Advertisement

Towards reliable and trustful personal health record systems: a case of cloud-dew architecture based provenance framework

  • Fakhri Alam Khan
  • Sadaf Shaheen
  • Muhammad AsifEmail author
  • Atta Ur Rahman
  • Muhammad Imran
  • Saeed Ur Rehman
Original Research
  • 22 Downloads

Abstract

Personal health records (PHR) system serves not just as static repositories for data but it also combines knowledge and software tools with patients’ data that results in empowering patients to become active participants in their own healthcare management by providing their own medical history. In this research, a cloud-dew Architecture based Layered Provenance Framework for PHR system is proposed that goes beyond the trivial network/storage/service concept to a new micro-service level concept offering high scalability and availability in vertically distributed computing hierarchy. It pushes the frontiers of computing applications, data, and low-level services away from centralized virtual nodes to the end users. In response to this new micro-service model, a study was conducted of initially scrutinizing the cloud-dew architecture and ascertaining a list of requirements for the collection of provenance. We have observed the different layers of the cloud-dew architecture for identifying the requirements while keeping in view the several characteristics of cloud-dew architecture such as abstraction, modularity, etc. A lightweight and cost-efficient provenance framework is designed and established for its accomplishment. In addition, this proposed framework also provides services such as storage, query, and visualization of provenance besides highlighting the identified list of requirements. To measure the benefits of enabling provenance in Dew Computing, the pre-collected provenance and services of the proposed framework are utilized.

Keywords

PHR Dew computing Cloud Architecture Chi square Life-science 

Notes

References

  1. Bilal M, Asif M, Bashir A (2018) Assessment of secure OpenID-Based DAAA protocol for avoiding session hijacking in web applications. Secur Commun Netw.  https://doi.org/10.1155/2018/6315039 Google Scholar
  2. Buneman P, Khanna S, Wang-Chiew T (2001) Why and where: a characterization of data provenance. International conference on database theory. Springer, New York, pp 316–330Google Scholar
  3. Cui Y, Widom J, Wiener JL (2000) Tracing the lineage of view data in a warehousing environment. ACM Trans Database Syst (TODS) 25:179–227CrossRefGoogle Scholar
  4. Dunlop L (2006) ) Electronic health records: Interoperability challenges Patients’ right to privacy. Shidler JL Com & Tech 3:1Google Scholar
  5. Endo PT, Rodrigues M, Gonçalves GE, Kelner J, Sadok DH, Curescu C (2016) High availability in clouds: systematic review and research challenges. J Cloud Comput 5:16.  https://doi.org/10.1186/s13677-016-0066-8 CrossRefGoogle Scholar
  6. Endsley S, Kibbe DC, Linares A, Colorafi K (2006) An introduction to personal health records. Fam Pract Manag 13:57Google Scholar
  7. Gibson A, Gamble M, Wolstencroft K, Oinn T, Goble C, Belhajjame K, Missier P (2009) The data playground: an intuitive workflow specification environment. Fut Gener Comput Syst 25:453–459.  https://doi.org/10.1109/e-Science.2007.19 CrossRefGoogle Scholar
  8. Haas S, Wohlgemuth S, Echizen I, Sonehara N, Müller G (2011) Aspects of privacy for electronic health records. Int J Med Inf 80:e26–e31.  https://doi.org/10.1016/j.ijmedinf.2010.10.001 CrossRefGoogle Scholar
  9. Houlding SW (2001) XML—an opportunity for <meaningful> data standards in the geosciences. Comput Geosci 27:839–849.  https://doi.org/10.1016/S0098-3004(00)00145-X CrossRefGoogle Scholar
  10. Imran M, Hlavacs H, Haq IU, Jan B, Khan FA, Ahmad A (2017) Provenance based data integrity checking and verification in cloud environments. PloS One 12:e0177576.  https://doi.org/10.1371/journal.pone.0177576 CrossRefGoogle Scholar
  11. Imran M, Hlavacs H, Khan FA, Jabeen S, Khan FG, Shah S, Alharbi M (2018) Aggregated provenance and its implications in clouds. Fut Gener Comput Syst 81:348–358.  https://doi.org/10.1016/j.future.2017.10.027 CrossRefGoogle Scholar
  12. Khan FA, Han Y, Pllana S, Brezany P (2008) Provenance support for grid-enabled scientific workflows. In: 2008 Fourth International Conference on Semantics, Knowledge and Grid, pp 173–180. http://doi.org/10.1109/SKG.2008.86
  13. Khan FA, Rahman A, Alharbi M, Qawqzeh YK (2018) Awareness and willingness to use PHR: a roadmap towards cloud-dew architecture based PHR framework. Multimedia Tools Appl.  https://doi.org/10.1007/s11042-018-6692-z Google Scholar
  14. Liu LS, Shih PC, Hayes GR (2011) Barriers to the adoption and use of personal health record systems. In: Proceedings of the 2011 Conference, pp 363–370. http://doi.org/10.1145/1940761.1940811
  15. Rehman HU, Asif M, Ahmad M (2017) Future applications and research challenges of IOT. In: 2017 International conference on information and communication technologies (ICICT). IEEE, Pakistan, pp 68–74CrossRefGoogle Scholar
  16. Ristov S, Cvetkov K, Gusev M (2016) Implementation of a horizontal scalable balancer for dew computing services. Scalable Comput: Pract Exp 17:79–90.  https://doi.org/10.12694/scpe.v17i2.1157 Google Scholar
  17. Sohaib O, Solanki H, Dhaliwa N, Hussain W, Asif M (2018) Integrating design thinking into extreme programming. J Ambient Intell Hum Comput 25:1–8.  https://doi.org/10.1007/s12652-018-0932-y Google Scholar
  18. Waegemann CP (2002) Status report 2002: electronic health records Boston: Medical Records InstituteGoogle Scholar
  19. Wang Y (2015) The initial definition of dew computing Dew Computing ResearchGoogle Scholar
  20. Wang Y (2016) Definition and categorization of dew computing. Open J Cloud Comput (OJCC) 3:1–7Google Scholar
  21. Wang YR, Madnick SE (1990) A polygen model for heterogeneous database systems: the source tagging perspectiveGoogle Scholar
  22. Win KT, Fulcher JA (2007) Consent mechanisms for electronic health record systems: a simple yet unresolved issue. J Med Syst 31:91–96.  https://doi.org/10.1007/s10916-006-9030-3 CrossRefGoogle Scholar
  23. Winkelman WJ, Leonard KJ (2004) Overcoming structural constraints to patient utilization of electronic medical records: a critical review and proposal for an evaluation framework. J Am Med Inform Assoc 11:151–161.  https://doi.org/10.1197/jamia.M1274 CrossRefGoogle Scholar
  24. Woodruff A, Stonebraker M (1997) Supporting fine-grained data lineage in a database visualization environment. In: Proceedings 13th International Conference on Data Engineering, pp 91–102. http://doi.org/10.1109/ICDE.1997.581742
  25. Zhang OQ, Kirchberg M, Ko RK, Lee BS (2011) How to track your data: the case for cloud computing provenance. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science, pp 446–453. http://doi.org/10.1109/CloudCom.2011.66

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  • Fakhri Alam Khan
    • 1
  • Sadaf Shaheen
    • 1
  • Muhammad Asif
    • 2
    Email author
  • Atta Ur Rahman
    • 1
  • Muhammad Imran
    • 3
  • Saeed Ur Rehman
    • 4
  1. 1.Institute of Management SciencesPeshawarPakistan
  2. 2.Department of Computer Science, National Textile UniversityFaisalabadPakistan
  3. 3.Institute of Business and Management Sciences, The University of AgriculturePeshawarPakistan
  4. 4.Department of Electrical and Computer Engineering, COMSATS University Islamabad, Attock CampusAttockPakistan

Personalised recommendations