smart-Contract-Scheme, Function Verification Pool, Task and Function Sequencing, Resource Matching and Blockchain-Consensus-Scheme-Task-Scheduling. Algorithm 1 uses the BECSAF to solve the problem in different steps. The smart-contract scheme designates each connected node in IoMT to avoid any tampering with data in the network. The functions are the resource in IoMT; each function has different execution costs. Therefore, the study verifies the standard of each function before adding to them in the function pool;
The study considers the applications that have stringent requirements for their execution, as well as the deadline and resources required for them to complete their process. Therefore, with different deadlines, the study implements task sequencing rules before scheduling them with nodes. The aim is to sort all requested tasks into topological order, and then to execute them in the optimized order;
To adopt dynamic changes in the environment, the dynamic preemptive scheduler was suggested. The goal is to schedule tasks for the decentralized functions, minimize the execution cost, and meet the application deadline during processing in the system;
To ensure the blockchain validity of distributed data and management of the load balancing situation, the resource leakage efficient blockchain-enabled schemes are devised to avoid any resource and disk-bound application failure in the system.
The remainder of this paper is organized as follows.
Section 2 describes the problem description and problem formulation.
Section 3 proposes the algorithm framework.
Section 4 presents the simulation results in order to evaluate the performance of our algorithm.
Section 5 concludes the summary and the intended future work.
2. Related Work
The Internet of Medical Things (IoMT) is a complex system that consists of different technologies (e.g., sensors, communication channels, and computing nodes at local and remote layers) to support healthcare mechanisms for patients. Three types of solution (e.g., static, dynamic and adaptive optimization) have attempted to solve the problem with offloading and scheduling techniques. Different studies achieved different objectives, as shown in
Table 1. The problem parameter defines the considered problem through offloading, resource allocation and scheduling, along with the constraints and proposed methodology, according to the considered problem. Generally, all studies considered the fog-cloud network to easily manage the load-balancing between resources with different objectives. The gap-analysis highlights the aspects which studies did not consider in their IoMT application methodologies.
Baresi et al. [
1] suggested a serverless-based IoMT system to minimize the resource cost of applications. The serverless system has a lower fog-cloud cost compared to virtual machines. However, they did not consider the security mechanism in the study. Eivy et al. [
3], Adzic et al. [
7], Adzic et al. [
7] and Lynn et al. [
8] and van et al. [
9] suggested serverless based fog-cloud where instead of virtual machines they run functions inside containers. The objective is to minimize the execution and offloading cost of applications. These studies replaced the existing resource function provisioning methods and achieved multiple objectives, such as energy, delay, lateness and cost. These studies proposed the methodology based on static optimization (e.g., static application partitioning, static scheduling, static resource allocation) to solve the offloading, resource allocation and scheduling problem in the IoMT network. Rez et al. [
10] suggested the serverless-based IoMT system could minimize the resource cost of applications. The serverless system has a lower fog-cloud cost compared to virtual machines. However, they did not consider the security mechanism in the study. Yan et al. [
11], De-Lara et al. [
12], Lakhan et al. [
13] and Li et al. [
14] and Li et al. [
15,
16] suggested serverless and container-based application partitioning, resource allocation and scheduling methodology-based linear and dynamic optimization in fog-cloud. The objective is to minimize the execution, energy, response time, and delay and offloading cost of applications. However, as mentioned earlier, these solved the scheduling and offloading problem without considering the security mechanism in the IoMT fog-cloud network.
The blockchain-enabled solution proposed in IoMT could save patient records in their original form. The primary goal of blockchain is to save data from tampering and offer immutable blocks in the distributed system. Many blockchain-enabled fog-cloud systems of IoMT have been suggested to guard the privacy and authenticity of patient data in the system. Lakhan et al. [
17] suggested a blockchain-enabled system fora vehicular healthcare ambulance vehicle in the fog-cloud network. The miners in the consensus use symmetric encryption and decryption methods to save the data from network tampering. However, this work handles the fault-tolerant nodes within the execution runtime. The study’s objective is to minimize the security risk and cost of applications during offloading and scheduling in the system. Tariq et al. [
17], Tariq et al. [
18] and Islam et al. [
19] devised a blockchain-enabled IoMT network using an Ethereum decentralized consensus to protect the patients’ IoT big data from tempering. These studies proposed methodologies based on dynamic optimization (i.e., dynamic scheduling) and adaptive optimization (e.g., reinforcement learning, both supervised and unsupervised)to solve the offloading and scheduling problem. The goal is to minimize the risk of data tampering in the distributed network.
The data-offloading-aware data allocation in the blockchain-enabled fog-cloud network system for healthcare sensors was proposed in [
4,
6,
20,
21,
22,
23,
24]. These studies suggested a method to protect sensor data and enhances the performance of big-data analysis in the system. Dynamic and adaptive optimization heuristics, such as genetic algorithm and reinforcement aware schemes, were suggested [
2,
5,
23,
25,
26,
27]. The different objectives were obtained, such as the cost, security, response time and energy of sensors devices during offloading and scheduling in the IoMT network. All the studies used resource-provisioning methods and blockchain technology to achieve user cost, communication, and network security [
28,
29,
30,
31].
Table 2 represents the mathematical symbol for problem formulation.
3. Problem Description
The study devises the cost-efficient scheduling IoMT system based on the blockchain-enabled fog-cloud network, as shown in
Figure 1. The proposed consists of different components: application-level smart-contract, Function Verification, System Manager, Task Sequencing, Task Scheduling, Blockchain-Enable fog-cloud network. The fog cloud offers published functions of the different cloud providers at various specifications. The providers are IBM OpenWhisk, AWS Lambda, Azure Functions, Google Cloud Functions, Alibaba Function Compute, and Kubeless Functions that offer functions, and everything manages by themselves. The System Manager controls all components in the system.
Function, as a service, is a serverless edge computing services category that offers a forum for customers to create, operate, and manage application functionalities without the difficulty of building and maintaining the infrastructure that is usually associated with the creation and launch of an application.
3.1. System Model
The proposed framework consists of the application layer and resource layer, as shown in
Figure 2. The application layer is composed of workflow tasks and body sensors. However, the application layer offloads all workflow tasks to the fog-cloud system for further execution due to resource-constraint sensors. Due to security issues at the communication layer, the smart contract is implemented at the application layer, predicting the network situation. If the data size and duration of offloading are greater than their given time and size, the smart contract will generate security to the application layer. Otherwise, if the situation appears to be normal, the whole application will offload to the fog-cloud system.
The resource layer combines the distributed fog nodes and remote cloud, as shown in
Figure 2. All the fog nodes communicate with each other via different communication channels. All hospital fog nodes are directly connected to the remote cloud. The System Manager is the primary controller in the system, and handles all execution process inside the system. Blockchain Management creates blocks (e.g., miners) for all transactions at each fog node with different elements. For instance, Ethereum miner (ETH1) is configured with smart-contract, Timestamp, Previous Hash, Hash and Transaction Merkle of
transactions. Conversely, miner (ETH2), miner (ETH3), miner (ETH4) and miner (ETH5) use the same elements to achieve a secure transaction between client–fog–cloud nodes. The fog cloud executes workflow tasks
based on the matched functions
from the pool based on the proposed scheduling scheme. The user application assumes that the thin-client and fog-cloud nodes are thick-client. Therefore, a smart contract is a level of agreement between thin-client and thick-clients during offloading and scheduling in the system.
3.2. Problem Formulation
The IoMT workflow application is represented by the directed acyclic graph, i.e., . For the two tasks , an edge represents the data dependency between task and task , which means that should complete its execution before starts. The application G has N number of tasks. Task is the entry task and is the exit task. We use to denote the original data volume of task , whereas, denotes the generated data volume from task to . Each task has a deadline inside the workflow during its processing in the system.
The fog-cloud nodes are represented by
. Each computing node can create the number of containers, i.e.,
}. Each node configured with the Ethereum blockchain consensus blocks, i.e.,
. The functions pool for the tasks of different cloud vendors is represented by
.
is the
function of node
k for
, which is executed inside the container.
is the start time of a task at the
function in the
node, and
is the finish time of the
. The execution time of a task is calculated by
. The cost of each task is determined in the following way:
is illustrated by the
. The binary assignment of each task
to the available function is determined as follows.
Equation (
1) determines the binary assignment of tasks to the functions.
determines the smart-contract rules during communication between tasks and offloading, as determined in Equation (
2), whereas,
is the communication of tasks between thin-client and thick-client. The objective is to reduce cost of workflow tasks under their deadline constraints. The considered problem is formulated as follows.
Z represents the objective function of the study, as defined in Equation (
3). Subject to
Each task is assigned to only function at a computing node, as defined in Equation (
4).
The finish time of tasks must be within their deadlines, defined in Equation (
5).
5. Performance Evaluation
The simulation parameters were implemented in the serverless evaluation model defined in
Table 4.
Table 5 consists of these primitives: Providers, Task, Function, Node, Cost (Memory (MB),
Execution (ms)). The vendors offer different functions to execute tasks, known as function as a service. However, these functions must run inside containers at other computing nodes, such as fog and cloud computing. Therefore, the study considered fog-cloud nodes to execute functions based on user requirements in the IoMT.
Table 5 shows the cost of functions of different vendors. Each of the functions was deployed using the Python 3 runtime with 256 MB of memory. The first generated benchmark function was a factorial function, which calculates the resulting returning factorial 150 times.
5.1. System Implementation
The function as a service-based serverless system implemented the components shown in
Figure 4.
The system consists of application layer which offers an interface for the user to initialize their tasks. The resource layer provides functions that are implementied inside containers with an edgex-foundry mechanism. The blockchain is implemented inside the system, as shown in
Figure 4, to maintain applications in the distributed environment. We add the functions of two vendors, such as Amazon and Azure, to the systems. FaaS are the functions defined in
Table 5. The goal is to execute all tasks on functions with the blockchain-enabled network. The smart-contract and ethereum blockchain
are implemented, as shown in
Figure 4. The goal is to execute all transactions within blocks of ethereum without any tempering, as shown in
Figure 3.
5.1.1. IoMT Sensors
The Heartbeat Sensor is an electronic system used to measure heart rate, i.e., heartbeat velocity. Body temperature control, heart rate and blood pressure are the basic things we do to keep ourselves safe. We use thermometers and a sphygmomanometer to monitor arterial pressure or blood pressure, to calculate body temperature. It is possible to track the heart rate in two ways. The first is to manually check the pulse of the wrists or neck. The second is to use a Heartbeat Sensor. In this project, we have developed a Heart Rate Monitor Device using Arduino and Heartbeat Sensor. The Heartbeat Sensor Concept, the Heartbeat Sensor and the Arduino-Based Heart Rate Monitoring Device, identified using a functional heartbeat sensor. For athletes and patients, controlling heart rate is very important as it determines the state of the heart (just heart rate). There are many methods of calculating heart rate, and electrocardiography is the most reliable. However, using the Pulse Sensor is the best way to track the heart rate. It comes in various shapes and sizes, and offers a quick way to calculate the pulse. Wrist Watches (Smart Watches), Smart Phones, chest belts, etc., are available with heartbeat sensors. The heartbeat is measured in beats per minute or bpm, representing the number of times in a minute that the heart contracts or expands.
5.1.2. IoMT Application
We designed the android IoMT application, which consists of four types of sub-applications, such as cancer-aware monitoring, Heartbeat, ECG, and EEG monitoring. These applications consist of workflow tasks, as shown in
Figure 4, and different functions are required to run them. All sensors are connected with an android mobile phone. The mobile phone was connected to the proposed system, which offers services based on different vendor functions and processes them inside containers. The EdgeX Foundry is exploited to design the basic infrastructure of the applications.
5.1.3. Edgex Foundry
EdgeX Foundry is a Linux Foundation-hosted, a vendor-neutral open-source platform offering a popular mobile framework for IoMT edge computing. There is a series of loosely connected functions of different vendors, grouped into different layers inside containers.
5.2. Baseline-Approaches
For analysis of the results, the performances of existing systems and the proposed system were evaluated based on resource and application execution in terms of cost and deadline (QoS). The study implemented three systems with a similar architecture, but, somehow, the resources are different, as is their usage in IoMT workflow applications. The baseline approaches are discussed in the following way.
Baseline1: Baseline2: The existing studies [
16,
17,
18,
19,
20,
21,
22,
23,
24] suggested a blockchain-enabled fog-cloud network for healthcare applications. These works considered the containers and virtual machines at any computing node as the resource. The cost model based on different resource-provisioning (on-demand, on-reserve, spot-instance) was implemented to execute the applications. However, the study only considered the on-demand resource-provisioning for the application execution in the performance evaluation part. There are many components to the existing proposed systems, for instance, offloading, resource allocation, blockchain-enabled chaining and smart-contract rules. Therefore, the performance evaluation shows the schemes’ performance in terms of cost for healthcare application via different systems.
5.3. Result Discussion
The execution cost of each application depends upon the usage functions and their properties. For instance, each function has a different memory and execution time. Therefore, the execution cost of each function is additional during its execution. The study executed all tasks within their deadlines with a lower cost than existing techniques. The proposed serverless, decentralized-based fog-cloud could run healthcare applications, fulfilling their quality-of-service requirements. It is hard to balance execution cost and deadlines during scheduling and offloading in the distributed blockchain-enabled fog-cloud network. There are many risk factors in distributed computing, such as failure, security attack, missing deadlines, execution cost and total execution time. Therefore, the study evaluated the performances of existing systems based on the following metrics: failure, security attack, deadline missing, execution cost and total execution time.
The execution cost of each application depends upon the usage functions and their properties. For instance, each function has a different memory and execution time. Therefore, the execution cost of each function is increased during its execution. The study executed all tasks within their deadlines with minimal cost compared to existing techniques. The proposed system meets the quality-of-service requirements of the application. It is hard to balance execution cost and deadlines during scheduling and offloading in the distributed blockchain-enabled fog-cloud network. There are many risk factors in distributed computing such as failure, security attack, missing deadlines, execution cost and total execution time. Therefore, the study evaluated the performances of existing systems based on the following metrics: failure, security attack, deadline missing, execution cost and total execution time. In the fog-cloud network, the tasks’ deadlines also have a critical role in the system. For instance, the healthcare monitoring system uses different, life-critical sensors (e.g., heartbeat, blood-pressure, location-monitoring of an ambulance). Therefore, each task has a critical deadline for its completion or a response from the fog-cloud system. In the second metric, the performance evaluation is analyzed based on the deadline (QoS) of application tasks. Therefore, the task deadlines during scheduling are essential, as well as the cost. If the system responds late, the critical patients who use the heartbeat sensor during critical rating can suffer from any health issue.
Figure 5a–d shows that the BECSAF has fewer missed non-critical fewer tasks during processing in the system when considering critical healthcare issues. Existing baseline approaches (Baseline1 and Baseline2) only considered the offloading performance and ignored the system performance in terms of the deadline, leading to many missed critical task deadlines. Therefore, BECSAF considered this important prospect during the processing of application tasks in the system.
Figure 5a shows the performances of schemes with the 150 workflow tasks. The proposed method outperforms all existing techniques for workflows with 50, 100, 150 and 165 tasks. The main reason for this is that all existing schemes only considered the resource-allocation strategies with latency requirements. However, existing works did not focus on workload deadline, priority and execution in the IoMT network. Without task sequences, function validation, and dynamic scheduling, IoMT tasks can suffer from lower performances in IoMT.
5.4. Fault-Tolerant
The failure-aware system always reduces the execution cost of applications in the IoMT network. In comparison, there are many types of failure in the system. For instance, the system’s failure consists of transient failure, application failure, network failure, and node failure. However, existing studies did not consider the blockchain failure situation when blocks are overloaded, or data-tempering occurs in IoMT. The study finds the failure-recovery cost in IoMT, which is included in system’s execution cost. Therefore, it should be taken by the system as the cost-constraint for workflows. The fault-tolerant aware blockchain-enable fog-cloud network is preliminary in the serverless, decentralized system. There are many failure possibilities in each node, such as failure of the computing node due to over-balancing, and many reasons for these. Therefore, a failure-aware system can handle any failure transaction in the blockchain-enabled fog-cloud network. This work proposed a Practical Aware-Byzantine-Fault-Tolerance scheme that operates any failure in the system. The loss has a lot of impact on the application cost during scheduling, and if failure remains untreatable, it will lead to an increased recovery cost for the application in the system. Therefore, the study implemented the Practical Aware-Byzantine-Fault-Tolerance scheme in the blockchain–fog–cloud and analyzed the failure ratio of tasks in the system. The study examined the failure-aware performance of the applications and design in different layers and explained the following cases.
Cost of Failure Between User Application G to Request Computing Node K.
Cost of Failure Between Fog Node to During Data Travelling.
Cost of Failure Between Fog Node to During Data Travelling.
The cost of Failure Between Fog Node to During Data Travelling. The detail of the failure defined in the following.
Case-1: The failure between application
G and requested node
k. The users can request any computing node in the fog-cloud network for processing. The request failure or process failure to be analyzed are based on a security attack, calculated based on data size. If the generated tasks’ data, or original data size, increases in terms of its actual size, then the transaction fails. If the communication or computing fails, then the failure cost is incurred during the recovery process. The proposed BECSAF system detects the failure in advance, before offloading the system based on the smart-contract scheme, which identifies any failure before sending it to any node. Therefore,
Figure 6 shows that BECSAF incurred the lowest failure cost between the user application and initial computing node during the process;
Case-2: The failure between computing node
and computing node
during data travelling for further execution. The request failure or process failure is analyzed based on the security attack, calculated based on data size. If the generated data of tasks, or original data size, increases in terms of its actual size, then the transaction fails. The proposed BECSAF system detects the failure in advance before offloading the system based on the smart-contract scheme, which identifies any loss before sending it to any node. Therefore,
Figure 7 shows that BECSAF incurred the lowest failure cost between the user application and initial computing node during the process;
Case-3: The failure between computing node
and computing node
during data travelling for further execution. The request failure or process failure is analyzed based on a security attack, calculated based on data size. If the generated data of tasks or original data size increase in terms of actual size, then the transaction fails. The proposed BECSAF system detects the failure before offloading the system based on the smart-contract scheme, which identifies any failure before sending at any node. Therefore,
Figure 8 shows that BECSAF incurred the lowest failure cost between the user application and initial computing node during the process;
Case-4: The failure between computing node
and computing node
during data travelling for further execution. The users can request any computing node randomly in the fog-cloud network for processing. If the generated data of tasks or original data size increase in terms of its actual size, then the transaction fails. The proposed BECSAF system detects the failure before offloading the system based on the smart-contract scheme, which identifies any failure before sending it to any node. Therefore,
Figure 9 shows that BECSAF incurred the lowest failure cost between the user application and initial computing node during the process.
5.5. Blockchain-Enable Fog-Cloud Performance
In the distributed computing, the study organized the cost and deadline performances of the proposed blockchain-enabled fog-cloud system into different levels: user-level, node-to-node level and fog-to-cloud level. Initially, the application offloads the entire application workload to the fog-cloud system in a secure way. The smart-contract scheme detects the execution size before sending it to the fog-cloud system in advance. If the offloaded application tasks have different data sizes, the smart-contract method generated the failure or attack message to the system and application. In this way, advanced failure detection can minimize the failure or attack cost of healthcare applications.
Figure 10 shows that the BECSAF outperforms all baseline approaches in terms of attack or failure for IoMT workflow application in the network.
During the sharing of data in the fog-cloud network, the following attributes should be present: authenticate, secure, double spending, and data validation. Therefore, this study implemented the blockchain Blockchain-Consensus Scheme to handle all attributes in the system.
Smart-Contract The study implemented smart-contract rules for all blockchain-miners, which can execute many transactions inside the same block during processing. The smart-contract rules avoid any violation, such as double-spending, transaction and data tampering.
Sharing Data: All blocks share each transaction data and verify the hashing of the previous block before performing the new transaction for the requested tasks.
Block-Resource Leakage. Each block has limited resource space, therefore, there could be leakage if the requested transactions increase their limit. This overloading or leakage will lead to longer matching or authenticate cost for all blocks in the blockchain network.
Figure 11 and
Figure 12 shows the BECSAF of all transactions of the same application in different blocks controlled based on the proposed scheme and incurred with lower blockchain cost.
Therefore, controlling resource leakage in the blockchain is a necessary job during blockchain-processing for different applications in the system.
6. Conclusions and Future Work
The study devised the novel, cost-efficient and secure IoMT system based on the blockchain-enabled fog cloud. The study’s goal is to minimize the cost of the healthcare application services during processing in the system. The performance evaluation results show that the suggested IoMT system outperforms the existing baseline healthcare systems in terms of cost and security in the distributed healthcare system. Many metrics were evaluated, such as execution cost, deadline, security, fault-tolerance, and resource-leakage during evaluation. From the analysis of the results, the proposed study improved the cost of the of the IoMT application services and provided a secure distributed environment for execution.
In future work, the study will focus on mobility-aware IoMT services with familiar dynamic learning approaches for the different healthcare applications: drone-ambulance system and Internet of Unmanned Healthcare Vehicle Things network. Knowledgeable mobility services are always valuable for the self-adaptive and dynamic environment of healthcare applications.