Next Article in Journal
Disjoint and Functional Principal Component Analysis for Infected Cases and Deaths Due to COVID-19 in South American Countries with Sensor-Related Data
Next Article in Special Issue
EagleEye: A Worldwide Disease-Related Topic Extraction System Using a Deep Learning Based Ranking Algorithm and Internet-Sourced Data
Previous Article in Journal
Roadmap of Terahertz Imaging 2021
Previous Article in Special Issue
Granular Data Access Control with a Patient-Centric Policy Update for Healthcare
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Smart-Contract Aware Ethereum and Client-Fog-Cloud Healthcare System

by
Abdullah Lakhan
1,
Mazin Abed Mohammed
2,
Ahmed N. Rashid
2,
Seifedine Kadry
3,
Thammarat Panityakul
4,
Karrar Hameed Abdulkareem
5 and
Orawit Thinnukool
6,*
1
College of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou 325035, China
2
College of Computer Science and Information Technology, University of Anbar, Ramadi 31001, Iraq
3
Faculty of Applied Computing and Technology, Noroff University College, 4608 Kristiansand, Norway
4
Division of Computational Science, Faculty of Science, Prince of Songkla University, Hat Yai, Songkhla 90110, Thailand
5
College of Agriculture, Al-Muthanna University, Samawah 66001, Iraq
6
Research Group of Embedded Systems and Mobile Application in Health Science, College of Arts, Media and Technology, Chiang Mai University, Chiang Mai 50200, Thailand
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(12), 4093; https://doi.org/10.3390/s21124093
Submission received: 21 April 2021 / Revised: 23 May 2021 / Accepted: 4 June 2021 / Published: 14 June 2021
(This article belongs to the Special Issue Internet of Medical Things in Healthcare Applications)

Abstract

:
The Internet of Medical Things (IoMT) is increasingly being used for healthcare purposes. IoMT enables many sensors to collect patient data from various locations and send it to a distributed hospital for further study. IoMT provides patients with a variety of paid programmes to help them keep track of their health problems. However, the current system services are expensive, and offloaded data in the healthcare network are insecure. The research develops a new, cost-effective and stable IoMT framework based on a blockchain-enabled fog cloud. The study aims to reduce the cost of healthcare application services as they are processing in the system. The study devises an IoMT system based on different algorithm techniques, such as Blockchain-Enable Smart-Contract Cost-Efficient Scheduling Algorithm Framework (BECSAF) schemes. Smart-Contract Blockchain schemes ensure data consistency and validation with symmetric cryptography. However, due to the different workflow tasks scheduled on other nodes, the heterogeneous, earliest finish, time-based scheduling deals with execution under their deadlines. Simulation results show that the proposed algorithm schemes outperform all existing baseline approaches in terms of the implementation of applications.

1. Introduction

The World Health Organization has now declared the Coronavirus pandemic a global health emergency (WHO). The vast volume of data collected to fight the COVID-19 pandemic poses many security and privacy issues during this period. The integrity of their authentication is essential to guarantee the protection of patient information in the transition process. In innovative healthcare, proper medical data protection is, therefore, becoming equally crucial. They are motivated by these new concepts, methods, theories, and practices focusing on data protection and privacy solutions for intelligent healthcare industries.
The Internet of Medical Things (IoMT) system is an emerging healthcare monitor paradigm that consists of devices, sensors, wireless network, and fog-cloud computing [1,2]. The sensors could be mobile devices, heartbeat sensors, blood pressure IoT sensors, ECG sensors, and many sensors connected with mobile devices [3]. The invention of the 5G communication technology encourages more and more devices to intercommunicate with external resources. Fog-cloud is a cooperative computing network where remote cloud offers via internet and fog computing provide services at the edge of the network [4]. Many healthcare applications have been developed based on the IoMT system, where many patients practised these applications with mobile devices [5]. Simultaneously, healthcare sensors are directly connected to the fog-cloud servers to perform any healthcare task for patients [6]. However, resource-constrained devices offload compute-intensive tasks to the fog cloud for further execution. Generally, devices act as the thin client, and fog-cloud nodes are thick to process all requests with enriching resources in the IoMT system. This offloading mechanism poses many research challenges for healthcare applications, such as data security, malware attack, denial of services and storage issue with unknown external servers [7].
The fog-cloud computing nodes offer distributed paid healthcare services to execute all classes and type of application [7]. There are three cost models for services: on-demand, on-reserved, and spot-instances based on hourly, weekly, monthly, and yearly duration with different prices. Generally, these applications are workflow applications and require a sequence of processes to run users requests into other orders [8]. When needed, they needed services based on their execution, preferably provisionally for an hour or weekly for actions. Therefore, it is a challenge to design a cost-efficient system for healthcare IoMT applications. Generally, vendors offer these paid services (e.g., fog-cloud, such as Amazon, Cloud, Alibaba, and Azure) to run the applications under their Quality of Service (QoS) requirements [9]. Recently, serverless computing is a model for fog-cloud computing execution in which the server runs applications with a function inside containers. The pricing is based on the application’s actual number of resources per number of performances, not on the volume units’ provisioning servers [9].
Data will encrypt in the IoMT application due to security concerns before they are sent to the server. At the same time, the client will face some problems [10]. The main reason for these is that the service provider has to perform data computation to respond to the client’s requests, so the client must provide the server with the key to decrypt the data before performing the appropriate calculation, affecting the cloud’s data confidentiality [10]. Ethereum is a decentralized, open-source blockchain that allows users to create smart contracts with their own rules and regulations. The platform’s native cryptocurrency is Ether. The Ethereum blockchain is the most widely used in the peer-to-peer network and applications for the distributed system. Ethereume blockchain is a group of blocks (data blocks) that are unalterable and well structured, and it records the logs of all transactions, in the form of a file system, the data blocks in the blockchain stored data in each node [11]. Each block contains data for many transactions, the number of which can vary between different blocks. However, besides the benefit of serverless fog-cloud computing to run IoMT applications, many challenges are being further investigated. The tradeoff between cheap cost-and-demand QoS is a conflicting problem during execution. Due to the external services, the security of the offloaded data of different users has posed a challenge. Therefore, secure and cost-efficient task scheduling in an edge computing, serverless, decentralized system is becoming a challenge [12].
In this paper, the study investigates the cost-efficient task scheduling problem and security mechanism in the blockchain-enabled fog-cloud network [13]. The objective is to minimize the application cost during offloading and scheduling in the blockchain-enabled fog-cloud network. The study considers the workflow healthcare application, where the precedence-constraints sequence constrains all tasks. In the workflow, each task has a deadline and needs to be completed before a given threshold. The study considers the serverless, decentralized fog-cloud network, which consists of different functions which run inside containers. In order to solve the task scheduling problem in the IoMT workflow application, the study proposed the Blockchain-Enable Smart-Contract Cost-Efficient Scheduling Algorithm Framework (BECSAF), which consists of the following schemes: Smart-Contract-Scheme, Function Verification Pool, Task and Function Sequencing, Resource Matching, Smart-Contract Aware Blockchain-Enable Task-Scheduling. Algorithm 1 uses the BECSAF to solve the problem in different steps.
Algorithm 1: BECSAF.
Sensors 21 04093 i001
The study presents the following main contributions to the state of the art:
  • Initially, the study devises the Blockchain-Enable Smart-Contract Cost-Efficient Scheduling Algorithm (BECSAF), consisting of the following schemes: Smart-Contract-Scheme, Function Verification Pool, Task and Function Sequencing, Resource Matching and Blockchain-Consensus-Scheme-Task-Scheduling. Algorithm 1 uses the BECSAF to solve the problem in different steps. The smart-contract scheme designates each connected node in IoMT to avoid any tampering with data in the network. The functions are the resource in IoMT; each function has different execution costs. Therefore, the study verifies the standard of each function before adding to them in the function pool;
  • The study considers the applications that have stringent requirements for their execution, as well as the deadline and resources required for them to complete their process. Therefore, with different deadlines, the study implements task sequencing rules before scheduling them with nodes. The aim is to sort all requested tasks into topological order, and then to execute them in the optimized order;
  • To adopt dynamic changes in the environment, the dynamic preemptive scheduler was suggested. The goal is to schedule tasks for the decentralized functions, minimize the execution cost, and meet the application deadline during processing in the system;
  • To ensure the blockchain validity of distributed data and management of the load balancing situation, the resource leakage efficient blockchain-enabled schemes are devised to avoid any resource and disk-bound application failure in the system.
The remainder of this paper is organized as follows. Section 2 describes the problem description and problem formulation. Section 3 proposes the algorithm framework. Section 4 presents the simulation results in order to evaluate the performance of our algorithm. Section 5 concludes the summary and the intended future work.

2. Related Work

The Internet of Medical Things (IoMT) is a complex system that consists of different technologies (e.g., sensors, communication channels, and computing nodes at local and remote layers) to support healthcare mechanisms for patients. Three types of solution (e.g., static, dynamic and adaptive optimization) have attempted to solve the problem with offloading and scheduling techniques. Different studies achieved different objectives, as shown in Table 1. The problem parameter defines the considered problem through offloading, resource allocation and scheduling, along with the constraints and proposed methodology, according to the considered problem. Generally, all studies considered the fog-cloud network to easily manage the load-balancing between resources with different objectives. The gap-analysis highlights the aspects which studies did not consider in their IoMT application methodologies.
Baresi et al. [1] suggested a serverless-based IoMT system to minimize the resource cost of applications. The serverless system has a lower fog-cloud cost compared to virtual machines. However, they did not consider the security mechanism in the study. Eivy et al. [3], Adzic et al. [7], Adzic et al. [7] and Lynn et al. [8] and van et al. [9] suggested serverless based fog-cloud where instead of virtual machines they run functions inside containers. The objective is to minimize the execution and offloading cost of applications. These studies replaced the existing resource function provisioning methods and achieved multiple objectives, such as energy, delay, lateness and cost. These studies proposed the methodology based on static optimization (e.g., static application partitioning, static scheduling, static resource allocation) to solve the offloading, resource allocation and scheduling problem in the IoMT network. Rez et al. [10] suggested the serverless-based IoMT system could minimize the resource cost of applications. The serverless system has a lower fog-cloud cost compared to virtual machines. However, they did not consider the security mechanism in the study. Yan et al. [11], De-Lara et al. [12], Lakhan et al. [13] and Li et al. [14] and Li et al. [15,16] suggested serverless and container-based application partitioning, resource allocation and scheduling methodology-based linear and dynamic optimization in fog-cloud. The objective is to minimize the execution, energy, response time, and delay and offloading cost of applications. However, as mentioned earlier, these solved the scheduling and offloading problem without considering the security mechanism in the IoMT fog-cloud network.
The blockchain-enabled solution proposed in IoMT could save patient records in their original form. The primary goal of blockchain is to save data from tampering and offer immutable blocks in the distributed system. Many blockchain-enabled fog-cloud systems of IoMT have been suggested to guard the privacy and authenticity of patient data in the system. Lakhan et al. [17] suggested a blockchain-enabled system fora vehicular healthcare ambulance vehicle in the fog-cloud network. The miners in the consensus use symmetric encryption and decryption methods to save the data from network tampering. However, this work handles the fault-tolerant nodes within the execution runtime. The study’s objective is to minimize the security risk and cost of applications during offloading and scheduling in the system. Tariq et al. [17], Tariq et al. [18] and Islam et al. [19] devised a blockchain-enabled IoMT network using an Ethereum decentralized consensus to protect the patients’ IoT big data from tempering. These studies proposed methodologies based on dynamic optimization (i.e., dynamic scheduling) and adaptive optimization (e.g., reinforcement learning, both supervised and unsupervised)to solve the offloading and scheduling problem. The goal is to minimize the risk of data tampering in the distributed network.
The data-offloading-aware data allocation in the blockchain-enabled fog-cloud network system for healthcare sensors was proposed in [4,6,20,21,22,23,24]. These studies suggested a method to protect sensor data and enhances the performance of big-data analysis in the system. Dynamic and adaptive optimization heuristics, such as genetic algorithm and reinforcement aware schemes, were suggested [2,5,23,25,26,27]. The different objectives were obtained, such as the cost, security, response time and energy of sensors devices during offloading and scheduling in the IoMT network. All the studies used resource-provisioning methods and blockchain technology to achieve user cost, communication, and network security [28,29,30,31]. Table 2 represents the mathematical symbol for problem formulation.

3. Problem Description

The study devises the cost-efficient scheduling IoMT system based on the blockchain-enabled fog-cloud network, as shown in Figure 1. The proposed consists of different components: application-level smart-contract, Function Verification, System Manager, Task Sequencing, Task Scheduling, Blockchain-Enable fog-cloud network. The fog cloud offers published functions of the different cloud providers at various specifications. The providers are IBM OpenWhisk, AWS Lambda, Azure Functions, Google Cloud Functions, Alibaba Function Compute, and Kubeless Functions that offer functions, and everything manages by themselves. The System Manager controls all components in the system.
Function, as a service, is a serverless edge computing services category that offers a forum for customers to create, operate, and manage application functionalities without the difficulty of building and maintaining the infrastructure that is usually associated with the creation and launch of an application.

3.1. System Model

The proposed framework consists of the application layer and resource layer, as shown in Figure 2. The application layer is composed of workflow tasks and body sensors. However, the application layer offloads all workflow tasks to the fog-cloud system for further execution due to resource-constraint sensors. Due to security issues at the communication layer, the smart contract is implemented at the application layer, predicting the network situation. If the data size and duration of offloading are greater than their given time and size, the smart contract will generate security to the application layer. Otherwise, if the situation appears to be normal, the whole application will offload to the fog-cloud system.
The resource layer combines the distributed fog nodes and remote cloud, as shown in Figure 2. All the fog nodes communicate with each other via different communication channels. All hospital fog nodes are directly connected to the remote cloud. The System Manager is the primary controller in the system, and handles all execution process inside the system. Blockchain Management creates blocks (e.g., miners) for all transactions at each fog node with different elements. For instance, Ethereum miner (ETH1) is configured with smart-contract, Timestamp, Previous Hash, Hash and Transaction Merkle of v 0 , v 1 , v 2 transactions. Conversely, miner (ETH2), miner (ETH3), miner (ETH4) and miner (ETH5) use the same elements to achieve a secure transaction between client–fog–cloud nodes. The fog cloud executes workflow tasks { v 0 , , v 9 } based on the matched functions { j 0 , , j 9 } from the pool based on the proposed scheduling scheme. The user application assumes that the thin-client and fog-cloud nodes are thick-client. Therefore, a smart contract is a level of agreement between thin-client and thick-clients during offloading and scheduling in the system.

3.2. Problem Formulation

The IoMT workflow application is represented by the directed acyclic graph, i.e., G ( V , E ) . For the two tasks v i , v z V , an edge e ( v i , v z ) E represents the data dependency between task v i and task v z , which means that v i should complete its execution before v z starts. The application G has N number of tasks. Task v 0 is the entry task and v n is the exit task. We use d a t a i to denote the original data volume of task v i , whereas, d a t a i , z denotes the generated data volume from task v i to v z . Each task v d i has a deadline inside the workflow during its processing in the system.
The fog-cloud nodes are represented by { k = 1 , , K . Each computing node can create the number of containers, i.e., { C 1 , , C }. Each node configured with the Ethereum blockchain consensus blocks, i.e., { E T H 1 , , E T H } . The functions pool for the tasks of different cloud vendors is represented by M i = { M i 0 , M i 1 , , M i M i 1 } . M i j C k is the j t h function of node k for v i , which is executed inside the container. B i j C k is the start time of a task at the j t h function in the k t h node, and F i j C k is the finish time of the S i j k . The execution time of a task is calculated by T i j C k e . The cost of each task is determined in the following way: C o s t i j C k is illustrated by the S i j = { T i j e , C o s t i j C k } . The binary assignment of each task v i to the available function is determined as follows.
x i j C k = 1 , S i j C k function chooses for v i 0 , otherwise ,
Equation (1) determines the binary assignment of tasks to the functions.
Smart d a t a i , z = 1 , e = 1 E S m a r t d a t a i , z if tasks data - size equal 0 , Tempered ,
S m a r t d a t a i , z determines the smart-contract rules during communication between tasks and offloading, as determined in Equation (2), whereas, e = 1 E d a t a i , z is the communication of tasks between thin-client and thick-client. The objective is to reduce cost of workflow tasks under their deadline constraints. The considered problem is formulated as follows.
min Z = v i = 1 V j = 1 M i k = 1 K C = 1 C C o s t i j C k × x i j C k .
Z represents the objective function of the study, as defined in Equation (3). Subject to
j = 1 M i k = 1 K x i j C k = 1 , v i V .
Each task is assigned to only function at a computing node, as defined in Equation (4).
F i j C k = j = 1 M i k = 1 K B i j C k + T i j C k e × x i j C k d i , v i V ,
The finish time of tasks must be within their deadlines, defined in Equation (5).

4. Proposed Schemes

The study proposed the Smart-Contract Aware Blockchain-Enable Cost Scheduling Algorithm (BESCAF), consisting of the following schemes: Smart-Contract-Scheme, Function Verification Pool, Task and Function Sequencing, Resource Matching, Blockchain-Consensus-Scheme-Task-Scheduling. Algorithm 1 uses the BECSAF to solve the problem using the following steps.

4.1. Function Verification

This study verifies each vendor function based on different standards and rules, as described in Table 3. All functions share their data through the Simple Object Access Protocol due to the previous limitations of UAV workflow applications (SOAP). The data communication format should be in the form of a JavaScript Object Notation (JSON). In terms of fault operation, the provider can comply and offer an alternative service (e.g., available mood). The time complexity, i.e., O ( n × n ) with various memories, should be optimal (e.g., 512–1024–2048 MB). The execution cost must be measured in milliseconds for each feature.

4.2. Topological Ordering of Tasks

The system initially sorted all tasks based on their deadlines. We sorted all tasks based their deadlines and cost. Algorithm 2 shows the pseudo-code of the ranking of the requested tasks into some topological order.
Algorithm 2: Topological Ordering Scheme.
Sensors 21 04093 i002

4.3. Resource Matching

The paper introduces the resource-matching method which determines the function of different tasks before scheduling the system to sort cost-efficient functions in descending order, at 10 min intervals, from the service pool. The IoMT system can add thousands of functions to the services pool; the algorithm sorts all the best services in terms of cost, in descending order, due to their fast matching time. Algorithm 3 uses the task preference and function preferences as inputs. Based on the cost and task requirements, the algorithm creates the match list, where each task is assigned to a function that can satisfy its needs. In the end, it matches all tasks until the list of tasks becomes empty.
Algorithm 3: Resource Matching.
Sensors 21 04093 i003

4.4. Smart-Contract Aware Ethereum and HEFT Dynamic Scheduling

The smart-contract-enabled client–fog–cloud blockchain performs secure data transactions to different nodes, with the same rules and regulation. In the study, the smart-contract ethereum blockchain performs secure transactions in different steps, as shown in Algorithm 4.
Algorithm 4: Ethereum Smart-Contract-Blockchain.
Sensors 21 04093 i004
Algorithm 4 can be defined in the following steps:
  • According to the mechanism defined in Figure 3, each task required data, i.e., d a t a i , z for its execution on different computing nodes, e.g., k = 1 K . Each node performs a transaction for each task based on the smart-contract rule that the data should be encrypted in the current ethereum using a public key, which the ethereum manager issues. The data sharing between task v i and task v z must be validated by the proof-of-work method, as defined in steps 6 to 8;
  • Each ethereum can perform hashing based on a public key with 128 bits, with the share encrypted data from node k 1 to node k 2 . Node k 2 initially decrypts the previous hash P H into plain-text, and this is executed on node k 2 . After that, the task v 3 scheduled at node k 3 is that the previously matched node should be matched in the node k 3 of previously executed data during precedence constraint data-sharing between tasks v v i , v z ;
  • Figure 3 shows that each ethereum transaction performs and save the data at the particular node, using a function inside the container;
  • The function offers CPU resources, data-storage and memory to run any transaction of the task before offloading to another node for further processing;
  • If the current hash C H of any data which are offloaded to another node must be matched with the P H in the particular timestamp T m s ;
  • Each ethereum E T H can execute multiple transactions, as shown in Figure 3;
  • Algorithm 4 perform a secure ethereum transaction based on the public between different computing nodes, without any loss of generosity.
The study scheduled all tasks based on the dynamic Heterogeneous Earliest Finish Time (HEFT) rules, as defined in Equation (5). After meeting the deadline, the scheduler reschedules all tasks based on the optimal execution cost Z * , based on Equation (3).

5. Performance Evaluation

The simulation parameters were implemented in the serverless evaluation model defined in Table 4.
Table 5 consists of these primitives: Providers, Task, Function, Node, Cost (Memory (MB), * Execution (ms)). The vendors offer different functions to execute tasks, known as function as a service. However, these functions must run inside containers at other computing nodes, such as fog and cloud computing. Therefore, the study considered fog-cloud nodes to execute functions based on user requirements in the IoMT.
Table 5 shows the cost of functions of different vendors. Each of the functions was deployed using the Python 3 runtime with 256 MB of memory. The first generated benchmark function was a factorial function, which calculates the resulting returning factorial 150 times.

5.1. System Implementation

The function as a service-based serverless system implemented the components shown in Figure 4.
The system consists of application layer which offers an interface for the user to initialize their tasks. The resource layer provides functions that are implementied inside containers with an edgex-foundry mechanism. The blockchain is implemented inside the system, as shown in Figure 4, to maintain applications in the distributed environment. We add the functions of two vendors, such as Amazon and Azure, to the systems. FaaS are the functions defined in Table 5. The goal is to execute all tasks on functions with the blockchain-enabled network. The smart-contract and ethereum blockchain E T H are implemented, as shown in Figure 4. The goal is to execute all transactions within blocks of ethereum without any tempering, as shown in Figure 3.

5.1.1. IoMT Sensors

The Heartbeat Sensor is an electronic system used to measure heart rate, i.e., heartbeat velocity. Body temperature control, heart rate and blood pressure are the basic things we do to keep ourselves safe. We use thermometers and a sphygmomanometer to monitor arterial pressure or blood pressure, to calculate body temperature. It is possible to track the heart rate in two ways. The first is to manually check the pulse of the wrists or neck. The second is to use a Heartbeat Sensor. In this project, we have developed a Heart Rate Monitor Device using Arduino and Heartbeat Sensor. The Heartbeat Sensor Concept, the Heartbeat Sensor and the Arduino-Based Heart Rate Monitoring Device, identified using a functional heartbeat sensor. For athletes and patients, controlling heart rate is very important as it determines the state of the heart (just heart rate). There are many methods of calculating heart rate, and electrocardiography is the most reliable. However, using the Pulse Sensor is the best way to track the heart rate. It comes in various shapes and sizes, and offers a quick way to calculate the pulse. Wrist Watches (Smart Watches), Smart Phones, chest belts, etc., are available with heartbeat sensors. The heartbeat is measured in beats per minute or bpm, representing the number of times in a minute that the heart contracts or expands.

5.1.2. IoMT Application

We designed the android IoMT application, which consists of four types of sub-applications, such as cancer-aware monitoring, Heartbeat, ECG, and EEG monitoring. These applications consist of workflow tasks, as shown in Figure 4, and different functions are required to run them. All sensors are connected with an android mobile phone. The mobile phone was connected to the proposed system, which offers services based on different vendor functions and processes them inside containers. The EdgeX Foundry is exploited to design the basic infrastructure of the applications.

5.1.3. Edgex Foundry

EdgeX Foundry is a Linux Foundation-hosted, a vendor-neutral open-source platform offering a popular mobile framework for IoMT edge computing. There is a series of loosely connected functions of different vendors, grouped into different layers inside containers.

5.2. Baseline-Approaches

For analysis of the results, the performances of existing systems and the proposed system were evaluated based on resource and application execution in terms of cost and deadline (QoS). The study implemented three systems with a similar architecture, but, somehow, the resources are different, as is their usage in IoMT workflow applications. The baseline approaches are discussed in the following way.
  • Baseline1: Baseline2: The existing studies [16,17,18,19,20,21,22,23,24] suggested a blockchain-enabled fog-cloud network for healthcare applications. These works considered the containers and virtual machines at any computing node as the resource. The cost model based on different resource-provisioning (on-demand, on-reserve, spot-instance) was implemented to execute the applications. However, the study only considered the on-demand resource-provisioning for the application execution in the performance evaluation part. There are many components to the existing proposed systems, for instance, offloading, resource allocation, blockchain-enabled chaining and smart-contract rules. Therefore, the performance evaluation shows the schemes’ performance in terms of cost for healthcare application via different systems.

5.3. Result Discussion

The execution cost of each application depends upon the usage functions and their properties. For instance, each function has a different memory and execution time. Therefore, the execution cost of each function is additional during its execution. The study executed all tasks within their deadlines with a lower cost than existing techniques. The proposed serverless, decentralized-based fog-cloud could run healthcare applications, fulfilling their quality-of-service requirements. It is hard to balance execution cost and deadlines during scheduling and offloading in the distributed blockchain-enabled fog-cloud network. There are many risk factors in distributed computing, such as failure, security attack, missing deadlines, execution cost and total execution time. Therefore, the study evaluated the performances of existing systems based on the following metrics: failure, security attack, deadline missing, execution cost and total execution time.
The execution cost of each application depends upon the usage functions and their properties. For instance, each function has a different memory and execution time. Therefore, the execution cost of each function is increased during its execution. The study executed all tasks within their deadlines with minimal cost compared to existing techniques. The proposed system meets the quality-of-service requirements of the application. It is hard to balance execution cost and deadlines during scheduling and offloading in the distributed blockchain-enabled fog-cloud network. There are many risk factors in distributed computing such as failure, security attack, missing deadlines, execution cost and total execution time. Therefore, the study evaluated the performances of existing systems based on the following metrics: failure, security attack, deadline missing, execution cost and total execution time. In the fog-cloud network, the tasks’ deadlines also have a critical role in the system. For instance, the healthcare monitoring system uses different, life-critical sensors (e.g., heartbeat, blood-pressure, location-monitoring of an ambulance). Therefore, each task has a critical deadline for its completion or a response from the fog-cloud system. In the second metric, the performance evaluation is analyzed based on the deadline (QoS) of application tasks. Therefore, the task deadlines during scheduling are essential, as well as the cost. If the system responds late, the critical patients who use the heartbeat sensor during critical rating can suffer from any health issue. Figure 5a–d shows that the BECSAF has fewer missed non-critical fewer tasks during processing in the system when considering critical healthcare issues. Existing baseline approaches (Baseline1 and Baseline2) only considered the offloading performance and ignored the system performance in terms of the deadline, leading to many missed critical task deadlines. Therefore, BECSAF considered this important prospect during the processing of application tasks in the system. Figure 5a shows the performances of schemes with the 150 workflow tasks. The proposed method outperforms all existing techniques for workflows with 50, 100, 150 and 165 tasks. The main reason for this is that all existing schemes only considered the resource-allocation strategies with latency requirements. However, existing works did not focus on workload deadline, priority and execution in the IoMT network. Without task sequences, function validation, and dynamic scheduling, IoMT tasks can suffer from lower performances in IoMT.

5.4. Fault-Tolerant

The failure-aware system always reduces the execution cost of applications in the IoMT network. In comparison, there are many types of failure in the system. For instance, the system’s failure consists of transient failure, application failure, network failure, and node failure. However, existing studies did not consider the blockchain failure situation when blocks are overloaded, or data-tempering occurs in IoMT. The study finds the failure-recovery cost in IoMT, which is included in system’s execution cost. Therefore, it should be taken by the system as the cost-constraint for workflows. The fault-tolerant aware blockchain-enable fog-cloud network is preliminary in the serverless, decentralized system. There are many failure possibilities in each node, such as failure of the computing node due to over-balancing, and many reasons for these. Therefore, a failure-aware system can handle any failure transaction in the blockchain-enabled fog-cloud network. This work proposed a Practical Aware-Byzantine-Fault-Tolerance scheme that operates any failure in the system. The loss has a lot of impact on the application cost during scheduling, and if failure remains untreatable, it will lead to an increased recovery cost for the application in the system. Therefore, the study implemented the Practical Aware-Byzantine-Fault-Tolerance scheme in the blockchain–fog–cloud and analyzed the failure ratio of tasks in the system. The study examined the failure-aware performance of the applications and design in different layers and explained the following cases.
Cost of Failure Between User Application G to Request Computing Node K.
Cost of Failure Between Fog Node k 1 to k 2 During Data Travelling.
Cost of Failure Between Fog Node k 2 to k 3 During Data Travelling.
The cost of Failure Between Fog Node k 3 to k 4 During Data Travelling. The detail of the failure defined in the following.
  • Case-1: The failure between application G and requested node k. The users can request any computing node in the fog-cloud network for processing. The request failure or process failure to be analyzed are based on a security attack, calculated based on data size. If the generated tasks’ data, or original data size, increases in terms of its actual size, then the transaction fails. If the communication or computing fails, then the failure cost is incurred during the recovery process. The proposed BECSAF system detects the failure in advance, before offloading the system based on the smart-contract scheme, which identifies any failure before sending it to any node. Therefore, Figure 6 shows that BECSAF incurred the lowest failure cost between the user application and initial computing node during the process;
  • Case-2: The failure between computing node k 3 and computing node k 4 during data travelling for further execution. The request failure or process failure is analyzed based on the security attack, calculated based on data size. If the generated data of tasks, or original data size, increases in terms of its actual size, then the transaction fails. The proposed BECSAF system detects the failure in advance before offloading the system based on the smart-contract scheme, which identifies any loss before sending it to any node. Therefore, Figure 7 shows that BECSAF incurred the lowest failure cost between the user application and initial computing node during the process;
  • Case-3: The failure between computing node k 2 and computing node k 3 during data travelling for further execution. The request failure or process failure is analyzed based on a security attack, calculated based on data size. If the generated data of tasks or original data size increase in terms of actual size, then the transaction fails. The proposed BECSAF system detects the failure before offloading the system based on the smart-contract scheme, which identifies any failure before sending at any node. Therefore, Figure 8 shows that BECSAF incurred the lowest failure cost between the user application and initial computing node during the process;
  • Case-4: The failure between computing node k 3 and computing node k 4 during data travelling for further execution. The users can request any computing node randomly in the fog-cloud network for processing. If the generated data of tasks or original data size increase in terms of its actual size, then the transaction fails. The proposed BECSAF system detects the failure before offloading the system based on the smart-contract scheme, which identifies any failure before sending it to any node. Therefore, Figure 9 shows that BECSAF incurred the lowest failure cost between the user application and initial computing node during the process.

5.5. Blockchain-Enable Fog-Cloud Performance

In the distributed computing, the study organized the cost and deadline performances of the proposed blockchain-enabled fog-cloud system into different levels: user-level, node-to-node level and fog-to-cloud level. Initially, the application offloads the entire application workload to the fog-cloud system in a secure way. The smart-contract scheme detects the execution size before sending it to the fog-cloud system in advance. If the offloaded application tasks have different data sizes, the smart-contract method generated the failure or attack message to the system and application. In this way, advanced failure detection can minimize the failure or attack cost of healthcare applications. Figure 10 shows that the BECSAF outperforms all baseline approaches in terms of attack or failure for IoMT workflow application in the network.
During the sharing of data in the fog-cloud network, the following attributes should be present: authenticate, secure, double spending, and data validation. Therefore, this study implemented the blockchain Blockchain-Consensus Scheme to handle all attributes in the system.
  • Smart-Contract The study implemented smart-contract rules for all blockchain-miners, which can execute many transactions inside the same block during processing. The smart-contract rules avoid any violation, such as double-spending, transaction and data tampering.
  • Sharing Data: All blocks share each transaction data and verify the hashing of the previous block before performing the new transaction for the requested tasks.
  • Block-Resource Leakage. Each block has limited resource space, therefore, there could be leakage if the requested transactions increase their limit. This overloading or leakage will lead to longer matching or authenticate cost for all blocks in the blockchain network. Figure 11 and Figure 12 shows the BECSAF of all transactions of the same application in different blocks controlled based on the proposed scheme and incurred with lower blockchain cost.
Therefore, controlling resource leakage in the blockchain is a necessary job during blockchain-processing for different applications in the system.

6. Conclusions and Future Work

The study devised the novel, cost-efficient and secure IoMT system based on the blockchain-enabled fog cloud. The study’s goal is to minimize the cost of the healthcare application services during processing in the system. The performance evaluation results show that the suggested IoMT system outperforms the existing baseline healthcare systems in terms of cost and security in the distributed healthcare system. Many metrics were evaluated, such as execution cost, deadline, security, fault-tolerance, and resource-leakage during evaluation. From the analysis of the results, the proposed study improved the cost of the of the IoMT application services and provided a secure distributed environment for execution.
In future work, the study will focus on mobility-aware IoMT services with familiar dynamic learning approaches for the different healthcare applications: drone-ambulance system and Internet of Unmanned Healthcare Vehicle Things network. Knowledgeable mobility services are always valuable for the self-adaptive and dynamic environment of healthcare applications.

Author Contributions

Data curation, A.L., T.P.; Formal analysis, M.A.M., A.N.R. and S.K.; Funding acquisition, O.T. and T.P.; Investigation, A.N.R., K.H.A. and O.T.; Methodology, M.A.M., S.K., K.H.A. and O.T.; Project administration, T.P.; Software, A.L.; Supervision, M.A.M. and K.H.A.; Writing–original draft, A.L. and M.A.M.; Writing–review editing, A.L. and M.A.M. In the study, all authors made an equal contribution to complete the work successfully with the considered idea. All authors have read and agreed to the published version of the manuscript.

Funding

This research work was partially supported by Chiang Mai University and the college of arts, media and technology for funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All the experimental data are generated at the local institution servers. Therefore, it cannot be made publicly available for other researchers.

Conflicts of Interest

The authors declare that there is no conflict of interest.

References

  1. Lakhan, A.; Mastoi, Q.U.A.; Elhoseny, M.; Memon, M.S.; Mohammed, M.A. Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using IoT assisted mobile fog cloud. Enterp. Inf. Syst. 2021, 1–23. [Google Scholar] [CrossRef]
  2. Mutlag, A.A.; Abd Ghani, M.K.; Arunkumar, N.A.; Mohammed, M.A.; Mohd, O. Enabling technologies for fog computing in healthcare IoT systems. Future Gener. Comput. Syst. 2019, 90, 62–78. [Google Scholar] [CrossRef]
  3. Hussain, M.; Wei, L.F.; Lakhan, A.; Wali, S.; Ali, S.; Hussain, A. Energy and performance-efficient task scheduling in heterogeneous virtualized cloud computing. Sustain. Comput. Inform. Syst. 2021, 30, 100517. [Google Scholar]
  4. Sajnani, D.K.; Mahesar, A.R.; Lakhan, A.; Jamali, I.A.; Lodhi, R.; Aamir, M. Latency Aware Optimal Workload Assignment in Mobile Edge Cloud Offloading Network. In Proceedings of the 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 7–10 December 2018; pp. 658–662. [Google Scholar]
  5. Abdulkareem, K.H.; Mohammed, M.A.; Salim, A.; Arif, M.; Geman, O.; Gupta, D.; Khanna, A. Realizing an Effective COVID-19 Diagnosis System Based on Machine Learning and IOT in Smart Hospital Environment. IEEE Internet Things J. 2021. [Google Scholar] [CrossRef]
  6. Mutlag, A.A.; Khanapi Abd Ghani, M.; Mohammed, M.A.; Maashi, M.S.; Mohd, O.; Mostafa, S.A.; Abdulkareem, K.H.; Marques, G.; de la Torre Díez, I. MAFC: Multi-agent fog computing model for healthcare critical tasks management. Sensors 2020, 20, 1853. [Google Scholar] [CrossRef] [Green Version]
  7. Adzic, G.; Chatley, R. Serverless computing: Economic and architectural impact. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, Paderborn, Germany, 4–8 September 2017; pp. 884–889. [Google Scholar]
  8. Lynn, T.; Rosati, P.; Lejeune, A.; Emeakaroha, V. A preliminary review of enterprise serverless cloud computing (function-as-a-service) platforms. In Proceedings of the 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Hong Kong, China, 11–14 December 2017; pp. 162–169. [Google Scholar]
  9. Van Eyk, E.; Iosup, A.; Seif, S.; Thömmes, M. The SPEC cloud group’s research vision on FaaS and serverless architectures. In Proceedings of the 2nd International Workshop on Serverless Computing, Las Vegas, NV, USA, 11–15 December 2017; pp. 1–4. [Google Scholar]
  10. Pérez, A.; Moltó, G.; Caballer, M.; Calatrava, A. Serverless computing for container-based architectures. Future Gener. Comput. Syst. 2018, 83, 50–59. [Google Scholar] [CrossRef]
  11. Lakhan, A.; Ahmad, M.; Bilal, M.; Jolfaei, A.; Mehmood, R.M. Mobility Aware Blockchain Enabled Offloading and Scheduling in Vehicular Fog Cloud Computing. IEEE Trans. Intell. Transp. Syst. 2021. [Google Scholar] [CrossRef]
  12. de Lara, E.; Gomes, C.S.; Langridge, S.; Mortazavi, S.H.; Roodi, M. Hierarchical serverless computing for the mobile edge. In Proceedings of the 2016 IEEE/ACM Symposium on Edge Computing (SEC), Washington, DC, USA, 27–28 October 2016; pp. 109–110. [Google Scholar]
  13. Lakhan, A.; Li, X. Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks. Computing 2020, 102, 105–139. [Google Scholar] [CrossRef]
  14. Lakhan, A.; Xiaoping, L. Energy aware dynamic workflow application partitioning and task scheduling in heterogeneous mobile cloud network. In Proceedings of the 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB), Fuzhou, China, 15–17 November 2018; pp. 1–8. [Google Scholar]
  15. Lakhan, A.; Li, X. Content Aware Task Scheduling Framework for Mobile Workflow Applications in Heterogeneous Mobile-Edge-Cloud Paradigms: CATSA Framework. In Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom, Xiamen, China, 16–18 December 2019; pp. 242–249. [Google Scholar]
  16. Ying Wah, T.; Gopal Raj, R.; Lakhan, A.; Mastoi, Q. A Novel Cost-Efficient Framework for Critical Heartbeat Task Scheduling Using the Internet of Medical Things in a Fog Cloud System. Sensors 2020, 20, 441. [Google Scholar]
  17. Khoso, F.H.; Lakhan, A.; Arain, A.A.; Soomro, M.A.; Nizamani, S.Z.; Kanwar, K. A Microservice-Based System for Industrial Internet of Things in Fog-Cloud Assisted Network. Eng. Technol. Appl. Sci. Res. 2021, 11, 7029–7032. [Google Scholar] [CrossRef]
  18. Tariq, N.; Asim, M.; Al-Obeidat, F.; Zubair Farooqi, M.; Baker, T.; Hammoudeh, M.; Ghafir, I. The security of big data in fog-enabled IoT applications including blockchain: A survey. Sensors 2019, 19, 1788. [Google Scholar] [CrossRef] [Green Version]
  19. Islam, N.; Faheem, Y.; Din, I.U.; Talha, M.; Guizani, M.; Khalil, M. A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. Future Gener. Comput. Syst. 2019, 100, 569–578. [Google Scholar] [CrossRef]
  20. Waseem, M.; Lakhan, A.; Jamali, I.A. Data security of mobile cloud computing on cloud server. Open Access Libr. J. 2016, 3, 1–11. [Google Scholar] [CrossRef]
  21. Yánez, W.; Mahmud, R.; Bahsoon, R.; Zhang, Y.; Buyya, R. Data allocation mechanism for Internet-of-Things systems with blockchain. IEEE Internet Things J. 2020, 7, 3509–3522. [Google Scholar] [CrossRef]
  22. Tanwar, S.; Parekh, K.; Evans, R. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J. Inf. Secur. Appl. 2020, 50, 102407. [Google Scholar] [CrossRef]
  23. Khoso, F.H.; Arain, A.A.; Lakhan, A.; Kehar, A.; Nizamani, S.Z. Proposing a Novel IoT Framework by Identifying Security and Privacy Issues in Fog Cloud Services Network. Int. J. 2021, 9, 592–596. [Google Scholar]
  24. Ferrag, M.A.; Maglaras, L.; Janicke, H. Blockchain and its role in the internet of things. In Strategic Innovative Marketing and Tourism; Springer: Berlin/Heidelberg, Germany, 2019; pp. 1029–1038. [Google Scholar]
  25. Leuciuc, F.V.; Craciun, M.D.; Holubiac, I.S.; Mohammed, M.A.; Abdulkareem, K.H.; Pricop, G. Statistical Medical Pattern Recognition for Body Composition Data Using Bioelectrical Impedance Analyzer. CMC Comput. Mater. Cont. 2021, 67, 2601–2617. [Google Scholar]
  26. Lahoura, V.; Singh, H.; Aggarwal, A.; Sharma, B.; Mohammed, M.A.; Damaševičius, R.; Kadry, S.; Cengiz, K. Cloud computing-based framework for breast cancer diagnosis using extreme learning machine. Diagnostics 2021, 11, 241. [Google Scholar] [CrossRef]
  27. Mohammed, M.A.; Abdulkareem, K.H.; Mostafa, S.A.; Ghani, M.K.A.; Maashi, M.S.; Garcia-Zapirain, B.; Oleagordia, I.; Alhakami, H.; Al-Dhief, F.T. Voice pathology detection and classification using convolutional neural network model. Appl. Sci. 2020, 10, 3723. [Google Scholar] [CrossRef]
  28. Mostafa, S.A.; Gunasekaran, S.S.; Mustapha, A.; Mohammed, M.A.; Abduallah, W.M. Modelling an adjustable autonomous multi-agent internet of things system for elderly smart home. In Proceedings of the International Conference on Applied Human Factors and Ergonomics, Washington, DC, USA, 24–28 July 2019; pp. 301–311. [Google Scholar]
  29. Makhadmeh, S.N.; Al-Betar, M.A.; Alyasseri, Z.A.A.; Abasi, A.K.; Khader, A.T.; Damaševičius, R.; Mohammed, M.A.; Abdulkareem, K.H. Smart Home Battery for the Multi-Objective Power Scheduling Problem in a Smart Home Using Grey Wolf Optimizer. Electronics 2021, 10, 447. [Google Scholar] [CrossRef]
  30. Podder, A.K.; Al Bukhari, A.; Islam, S.; Mia, S.; Mohammed, M.A.; Kumar, N.M.; Cengiz, K.; Abdulkareem, K.H. IoT based smart agrotech system for verification of Urban farming parameters. Microprocess. Microsystems 2021, 82, 104025. [Google Scholar] [CrossRef]
  31. Elhoseny, M.; Mohammed, M.A.; Mostafa, S.A.; Abdulkareem, K.H.; Maashi, M.S.; Garcia-Zapirain, B.; Mutlag, A.A.; Maashi, M.S. A new multi-agent feature wrapper machine learning approach for heart disease diagnosis. Comput. Mater. Contin 2021, 67, 51–71. [Google Scholar] [CrossRef]
Figure 1. Smart-Contract Ethereum Aware Client-Fog-Cloud Assisted Healthcare System.
Figure 1. Smart-Contract Ethereum Aware Client-Fog-Cloud Assisted Healthcare System.
Sensors 21 04093 g001
Figure 2. System Model.
Figure 2. System Model.
Sensors 21 04093 g002
Figure 3. Smart-Contract Ethereum Mechanism in Distributed Client-Fog-Cloud.
Figure 3. Smart-Contract Ethereum Mechanism in Distributed Client-Fog-Cloud.
Sensors 21 04093 g003
Figure 4. Smart-Contract-Ethereum Enable Client-Fog-Cloud Assisted System for IOMT.
Figure 4. Smart-Contract-Ethereum Enable Client-Fog-Cloud Assisted System for IOMT.
Sensors 21 04093 g004
Figure 5. IoMT Workflow Application Execution Cost in Fog-Cloud System.
Figure 5. IoMT Workflow Application Execution Cost in Fog-Cloud System.
Sensors 21 04093 g005
Figure 6. Cost of Failure Between User Application G to Request Computing Node K.
Figure 6. Cost of Failure Between User Application G to Request Computing Node K.
Sensors 21 04093 g006
Figure 7. Cost of Failure Between Fog Node k 1 to k 2 During Data Travelling.
Figure 7. Cost of Failure Between Fog Node k 1 to k 2 During Data Travelling.
Sensors 21 04093 g007
Figure 8. Cost of Failure Between Fog Node k 2 to k 3 During Data Travelling.
Figure 8. Cost of Failure Between Fog Node k 2 to k 3 During Data Travelling.
Sensors 21 04093 g008
Figure 9. Cost of Failure Between Fog Node k 3 to k 4 During Data Travelling.
Figure 9. Cost of Failure Between Fog Node k 3 to k 4 During Data Travelling.
Sensors 21 04093 g009
Figure 10. Smart-Contract.
Figure 10. Smart-Contract.
Sensors 21 04093 g010
Figure 11. Proof of Sake for IoMT workflow Transactions in Blockchain-Enabled Fog-Cloud Network.
Figure 11. Proof of Sake for IoMT workflow Transactions in Blockchain-Enabled Fog-Cloud Network.
Sensors 21 04093 g011
Figure 12. Resource Capacity Leakage of Blocks in Blockchain.
Figure 12. Resource Capacity Leakage of Blocks in Blockchain.
Sensors 21 04093 g012
Table 1. Existing Blockchain-Enable IoMT System and Objective.
Table 1. Existing Blockchain-Enable IoMT System and Objective.
StudyProblemConstraintsMethodologyObjective
[1]OffloadingEnergyStatic OptimizationMin.Power
[3]OffloadingDelayStatic OptimizationMin.Delay
[7]OffloadingTardinessStatic OptimizationMin.Delay
[8]AllocationTardinessStatic OptimizationMin.Tardiness
[9]ResourceLatenessStatic OptimizationMin.Tardiness
[10,11]SchedulingExecution-Time, costLinear-OptimizationLateness
[12,13,14]SchedulingExecution-Time, costDynamic-OptimizationScale-up
[15]OffloadingSecurityDynamic-OptimizationMin.Risk
[16]Task Alloc.SecurityDynamic-OptimizationMin.Risk
[17]Task Alloc.SecurityDynamic-OptimizationMin.Risk
[18]Resource Alloc.SecurityDynamic-OptimizationMin.Risk
[19]OffloadingSecurityDynamic-OptimizationMin.Risk
[20]Task Alloc.SecurityAdaptive-OptimizationMin.Cost
[21,22]Task Alloc.SecurityAdaptive-OptimizationMin.Cost
[23]OffloadingSecurity, costAdaptive-OptimizationMin.Risk
[24]OffloadingSecurityDynamic-OptimizationMin.Risk
ProposedSchedulingSecurity, costDynamic-OptimizationFunctions
Table 2. Mathematical Notation.
Table 2. Mathematical Notation.
NotationDescription
GIoMT workflow application
VNumber of application tasks G
v i i t h workflow application task G
v i d The task deadline v i
KNumber of fog-cloud computing nodes
kThe k t h computing node of K
ϵ k The resource capability of k t h node
MPool of functions
j j t h function of node k
CTotal number of containers in node k
C k The C t h container of node k
BNumber of blocks in the blockchain
B 1 The i t h block of B
B c a p a c i t y Capacity of block B
Table 3. Rules and Standard for Functions to be Part of Proposed System.
Table 3. Rules and Standard for Functions to be Part of Proposed System.
Services FunctionsStandardsRunTimeVendorFailureComplexityMemoryExecution
j 1 SOAPJSONAzureAvailability O ( n × n ) 512–1024 MBMilliseconds
j 2 SOAPXMLAmazonAvailability O ( n × n ) 512–1024 MBMilliseconds
j 3 SOAPXMLAliBabaAvailability O ( n × n ) 512–1024 MBMilliseconds
j 4 SOAPJSONIBMAvailability O ( n × n ) 512–1024 MBMilliseconds
j 5 SOAPJSONKublessAvailability O ( n × n ) 512–1024 MBMilliseconds
j 6 SOAPJSONGoogleAvailability O ( n × n ) 512–1024 MBMilliseconds
j 7 SOAPXML/JSONAzureAvailability O ( n × n ) 512–1024 MBMilliseconds
j 8 SOAPJSONAmazonAvailability O ( n × n ) 512–1024 MBMilliseconds
j 9 SOAPJSONAzureAvailability O ( n × n ) 512–1024 MBMilliseconds
Table 4. Simulation Parameters.
Table 4. Simulation Parameters.
Simulation ParametersValues
Windows OSLinux Amazon GenyMotion
SensorsHeartbeat and Blood-Pressure
Centos 7 RuntimeX86-64-bit AMI
LanguagesJAVA, XML, Python
Android PhoneGoogle Nexus 4, 5, and 7S
Experiment Repetition160 times
Simulation Duration12 h
Simulation MonitoringEvery 1 h
Table 5. Function of Different Vendors.
Table 5. Function of Different Vendors.
ProvidersTaskFunctionNodeCost (Memory (MB) × Execution (ms))Z
IBM OpenWhisk v 1 j 1 k 1 512 (MB)0.3
IBM OpenWhisk v 2 j 2 k 1 1024 (MB)0.7
IBM OpenWhisk v 3 j 3 k 1 2048 (MB)0.11
AWS Lambda v 4 j 4 k 2 512 (MB)0.5
AWS Lambda v 1 j 5 k 2 1024–2048 (MB)0.4–0.9
Azure Functions v 6 j 6 k 3 1024 (MB)0.8
Azure Functions v 7 j 7 k 3 2048 (MB)0.14
Google Cloud Functions v 8 j 8 k 3 1536 (MB)0.17
AliBaba Function Compute v 9 j 9 k 3 2048 (MB)0.16
Kubeless Functions v 10 j 10 k 1 4096 (MB)3
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lakhan, A.; Mohammed, M.A.; Rashid, A.N.; Kadry, S.; Panityakul, T.; Abdulkareem, K.H.; Thinnukool, O. Smart-Contract Aware Ethereum and Client-Fog-Cloud Healthcare System. Sensors 2021, 21, 4093. https://doi.org/10.3390/s21124093

AMA Style

Lakhan A, Mohammed MA, Rashid AN, Kadry S, Panityakul T, Abdulkareem KH, Thinnukool O. Smart-Contract Aware Ethereum and Client-Fog-Cloud Healthcare System. Sensors. 2021; 21(12):4093. https://doi.org/10.3390/s21124093

Chicago/Turabian Style

Lakhan, Abdullah, Mazin Abed Mohammed, Ahmed N. Rashid, Seifedine Kadry, Thammarat Panityakul, Karrar Hameed Abdulkareem, and Orawit Thinnukool. 2021. "Smart-Contract Aware Ethereum and Client-Fog-Cloud Healthcare System" Sensors 21, no. 12: 4093. https://doi.org/10.3390/s21124093

APA Style

Lakhan, A., Mohammed, M. A., Rashid, A. N., Kadry, S., Panityakul, T., Abdulkareem, K. H., & Thinnukool, O. (2021). Smart-Contract Aware Ethereum and Client-Fog-Cloud Healthcare System. Sensors, 21(12), 4093. https://doi.org/10.3390/s21124093

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop