Advertisement

Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities

  • Jesus Castillo Cabello
  • Hadis Karimipour
  • Amir Namavar Jahromi
  • Ali Dehghantanha
  • Reza M. PariziEmail author
Chapter
  • 36 Downloads

Abstract

Cyber-physical systems (CPS) are physical systems with a computing and communication center that monitors,coordinates and integrate the operations of said system. CPS enables the organizations to live monitor networks, patients, and systems. This live monitoring, generates vast amount of data everyday and makes the new title called big-data. The data, itself without any processing, is useless, so, machine learning and data mining techniques are required to extract valuable information from it. In this chapter, the importance of using cyber-physical systems and big-data in healthcare sector, as a critical area, is described and the challenges and opportunities of them are discussed. To achieve this goal, the massive number of publications from various well-known libraries were extracted and investigated.

References

  1. 1.
    E.A. Lee, S.A. Seshia, Introduction to Embedded Systems. A Cyber-Physical Systems Approach, 2nd edn. (MIT Press, Cambridge, 2017)Google Scholar
  2. 2.
    E.R. Griffor, C. Greer, D.A. Wollman, M.J. Burns, Framework for cyber-physical systems: volume 1, overview. Tech. Rep., National Institute of Standards and Technology, Gaithersburg (2017)CrossRefGoogle Scholar
  3. 3.
    R. Rajkumar, I. Lee, L. Sha, J. Stankovic, Cyber-physical systems: the next computing revolution, in Design Automation Conference (2010), pp. 731–736Google Scholar
  4. 4.
    J. Sakhnini, H. Karimipour, A. Dehghantanha, Smart grid cyber attacks detection using supervised learning and heuristic feature selection, in IEEE SEGE 2019 (2019)Google Scholar
  5. 5.
    W.L. Chang, NIST big data interoperability framework: volume 1, definitions, special publication (NIST SP)-1500–1, (2015)Google Scholar
  6. 6.
    A. Oussous, F.Z. Benjelloun, A. Ait Lahcen, S. Belfkih, Big data technologies: a survey. J. King Saud Univ. Comput. Inf. Sci. 30(4), 431–448 (2018)Google Scholar
  7. 7.
    J. Zhang, W. Shi, Y. Duan, S. Liu, Industrial big data analytics, in 2015 IEEE/ACM 1st International Workshop on Big Data Software Engineering (2015), pp. 1–3Google Scholar
  8. 8.
    G. Harerimana, B. Jang, J.W. Kim, H.K. Park, Health big data analytics: a technology survey. IEEE Access 6, 65661–65678 (2018)CrossRefGoogle Scholar
  9. 9.
    D.W. McKee, S.J. Clement, J. Almutairi, J. Xu, Survey of advances and challenges in intelligent autonomy for distributed cyber-physical systems. CAAI Trans. Intell. Technol. 3(2), 75–82 (2018)CrossRefGoogle Scholar
  10. 10.
    Y. Zhang, M. Qiu, S. Member, C.-W. Tsai, Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 1–8 (2015)Google Scholar
  11. 11.
    Y. Wang, L.A. Kung, T.A. Byrd, Big data analytics: understanding its capabilities and potential benefits for healthcare organizations. Technol. Forecast. Soc. Chang. 126, 3–13 (2018)CrossRefGoogle Scholar
  12. 12.
    A. Dehghantanha, R. Mahmod, N. Udzir, Z. Ahmad Zulkarnain, User-centered privacy and trust model in cloud computing systems, in Computer and Network Technology (2010), pp. 326–332Google Scholar
  13. 13.
    J. Archenaa, E.A. Anita, A survey of big data analytics in healthcare and government. Proc. Comput. Sci. 50, 408–413 (2015)CrossRefGoogle Scholar
  14. 14.
    P. Kaur, M. Sharma, M. Mittal, Big data and machine learning based secure healthcare framework. Proc. Comput. Sci. 132, 1049–1059 (2018)CrossRefGoogle Scholar
  15. 15.
    F.J. Wu, Y.F. Kao, Y.C. Tseng, From wireless sensor networks towards cyber physical systems. Pervasive Mob. Comput. 7(4), 397–413 (2011)CrossRefGoogle Scholar
  16. 16.
    R.A. Ariyaluran Habeeb, F. Nasaruddin, A. Gani, I.A. Targio Hashem, E. Ahmed, M. Imran, Real-time big data processing for anomaly detection: a survey. Int. J. Inf. Manag. 45, 289–307 (2019)CrossRefGoogle Scholar
  17. 17.
    H. Karimipour, S. Member, V. Dinavahi, S. Member, Parallel domain-decomposition-based distributed state estimation for large-scale power systems. IEEE Trans. Ind. Appl. 52(2), 1265–1269 (2016)Google Scholar
  18. 18.
    V. Palanisamy, R. Thirunavukarasu, Implications of big data analytics in developing healthcare frameworks - a review. J. King Saud Univ. Comput. Inf. Sci. 31, 415–425 (2019)Google Scholar
  19. 19.
    R.M. Parizi, L. Guo, Y. Bian, A. Azmoodeh, A. Dehghantanha, K.R. Choo, Cyberpdf: smart and secure coordinate-based automated health pdf data batch extraction, in 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE) (2018), pp. 106–111Google Scholar
  20. 20.
    R. Patgiri, A. Ahmed, Big data: The v’s of the game changer paradigm, in 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (2016), pp. 17–24Google Scholar
  21. 21.
    W. Inoubli, S. Aridhi, H. Mezni, M. Maddouri, E. Mephu Nguifo, An experimental survey on big data frameworks. Futur. Gener. Comput. Syst. 86, 546–564 (2018)CrossRefGoogle Scholar
  22. 22.
    A. Pashazadeh, N.J. Navimipour, Big data handling mechanisms in the healthcare applications: a comprehensive and systematic literature review. J. Biomed. Inform. 82, 47–62 (2018)CrossRefGoogle Scholar
  23. 23.
    T. Estrada, B. Zhang, P. Cicotti, R.S. Armen, M. Taufer, A scalable and accurate method for classifying protein–ligand binding geometries using a MapReduce approach. Comput. Biol. Med. 42, 758–771 (2012)CrossRefGoogle Scholar
  24. 24.
    Z.-H. You, J.-Z. Yu, L. Zhu, S. Li, Z.-K. Wen, A MapReduce based parallel SVM for large-scale predicting protein–protein interactions. Neurocomputing 145, 37–43 (2014)CrossRefGoogle Scholar
  25. 25.
    H. Chen, H. Zhao, J. Shen, R. Zhou, Q. Zhou, Supervised machine learning model for high dimensional gene data in colon cancer detection, in 2015 IEEE International Congress on Big Data (2015), pp. 134–141Google Scholar
  26. 26.
    M. Priya, P.R. Kumar, A novel intelligent approach for predicting atherosclerotic individuals from big data for healthcare. Int. J. Protein Res. 53(24), 7517–7532 (2015)CrossRefGoogle Scholar
  27. 27.
    N. Mehta, A. Pandit, Concurrence of big data analytics and healthcare: a systematic review. Int. J. Med. Inform. 114, 57–65 (2018)CrossRefGoogle Scholar
  28. 28.
    W. Raghupathi, V. Raghupathi, Big data analytics in healthcare: promise and potential. Health Inf. Sci. Syst. 2, 3 (2014)CrossRefGoogle Scholar
  29. 29.
    B.A. Banerjee, K.K. Venkatasubramanian, T. Mukherjee, S.K.S. Gupta, Ensuring safety, security, and cyber - physical systems. Proc. IEEE 100(1), 283–299 (2012)CrossRefGoogle Scholar
  30. 30.
    K. Abouelmehdi, A. Beni-Hssane, H. Khaloufi, M. Saadi, Big data security and privacy in healthcare: a review. Proc. Comput. Sci. 113, 73–80 (2017)CrossRefGoogle Scholar
  31. 31.
    P.G. Shinde, P. Motwani, P. Shinde, Survey on malware detection techniques. Int. J. Mod. Trends Eng. Res. 74–79 (2015)Google Scholar
  32. 32.
    S. Mohammadi, V. Desai, H. Karimipour, Multivariate mutual information-based feature selection for cyber intrusion detection, in 2018 IEEE Electrical Power and Energy Conference (EPEC 2018) (2018)Google Scholar
  33. 33.
    E.M. Dovom, A. Azmoodeh, A. Dehghantanha, D.E. Newton, R.M. Parizi, H. Karimipour, Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit. 97, 1–7 (2019)CrossRefGoogle Scholar
  34. 34.
    B. MohammadReza, F. Derakhshan, H. Karimipour, A layered intrusion detection system for critical infrastructure using machine learning, in IEEE International Conference on Smart Energy Grid Engineering, Oshawa (2019), pp. 1–5Google Scholar
  35. 35.
    S. Geris, H. Karimipour, A feature selection-based approach for joint cyber-attack detection and state estimation, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa (2019), pp. 1–5Google Scholar
  36. 36.
    S. Mohammadi, H. Mirvaziri, M. Ghazizadeh-Ahsaee, H. Karimipour, Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 44, 80–88 (2019)Google Scholar
  37. 37.
    H. Karimipour, A. Dehghantanha, R.M. Parizi, K.R. Choo, H. Leung, A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778–80788 (2019)CrossRefGoogle Scholar
  38. 38.
    H. Karimipour, V. Dinavahi, Robust massively parallel dynamic state estimation of power systems against cyber-attack. IEEE Access 6, 2984–2995 (2017)CrossRefGoogle Scholar
  39. 39.
    C.A. Sagaran, A. Dehghantanha, R. Ramli, A user-centered context-sensitive privacy model in pervasive systems, in 2010 Second International Conference on Communication Software and Networks (2010), pp. 78–82Google Scholar
  40. 40.
    J. Wu, H. Li, S. Cheng, Z. Lin, The promising future of healthcare services: when big data analytics meets wearable technology. Inf. Manag. 53(8), 1020–1033 (2016). Big Data CommerceGoogle Scholar
  41. 41.
    A.T. Gjerdrum, H.D. Johansen, D. Johansen, Implementing informed consent as information-flow policies for secure analytics on ehealth data: principles and practices, in Proceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE 2016) (2016), pp. 107–112Google Scholar
  42. 42.
    H.M. Ruzbahani, H. Karimipour, Optimal incentive-based demand response management of smart households, in Conference Record - Industrial and Commercial Power Systems Technical Conference, vol. 2018 (2018), pp. 1–7Google Scholar
  43. 43.
    H. Karimipour, V. Dinavahi, On false data injection attack against dynamic state estimation on smart power grids, in 2017 5th IEEE International Conference on Smart Energy Grid Engineering (SEGE 2017) (2017), pp. 388–393Google Scholar
  44. 44.
    J. Yao, A ten-year review of granular computing, in 2007 IEEE International Conference on Granular Computing (GRC 2007) (2007), pp. 734–734Google Scholar
  45. 45.
    T. Shah, A. Yavari, K. Mitra, S. Saguna, P.P. Jayaraman, F. Rabhi, R. Ranjan, Remote health care cyber-physical system: quality of service (QoS) challenges and opportunities, IET Cyber-Phys. Syst. Theory Appl. 1(1), 40–48 (2016)CrossRefGoogle Scholar
  46. 46.
    J. Zhang, G.Y. Tian, A.M. Marindra, A.I. Sunny, A.B. Zhao, A review of passive RFID tag antenna-based sensors and systems for structural health monitoring applications. Sensors 17(2), 1–33 (2017)CrossRefGoogle Scholar
  47. 47.
    M. Chen, Y. Ma, J. Song, C.F. Lai, B. Hu, Smart clothing: connecting human with clouds and big data for sustainable health monitoring. Mobile Netw. Appl. 21(5), 825–845 (2016)CrossRefGoogle Scholar
  48. 48.
    S. Walker-Roberts, M. Hammoudeh, A. Dehghantanha, A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6, 25167–25177 (2018)CrossRefGoogle Scholar
  49. 49.
    M. Conti, T. Dargahi, A. Dehghantanha, Cyber Threat Intelligence: Challenges and Opportunities (Springer, Berlin, 2018), pp. 1–6CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Smart Cyber-Physical System LabUniversity of GuelphGuelphCanada
  2. 2.College of Computer and Software EngineeringKennesaw State UniversityMariettaUSA

Personalised recommendations