Algorithm 1: FTSB algorithm |
Input: ∑Vvi=1, FaaS preference list ∑j=1M; Output: minZ 1 begin ![]() 13 End Main |
These days, healthcare applications on the Internet of Medical Things (IoMT) network have been growing to deal with different diseases via different sensors. These healthcare sensors are connecting to the various healthcare fog servers. The hospitals are geographically distributed and offer different services to the patients from any ubiquitous network. However, due to the full offloading of data to the insecure servers, two main challenges exist in the IoMT network. (i) Data security of workflows healthcare applications between different fog healthcare nodes. (ii) The cost-efficient and QoS efficient scheduling of healthcare applications in the IoMT system. This paper devises the Cost-Efficient Service Selection and Execution and Blockchain-Enabled Serverless Network for Internet of Medical Things system. The goal is to choose cost-efficient services and schedule all tasks based on their QoS and minimum execution cost. Simulation results show that the proposed outperform all existing schemes regarding data security, validation by 10%, and cost of application execution by 33% in IoMT.
Citation: Abdullah Lakhan, Mazhar Ali Dootio, Ali Hassan Sodhro, Sandeep Pirbhulal, Tor Morten Groenli, Muhammad Saddam Khokhar, Lei Wang. Cost-efficient service selection and execution and blockchain-enabled serverless network for internet of medical things[J]. Mathematical Biosciences and Engineering, 2021, 18(6): 7344-7362. doi: 10.3934/mbe.2021363
[1] | Qinwang Niu, Haoyue Li, Yu Liu, Zhibo Qin, Li-bo Zhang, Junxin Chen, Zhihan Lyu . Toward the Internet of Medical Things: Architecture, trends and challenges. Mathematical Biosciences and Engineering, 2024, 21(1): 650-678. doi: 10.3934/mbe.2024028 |
[2] | Mazhar Ali Dootio, Abdullah Lakhan, Ali Hassan Sodhro, Tor Morten Groenli, Narmeen Zakaria Bawany, Samrat Kumar . Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing. Mathematical Biosciences and Engineering, 2022, 19(1): 513-536. doi: 10.3934/mbe.2022024 |
[3] | Jiahe Xu, Yuan Tian, Tinghuai Ma, Najla Al-Nabhan . Intelligent manufacturing security model based on improved blockchain. Mathematical Biosciences and Engineering, 2020, 17(5): 5633-5650. doi: 10.3934/mbe.2020303 |
[4] | Bin Wang, Fagui Liu . Task arrival based energy efficient optimization in smart-IoT data center. Mathematical Biosciences and Engineering, 2021, 18(3): 2713-2732. doi: 10.3934/mbe.2021138 |
[5] | Yingjia Tan, Bo Sun, Li Guo, Binbin Jing . Novel model for integrated demand-responsive transit service considering rail transit schedule. Mathematical Biosciences and Engineering, 2022, 19(12): 12371-12386. doi: 10.3934/mbe.2022577 |
[6] | Jiushuang Wang, Ying Liu, Huifen Feng . IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks. Mathematical Biosciences and Engineering, 2022, 19(2): 1280-1303. doi: 10.3934/mbe.2022059 |
[7] | Xianlong Ge, Yonghong Liang, Yuanzhi Jin, Chunbing Song . Proactive dynamic vehicle routing problems considering cooperation services for the store-depot-integrated retailer. Mathematical Biosciences and Engineering, 2023, 20(10): 18030-18062. doi: 10.3934/mbe.2023801 |
[8] | Hao Song, Xiaonong Lu, Xu Zhang, Xiaoan Tang, Qiang Zhang . A HRGO approach for resilience enhancement service composition and optimal selection in cloud manufacturing. Mathematical Biosciences and Engineering, 2020, 17(6): 6838-6872. doi: 10.3934/mbe.2020355 |
[9] | Xiang Gao, Yipeng Zhang . Advancing remote consultation through the integration of blockchain and ant colony algorithm. Mathematical Biosciences and Engineering, 2023, 20(9): 16886-16912. doi: 10.3934/mbe.2023753 |
[10] | Yongjun Ren, Yan Leng, Yaping Cheng, Jin Wang . Secure data storage based on blockchain and coding in edge computing. Mathematical Biosciences and Engineering, 2019, 16(4): 1874-1892. doi: 10.3934/mbe.2019091 |
These days, healthcare applications on the Internet of Medical Things (IoMT) network have been growing to deal with different diseases via different sensors. These healthcare sensors are connecting to the various healthcare fog servers. The hospitals are geographically distributed and offer different services to the patients from any ubiquitous network. However, due to the full offloading of data to the insecure servers, two main challenges exist in the IoMT network. (i) Data security of workflows healthcare applications between different fog healthcare nodes. (ii) The cost-efficient and QoS efficient scheduling of healthcare applications in the IoMT system. This paper devises the Cost-Efficient Service Selection and Execution and Blockchain-Enabled Serverless Network for Internet of Medical Things system. The goal is to choose cost-efficient services and schedule all tasks based on their QoS and minimum execution cost. Simulation results show that the proposed outperform all existing schemes regarding data security, validation by 10%, and cost of application execution by 33% in IoMT.
The Internet of Medical Things (IoMT) collects medical equipment and apps that use online computer networks to link to healthcare IT systems. Machine-to-machine communication, which is the foundation of IoMT, is enabled by medical devices outfitted with Wi-Fi. IoMT devices connect to cloud systems like Amazon Web Services, which store and analyse collected data. Healthcare IoT is another name for IoMT [1]. Remote patient monitoring for those with chronic or long-term diseases, tracking patient prescription orders, and the location of patients admitted to hospitals are all examples of IoMT, as are patients' wearable mHealth devices that can provide information to carers. Medical gadgets that can be converted to or implemented as IoMT technology include infusion pumps that connect to analytics dashboards and hospital beds equipped with sensors that measure patients' vital signs. Telemedicine is the technique of employing IoMT equipment to remotely monitor patients in their homes. This type of care eliminates the need for patients to visit a hospital or a doctor's office every time they have a medical query or change their condition. The security of sensitive data that flows through the IoMT, such as protected health information governed and healthcare insurances become a growing concern for healthcare providers. Because many consumer mobile devices are constructed with Near Field Communication (NFC) radio frequency identification (RFID) tags that allow the devices to communicate information with IT systems, there are now more possible uses of IoMT than previously. Medical equipment and supplies can also be fitted with RFID tags so that hospital workers can keep track of the quantity they have on hand [2].
Furthermore, the present healthcare applications concentrate on telemonitoring patients, tracking their mobility and supplying physicians and relatives with early updates in critical circumstances: the Internet of Things (IoT) and healthcare application and embedded sensors in a patient's body. The cloud computing along with its extension fog node offers distributed IoT based services to the healthcare applications. Some of the problems which need to be addressed are secure communication, servicing cost, handling and mobility, latency control and energy-efficient routing. Due to the digital revolution, there has been a staggering amount of unstructured data, such as videos and images generated in the healthcare sector. A virtual and linked ecosystem of clinical devices has been developed in the healthcare sector, which continually sends out unstructured and potentially unsecured data vulnerable to attack [3]. It is necessary to transmit these data on a channel, which may not also be protected. However, an individual's physiological data includes exceptionally personal and confidential details. Security is, therefore, a predominant need for healthcare applications, mainly if IoT devices equipped with sensors or body area networks are used in the solutions [4].
Generally, these paid services offered by different vendors (e.g., Cloud, Amazon, Cloud, Alibaba, and Azure) to run the applications under their Quality of Service (QoS) requirements. Recently, serverless computing is a model for edge computing execution in which the server is run by the provider and dynamically regulates machine resource allocation. Pricing is based on the actual amount of resources utilized by an application, not on the volume units provisioning servers. However, besides the benefit of serverless edge computing to run the IoT applications, there are many challenges to be further investigated. The tradeoff between cheap cost and demand QoS is a conflicting problem during execution. Due to the external services, security of offloaded data of different users has pose challenge. The primary concern is security and privacy in healthcare solutions, mainly when deployed in a virtual computing environment. In these instances, it is essential to ensure both users and service providers. So, to have a secure and foolproof cloud-based healthcare system, the security of services should be devised for applications. Therefore, secure and cost-efficient task scheduling under edge computing serverless architecture becoming a challenging problem.
This work formulates the cost-efficient scheduling of Internet of Medical Things workflow tasks in function and blockchain-enable distributed network. The study devise the cost-efficient system which consists of following components.
1. To solve the scheduling problem of workflow healthcare tasks with different constraints such as deadline, precedence constraint, and cost the problem become NP-hard problem. The study devises Function-Based Task Scheduling Blockchain-Enable Framework (FTSB), which consists of different schemes: Function Verification, Function Pool Priority Queue Task Scheduling. The goal is to schedule all tasks in a way; the goal of the trade-off between function cost and deadline of the task could be obtained in the system. Algorithm 1 shows the process of healthcare workflow on different functions based on different schemes. The proposed system has the following components to process the application with its requirements.
Algorithm 1: FTSB algorithm |
Input: ∑Vvi=1, FaaS preference list ∑j=1M; Output: minZ 1 begin ![]() 13 End Main |
2. Function Verification: This component verified the function correctness (e.g., worms free and trojan horse free) before becoming the system's part.
3. Function Pool: This method collected the verified functions for particular applications and saved in the pool.
4. Priority Queue: This priority method order all tasks into the deadline topological order of the application.
5. Task Scheduling: This study devises iterative heuristics to schedule all tasks based on their deadline and minimizes the application's costs.
6. Blockchain-Enable Fog Network: The study implemented blockchain-enable distributed fog-cloud network to execution functions and verify their transactions among their communications.
The goal is to minimize execution cost of workflow tasks during scheduling and process in the network. The considered network comprises of different computing nodes such as fog node and cloud node. The fog node are implemented at the edge of network. Whereas, cloud node is located away from users and access via internet. The proposed system implemented docker containers to run the functions of different vendors to execute the IoMT tasks of the workflow applications. Each workflow is a business task, for instance body sensor generating the data and send to the heartbeat tasks and offloaded to run for the further analysis. Whereas, heartbeat function process on the requested inside container and generates results and save and second back to the users.
The remainder of this paper is organized as follows. Section 2 discusses the related work in this field. Section 3 describes the problem description and problem formulation. Section 4 proposed algorithm framework. Section 5 present the simulation results to evaluate the performance of our algorithm. Section 6 concludes summary of the study.
These days, Internet of Medical Things (IoMT) usage in the healthcare domain to support the different applications grows daily. The cloud computing services boost the performances of the IoMT network, which consists of healthcare sensors, network technologies and cloud computing technologies to run different healthcare applications. The fog layers have been used to improve IoMT-based healthcare systems' capabilities to maintain the latency and delay-sensitive application. They have proven their value by offering rapid response time and low latency. However, many efforts have been made to reduce security risk in the distributed fog cloud network.
The existing studies investigated cost-efficient and latency optimal task assignment problems by proposing their serverless edge computing architectures. The study [1] empowering low-latency applications through a serverless edge computing architecture. The [2] dealt with the Economics of "Serverless" Cloud Computing to minimize the application's execution cost. The study [3] has proposed economic and architectural impact based on Serverless computing. The goal was to minimize the resource cost of the applications during the performance. The study [4] has presented a preliminary review of enterprise serverless cloud computing (function-as-a-service) platforms. The goal is to offer cost-efficient services to microservices applications.
The study [5] has suggested the SPEC cloud group's research vision on FaaS and serverless architectures. The main idea was to offer function as a service based on customers with cheap to perform application events efficiently. The studies [6] and [7] recommended serverless computing for container-based architectures and building a chatbot with serverless computing to run the microservice-based IoMT applications. The objective was cost-based resource allocation was taken into consideration. The IoMT based on serverless computing for the mobile edge and transient fault aware application partitioning computational offloading algorithm in microservices-based mobile cloudlet networks architectures presented in [8,9,10]. None of the literature research considered the secure cost-efficient scheduling for the microservice workflow IoT application in the serverless edge computing the security efficient framework proposed in [11]. The goal is to minimize the risk of offloaded healthcare data in the system. The proposed system exploited the blockchain-enabled network to verify the secure transaction of data on different nodes. The symmetric security-aware services in distributed investigated in [12,13,14,15,16]. The objective is to minimize lateness, security risks and offloading cost of applications. The shared public keys and private keys were verified based on a centralized control system in the network in these studies [17]. The blockchain-Enable distributed for the healthcare body area network suggested. The main goal is to minimize end to end security risks of applications in these studies [18,19,20,21]. The studies [22,23,24,25] focused on failure aware mechanism in IoMT network for the healthcare applications to minimize the failure and validation risk in the system. These studies devised many solutions based on travelling salesmen problem where mobility of the applications is optimized in the network.
To the best of our knowledge, This work formulates the cost-efficient scheduling of Internet of Medical Things workflow tasks in function and blockchain-enable distributed network which has not been studied yet with the considered constraints. These studies [26,27,28,29,30] are closely related to our work. However, these studies only considered the execution cost of fine-grained and coarse-grained workloads on the single edge nodes in the considered problem. Therefore, this study considered the workflow applications in which, the system can manage the execution of tasks on different nodes which are connected and validated by the blockchain technology. The security and validation methods of the proposed study are different than existing single node validation and security mechanism.
The proposed system, as shown in Figure 1 consists of different healthcare components. The healthcare application consists of workflows that connect various healthcare sensors and offload tasks to the healthcare fog server for further execution. The cloud providers offer healthcare services such as blood-pressure monitoring, heartbeat monitoring, and many healthcare services with their usage memory and execution time available via gateway application programming interface.
The service selection is a method in which healthcare services are added to the service pool S. The cloud providers IBM OpenWhisk, AWS Lambda, Azure Functions, Google Cloud, Functions Alibaba, Function Compute, and Kubeless Functions offer healthcare services at different characteristics (e.g., execution cost as per memory). In addition, many fog healthcare servers are connecting (e.g., Each hospital can run additional services for patients). The quality of service (QoS) of workflow applications such as deadline, require assistance to run task data must be optimal in the system. The blockchain-enabled fog healthcare services verify the data authentication based on proof of work (PoW) and proof of creditability (POC) methods in the distributed network. Table 1 defined the description of mathematical notation.
Notation | Description |
G | IoMT workflow application |
V | Number of tasks of application G |
vi | ith workflow task of application G |
vid | The deadline of a task vi |
K | Number of fog-cloud computing nodes |
k | The kth computing node of K |
ϵk | The resource capability of kth node |
M | Pool of functions |
j | jth function of node k |
C | Total number of containers in node k |
Ck | The Cth container of node k |
B | Number of blocks in the blockchain |
B1 | The ith block of B |
Bcapacity | Capacity of block B |
The IoMT workflow application is represented by the directed acyclic graph, i.e., G(V,E). For two tasks vi,vz∈V, an edge e(vi,vz)∈E represents the data dependency between task vi and task vz, which means vi should complete its execution before vz starts. The application G has N number of tasks. Where task v0 is the entry task and vn is the exit task. We imply datai to denote the original data volume of task vi. Whereas, datai,z denotes generated data volume from task vi to vz. Each task vdi has deadline inside workflow during process in the system.
The fog-cloud nodes are represented by {k=1,…,K. Each computing node can create number of containers, i.e., {C1,…,C}. Each node is configured with the blockchain consensus blocks, i.e., {Block1,…,Block}. The study alias Block1 to B1 to the further process in the study.
The functions pool for tasks of different cloud vendors is represented by Mi={M0i,M1i,…,M∣Mi∣−1i}. Whereas MjCki is the jth function of node k for vi which is executing inside container. Whereas, BijCk is the start time of a task at the jth function in the kth node, and FijCk is the finish time of the Sijk. The execution time of a task is calculated by TeijCk. The cost of each task is determined in the following way, i.e., CostijCk is illustrated by the Sij={Teij,CostijCk}. The binary assignment of each task vi to the available function determined as follows.
xijCk={1,SijCk function chooses for vi0,otherwise, | (3.1) |
Equation (3.1) determines the binary assignment of tasks to the functions.
Smartdatai,z={1,∑Ee=1Smartdatai,z if tasks data-size equal0,Tempered, | (3.2) |
Smartdatai,z determines the smart-contract rules during communication between tasks and offloading as determined in Eq (3.2). Whereas, ∑Ee=1datai,z is the communication of tasks between different thin-client and thick-client. The objective is to reduce cost of workflow tasks under their deadline constraints. The considered problem is formulated as follows.
minZ=V∑vi=1∣Mi∣∑j=1K∑k=1C∑C=1CostijCk×xijCk. | (3.3) |
Z represented the objective function of the study as defined in Eq (3.3). Subject To,
∣Mi∣∑j=1K∑k=1xijCk=1,∀vi∈V. | (3.4) |
Each task is assigned to only function at any computing node as defined in Eq (3.4).
FijCk=∣Mi∣∑j=1K∑k=1BijCk+TeijCk×xijCk≤di,∀vi∈V, | (3.5) |
The Finish time of tasks must be less their deadlines as defined in Eq (3.5).
To solve the scheduling problem of workflow healthcare tasks with different constraints such as deadline, precedence constraint, and cost the problem become NP-hard problem. The study devises Function-Based Task Scheduling Blockchain-Enable Framework (FTSB), which consists of different schemes: Function Verification, Function Pool Priority Queue Task Scheduling. The goal is to schedule all tasks in a way; the goal of the trade-off between function cost and deadline of the task could be obtained in the system. Algorithm 1 shows the process of healthcare workflow on different functions based on different schemes.
This study devises the function verification method which identify the security requirement of functions before adding to the system pool. The self-replicated and distributed by these systems. The malware must have the capacity to replicate to be labelled as a virus or worm. The following defines these and other malicious software classes.
1. Ransomware: is a type of malicious software that, unless a ransom is paid, threatens to publish the victim's data or block access to it permanently. Simultaneously, some basic ransomware can lock the device so that it is not difficult to reverse for a knowledgeable individual and needs a ransom payment to decrypt them.
2. Viruses: A computer virus is a kind of malware that propagates by injecting a copy of itself into another program and being part of it. It spreads from one device to another as it flies, leaving infections. In severity, viruses can range from causing mildly irritating effects to destroying data or software and causing denial-of-service conditions (DoS). Almost all viruses are attached to an executable file, meaning that the virus may reside on a device but will not be transmitted until the malicious host file or program is run or opened by a user. When the host code is executed, it also executes the viral code. The virus infects them. Some viruses, however, overwrite other programs with copies of themselves, mutually deleting the host program. Viruses propagate when the program or document to which they are attached is transferred through the network, a disk, file sharing, or contaminated email attachments from one device to another.
3. Disk Virus Worms are similar to viruses in that they replicate themselves with functional copies and can do the same kind of damage. Worms are standalone applications and do not need a host program or human assistance to propagate, unlike viruses, which require the spread of an infected host file. To spread, the vulnerability to trick users into executing them on the target device or social engineering. Via a loophole in the system, a worm enters a device and takes advantage of file-transport or information-transport features on the system, enabling it to move unaided. More sophisticated worms use encryption, wipers, and ransomware technologies to damage their targets.
4. Memory Virus Another type of malware named after the wooden horse which the Greeks used to infiltrate Troy is a trojan. It is a destructive piece of software that appears legal. Users are usually fooled by loading it on their systems and executing it. It can conduct any number of attacks on the host after triggered, from annoying the user (popping up windows or changing desktops) to destroying the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to build backdoors to give access to the device to malicious users. Trojans, unlike viruses and worms, do not reproduce or self-replicate by infecting other files. Trojans need to be distributed through user activity, such as opening an email attachment or downloading a file from the Internet and running it.
5. Data Virus derives from "robot" and is an automated mechanism that communicates with other network services. Bots also automate tasks and provide data or services that a human being would otherwise perform. Bots are usually used to collect data, such as web crawlers, or automatically communicate with instant messaging (IM), Internet Relay Chat (IRC), or other web interfaces.
6. SOAP: The system can only accept the function which follows the protocol standard development for tasks. SOAP is a specification of the messaging protocol for the sharing of standardized information when integrating web services on computer networks. The goal is to provide extensibility, neutrality, verbosity and autonomy.
7. JSON:Each function should be written in JAVASCRIPT Object Notation (JSON) form, which is an open standard file format and data exchange format that stores and transmits data objects consisting of attribute-value pairs and array data types using human-readable text. It is a very common data format with a wide variety of uses, such as a replacement for AJAX and XML.
8. Vendors: The study considered the healthcare function of different vendors in order to achieve optimal functions for the tasks.
Algorithm 2 verify each function based on different security rules such as Trojan, Worms, Bot and Ransomer before adding to the function pool.
Algorithm 2: SFVM |
Input: Rules[Trojan, Bot, Worms, Ransomer], {j=1,…,M}; Output: {j=1,…,M} 1 begin ![]() |
In Priority Queue items, the key value is sorted such that the item with the lowest key value is at the front and the item with the highest key value is at the rear or vice versa. So, based on its key-value, we have given priority to the object. If the value is lower, the higher the priority. The principal methods of a Priority Queue are as follows. The priority queue inserts the item according to its order if an element is inserted into the queue. We're assuming here that high value data has a low priority. The tasks are sorted in the following order. Front: v1,v2,v5. Rear: v3,v4,v6,v7,v9. All tasks of front queue are scheduled first, and rear queue tasks are scheduled with low priority.
The blockchain mechanism of tasks is defined in the following steps.
● The first block is "Genesis Block" which has the following parameters. (i) cp1 is the computing node to process the mined of a task s1 of v1. Each block has a unique id b1 and previous hash (e.g., The study devises the asymmetric-key cryptography cipher method for encryption that uses a pair of keys, an encryption key, and a decryption key, respectively, called the public key and the private key. This algorithm's key pair consists of a private key that is generated using the same algorithm and a unique public key. It is called Public-Key Cryptography as well).
● A Merkle root is a straightforward mathematical way to verify the Merkle tree data. In cryptocurrency, Merkle roots are used to ensure that data blocks passed between peers on a peer-to-peer network are entire, undamaged, and unaltered.
● Each block for each task has a should contain transaction id.
● The proof of work is implemented to verify the transaction of the block within a network.
The transaction is verified (validated) by of device in the network against certain validation rules set by the developers of the unique blockchain network. Validated transactions are held in a block and a lock is sealed (hash). The transaction is now part of the blockchain and cannot in any way be changed.
Work proof is a type of zero-knowledge cryptographic evidence in which one party shows to another that for some reason a certain amount of computational effort has been expended. Verifiers may check this investment with minimal effort on their part afterwards.
The paper introduces a novel service composition method which determines match each Function of different to each task before scheduling. Algorithm 3 takes task preference and function preferences as inputs. Based on the cost and task requirements, the algorithm creates the match list, where each task is to assign to a function which can satisfy its requirements. In the end, it matches all tasks until the list of tasks become empty.
Algorithm 3: QoS efficient-scheduling |
Input: Tasks Preference List ∑NG=1∑Vvi=1, FaaS preference list ∑j=1M; Output: Match[Cij×xijk]; 1 begin ![]() 12 End Main |
Based on task sequencing, and composition matching list, the scheduler allocates all tasks to functions based on requirements. Algorithm 4 reads the composition list of tasks and functions, then schedule them based on tasks deadline and cost. This process iteratively carry on until tasks are allocated and executed to appropriate functions.
Algorithm 4: Task scheduling |
Input: {∑NG=1, ∑Mj=1, Match[Cij,xijk]};
1 begin ![]() 13 End Main |
The performance evaluation proposed serverless models based on IoMT workflow applications. The simulation environment for the study designed in the Ifogsim with healthcare devices such as Aurdino board as defined in Table 2. All the algorithms designed and implemented in the JAVA language.
Simulation parameters | Values |
Simulation Tool | Ifogsim |
Experimental Machine | Ubuntu X86-64-bit GPU |
Languages | JAVA, XML, Python |
Android Phone | Google Nexus 4, 5, and 7S |
IoMT devices | Aurdino board |
Table 3 shows the cost of functions of different vendors. To be honest, each of the functions was deployed using a Python 3 runtime with 256 MB of memory. The first benchmark function generated was a factorial function which calculates the result returning factorial 100 fifty times.
Providers | FaaS | Cost Dollar per Hour |
IBM OpenWhisk | Linux Amazon GenyMotion | 0.5 |
AWS Lambda | X86-64-bit AMI | 0.7 |
Azure Functions | JAVA, XML, Python | 0.3 |
Google Cloud Functions | Google Nexus 4, 5 and 7S | 0.5 |
AliBaba Function Compute | 160 times | 0.6 |
Kubeless Functions | 12 hours | 0.3 |
The function as a service based serverless system is designed to evaluate the performances of the system based on different workloads as shown in Figure 3. The implemented components of the system is shown in Figure 2. This system which already designed and defined in the our previous published study [6].
The Heartbeat Sensor is an electronic system used to measure heart rate, i.e., heartbeat velocity. Body temperature control, heart rate and blood pressure are the basic things we do to keep us safe. We use thermometers and a sphygmomanometer to monitor arterial pressure or blood pressure to calculate body temperature. It is possible to track the heart rate in two ways: one way is to manually check the pulse of the wrists or neck and the other way is to use a Heartbeat Sensor. We have developed a Heart Rate Monitor Device using Arduino and Heartbeat Sensor in this project. The Heartbeat Sensor Concept, the Heartbeat Sensor and the Arduino-based Heart Rate Monitoring Device can be identified using a functional heartbeat sensor. For athletes and patients, controlling heart rate is very important as it determines the state of the heart (just heart rate). There are many methods to calculate the heart rate, and electrocardiography is the most reliable. But using the Pulse Sensor is the best way to track the heart rate. It comes in various shapes and sizes and offers an immediate way to calculate the pulse. Wrist Watches (Smart Watches), Smart Phones, chest belts, etc. are available with heartbeat sensors. The heartbeat is measured in beats per minute or in bpm, representing the amount of times in a minute that the heart contracts or expands.
We designed the android IoMT application which consists of four types of different sub-applications such as Cancer aware monitoring, Heartbeat, ECG and EEG monitoring. These applications consisted of workflow tasks as shown in Figure 2, and require different functions to run them. All sensors are connected with an android mobile phone. Whereas, the mobile phone connected to the proposed system which offers services based on functions of different vendors and process them inside containers. The EdgeX Foundry is exploited to design the basic infrastructure for the applications.
EdgeX Foundry is a Linux Foundation-hosted, vendor-neutral open-source platform offering a popular mobile framework for IoMT edge computing. There is a series of loosely connected functions of different vendors grouped into different layers inside containers.
The study considers the different component calibrations in the serverless model or instance, security, service composition, task sequencing, and scheduling. We measure the performances of IoT workflow application based serverless model via relative percentage deviation (RPD) as follows.
RPD(%)=Z∗−ZZ∗×100%. | (5.1) |
Z∗ displays optimal obtained objective of the study during scheduling. Whereas, Z is the objective function of the study which determines the operational cost of the application.
This part discusses the obtained results of the proposed system and its approaches which are compared to baseline approaches to solve the problem.
The study suggested the function method to identify the function standard, which should be cleared from any security issue types due to many issues. The existing viruses are Trojan, Worms, and Bot can affect and violated the data of user application. In the study, the system accepts any function in the pool and its verification via different standards. Existing studies such as baseline 1 [1,2,3,4,5,6] and baseline 2 [1,5,7,9,11] suggested cost-efficient scheduling systems by exploiting blockchain technologies. The baseline system exploited different for medical care applications based on the blockchain-enabled network. However, they did not focus on function validation and verification before adding to the pool.
Figure 3 (a), (b) shows that, the RDP% performance 500 and 1000 number of workflow healthcare tasks by exploiting proposed FTSB which is outperform all existing system in terms of verification of functions and blockchain-enable perform of healthcare tasks. The main reason behind that, due to immature and effected functions violated the data security and increases the cost of requested tasks during execution. Baseline 1 exploits the static resource provisioning cost model which is always costly in scheduling during variation. Therefore, baseline 1 has a more extended cost than dynamic resource provisioning which is exploited by baseline 2. However, still, the proposed FTSB outperforms all existing approaches in terms of cost.
The study considered the deadline of healthcare tasks during scheduling in the system. All tasks have different priority during offloading and scheduling in the system. All tasks are sequenced into their precedence constraints in the function aware fog cloud network. All existing studies such as baseline 1 [1,2,3,4,5,6] and baseline 2 [1,5,7,9,11] devised genetic algorithm based and dynamic programming to solve the task scheduling problem of workflow healthcare tasks based on resource-provisioning methods (e.g., on-demand, on-reserve, and spot-instances). These studies exploited virtual machines and microservices-based resources which charge based on a pay-as-you-go model. However, they did not focus on the trade-off between resource cost and deadline of tasks during scheduling.
Figure 4 (a), (b) shows the performance based on 500, and 1000 number of workflow healthcare tasks by exploiting FTSB approach obtained the optimal results of both execution cost and deadline of healthcare tasks during scheduling on different functions. The main reason is to keep the trade-off between execution cost and deadline with different requirements. Another reason, functions charge for their executions (execution × memory) and different from the existing resource-provisioning model. Therefore, the proposed framework and its schemes FTSB outperform all existing systems and their methods to run healthcare tasks with different requirements. Baseline 1 exploits the static resource provisioning cost model which is always costly in scheduling during variation. Therefore, baseline 1 has a more extended cost than dynamic resource provisioning which is exploited by baseline 2. However, still, the proposed FTSB outperforms all existing approaches in terms of cost.
Initially, the system selected the plan for all tasks in advance. However, we run the tasks into sequence order, i.e., from the start task to the end. The study does not run tasks into parallel order. Therefore, rescheduling means that a task's initial selection function could be changed with another available function and have small execution cost. All tasks are scheduled one by one due to their precedence constraints requirements. In the function pool, the pool manager checks the existing functions' prices and new available functions in different time-interval for the requested tasks. The pool manager monitors the cost of function after 30 seconds to avoid the overhead of searching in the system.
Figures 5 and 4(a), (b) shows the performance based on 500, and 1000 number of workflow healthcare tasks by exploiting FTSB approach obtained the optimal results of both execution cost and deadline of healthcare tasks during scheduling on different functions. Figure 5 (a), (b) shows that cost-efficient rescheduling for all tasks in different-time slots outperform all existing studies in terms of function cost. However, existing studies selected resources in advance, the runtime variation of resource cost widely ignored in their methods. Baseline 1 exploits the static resource provisioning cost model which is always costly in scheduling during variation. Therefore, baseline 1 has a more extended cost than dynamic resource provisioning which is exploited by baseline 2. However, still, the proposed FTSB outperforms all existing approaches in terms of cost.
This paper devised the Cost-Efficient Service Selection and Execution and Blockchain-Enabled Serverless system for the Internet of Medical Things. The primary goal is to minimize the services cost in the distributed network when the different healthcare applications run the computing nodes. And another goal is to minimize the security risk of considered function during implementation in the system pool. The blockchain aware mechanism implemented in the distributed service network is based on serverless technology where applications only paid for the execution instead of renting costs for some duration. The simulation results in the discussion part showed that the proposed FTSB Algorithm outperformed and minimized the security and execution of applications. The serverless based resources are more effective than traditional resource assignments in the IoMT, as we achieved the optimal results in the result part.
In the future work, we will extend the IoMT system with additional constraints such as mobility of services, failure of resources and energy consumption of devices during resource researching in the system. The serverless system has an overhead issue. Therefore, serverless can minimize execution costs. However, there is a lot of energy consumption and failure of resource issues in the current version IoMT system. Therefore, after execution of applications on serverless, the results transferring to the cloud-based on security and mobility will be suggested in the existing IoMT system for further improvement for the healthcare applications.
This work was developed and implemented at the research lab of Artificial Intelligence and Information Security in the Department of Computer Science and Technology, Benazir Bhutto Shaheed University, Lyari, Karachi, Sindh, Pakistan. The work is totally testbed and implemented in the practice of Pakistan Hospitals.
This work is financially supported by the Research grant of PIFI 2020 (2020VBC0002), China.
[1] | L. A. Mastoi, Q. U. Ain, M. Elhoseny, M. S. Memon, M. A. Mohammed, Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using iot assisted mobile fog cloud, Enterp. Inf. Syst., (2021), 1–23. |
[2] | T. Huang, L. Lan, X. Fang, P. An, J. Min, F. Wang, Promises and challenges of big data computing in health sciences, Big Data Res., 2 (2015), 2–11. |
[3] | A. Lakhan, M. Ahmad, M. Bilal, A. Jolfaei, R. M. Mehmood, Mobility aware blockchain enabled offloading and scheduling in vehicular fog cloud computing, IEEE Trans. Intell. Transp. Syst., 2021. |
[4] | T. Lynn, P. Rosati, A. Lejeune, V. Emeakaroha, A preliminary review of enterprise serverless cloud computing (function-as-a-service) platforms, in 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), (2017), 162–169. |
[5] | A. Lakhan, M. S. Memon, M. Elhoseny, M. A. Mohammed, M. Qabulio, M. Abdel-Basset, et al., Cost-efficient mobility offloading and task scheduling for microservices iovt applications in container-based fog cloud network, Cluster Comput., (2021), 1–23. |
[6] |
A. Lakhan, M. A. Mohammed, A. N. Rashid, S. Kadry, T. Panityakul, K. H. Abdulkareem, et al., Smart-contract aware ethereum and client-fog-cloud healthcare system, Sensors, 21 (2021), 4093. doi: 10.3390/s21124093
![]() |
[7] |
A. Lakhan, M. A. Dootio, T. M. Groenli, A. H. Sodhro, M. S. Khokhar, Multi-layer latency aware workload assignment of e-transport iot applications in mobile sensors cloudlet cloud networks, Electronics, 10 (2021), 1719. doi: 10.3390/electronics10141719
![]() |
[8] | M. Hussain, L. F. Wei, A. Lakhan, S. Wali, S. Ali, A. Hussain, Energy and performance-efficient task scheduling in heterogeneous virtualized cloud computing, Sustainable Comput.: Inf. Syst,, 30 (2021), 100517. |
[9] |
A. Lakhan, X. Li, Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks, Computing, 102 (2020), 105–139. doi: 10.1007/s00607-019-00733-4
![]() |
[10] | A. Lakhan, L. Xiaoping, Energy aware dynamic workflow application partitioning and task scheduling in heterogeneous mobile cloud network, in 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB), 2018 (2018), 1–8. |
[11] | A. Lakhan, X. Li, Content aware task scheduling framework for mobile workflow applications in heterogeneous mobile-edge-cloud paradigms: Catsa framework, in 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), (2019), 242–249. |
[12] | A. Lakhan1, X. Li, Mobility and fault aware adaptive task offloading in heterogeneous mobile cloud environments, EAI Endorsed Trans. Mobile Commun. Appl., 5 (2019), 16. |
[13] | J. Yun, Y. Goh, J. M. Chung, Dqn based optimization framework for secure sharded blockchain systems, IEEE Int.Things J., 2020. |
[14] | F. Zhang, M. M. Wang, Stochastic congestion game for load balancing in mobile edge computing, IEEE Int. Things J., 2020. |
[15] |
A. Lakhan, Q. U. A. Mastoi, M. A. Dootio, F. Alqahtani, I. R. Alzahrani, F. Baothman, et al., Hybrid workload enabled and secure healthcare monitoring sensing framework in distributed fog-cloud network, Electronics, 10 (2021), 1974. doi: 10.3390/electronics10161974
![]() |
[16] |
F. H. Khoso, A. Lakhan, A. A. Arain, M. A. Soomro, S. Z. Nizamani, A microservice-based system for industrial internet of things in fog-cloud assisted network, Eng. Technol. Appl. Sci. Res., 11 (2021), 7029–7032. doi: 10.48084/etasr.4077
![]() |
[17] | F. H. Khoso, A. A. Arain, A. Lakhan, A. Kehar, S. Z. Nizamani, Proposing a novel iot framework by identifying security and privacy issues in fog cloud services network, Int. J., 9 (2021), 592–596. |
[18] |
A. Lakhan, R. Singh, Implementation of etl tool for data warehousing for non-hodgkin lymphoma (nhl) cancer in public sector, pakistan, Int. J., 9 (2021), 7. doi: 10.22201/ceiich.24485705e.2021.24.78946
![]() |
[19] | A. Lakhan, F. H. Khoso, A. A. Arain, K. Kanwar, Serverless based functions aware framework for healthcare application, Int. J., 9 (2021), 4. |
[20] | M. Waseem, A. Lakhan, I. A. Jamali, Data security of mobile cloud computing on cloud server, Open Access Libr. J., 3 (2016), 1–11. |
[21] | I. A. Jamali, A. Lakhan, D. Kumar, A. R. Mahessar, Energy efficient task assignment algorithm framework in mo-bile cloud computing, GSJ, 6 (2018), 171. |
[22] |
A. L. Mujeeb-ur Rehman, Z. Hussain, F. H. Khoso, A. A. Arain, Cyber security intelligence and ethereum blockchain technology for e-commerce, Int. J., 9 (2021), 7. doi: 10.22201/ceiich.24485705e.2021.24.78946
![]() |
[23] | A. Lakhan, D. K. Sajnani, M. Tahir, M. Aamir, R. Lodhi, Delay sensitive application partitioning and task scheduling in mobile edge cloud prototyping, in International Conference on 5G for Ubiquitous Connectivity, (2018), 59–80. |
[24] | D. K. Sajnani, A. R. Mahesar, A. Lakhan, I. A. Jamali, R. Lodhi, M. Aamir, Latency aware optimal workload assignment in mobile edge cloud offloading network, in 2018 IEEE 4th International Conference on Computer and Communications (ICCC), (2018), 658–662. |
[25] |
D. K. Sajnani, A. R. Mahesar, A. Lakhan, I. A. Jamali, Latency aware and service delay with task scheduling in mobile edge computing, Commun. Network, 10 (2018), 127. doi: 10.4236/cn.2018.104011
![]() |
[26] |
A. H. Sodhro, Z. Luo, A. K. Sangaiah, S. W. Baik, Mobile edge computing based qos optimization in medical healthcare applications, Int. J. Inf. Manage., 45 (2019), 308–318. doi: 10.1016/j.ijinfomgt.2018.08.004
![]() |
[27] |
A. H. Sodhro, S. Pirbhulal, V. H. C. De Albuquerque, Artificial intelligence-driven mechanism for edge computing-based industrial applications, IEEE Trans. Ind. Inf., 15 (2019), 4235–4243. doi: 10.1109/TII.2018.2889692
![]() |
[28] |
M. Muzammal, R. Talat, A. H. Sodhro, S. Pirbhulal, A multi-sensor data fusion enabled ensemble approach for medical data from body sensor networks, Inf. Fusion, 53 (2020), 155–164. doi: 10.1016/j.inffus.2019.06.021
![]() |
[29] | H. Magsi, A. H. Sodhro, F. A. Chachar, S. A. K. Abro, G. H. Sodhro, S. Pirbhulal, Evolution of 5g in internet of medical things, in 2018 international conference on computing, mathematics and engineering technologies (iCoMET), (2018), 1–7. |
[30] | T. Zhang, A. H. Sodhro, Z. Luo, N. Zahid, M. W. Nawaz, S. Pirbhulal, et al., A joint deep learning and internet of medical things driven framework for elderly patients, IEEE Access, 8 (2020), 822–832. |
1. | Pablo Serrano-Gutierrez, Inmaculada Ayala, Lidia Fuentes, 2023, Chapter 44, 978-3-031-21332-8, 437, 10.1007/978-3-031-21333-5_44 | |
2. | Hamed Taherdoost, Blockchain-Based Internet of Medical Things, 2023, 13, 2076-3417, 1287, 10.3390/app13031287 | |
3. | Soomaiya Hamid, Narmeen Zakaria Bawany, Ali Hassan Sodhro, Abdullah Lakhan, Saleem Ahmed, A Systematic Review and IoMT Based Big Data Framework for COVID-19 Prevention and Detection, 2022, 11, 2079-9292, 2777, 10.3390/electronics11172777 | |
4. | Mohammad Reza Alizadeh, Vahid Khajehvand, Amir Masoud Rahmani, Ebrahim Akbari, TPEL: Task possible execution level for effective scheduling in fog–cloud environment, 2022, 25, 1386-7857, 4653, 10.1007/s10586-022-03714-z | |
5. | Abdullah Lakhan, Mazin Abed Mohammed, Sergei Kozlov, Joel J. P. C. Rodrigues, Mobile‐fog‐cloud assisted deep reinforcement learning and blockchain‐enable IoMT system for healthcare workflows, 2021, 2161-3915, 10.1002/ett.4363 | |
6. | Li Yang, Chenglin Wen, Tao Wen, Multilevel Fine Fingerprint Authentication Method for Key Operating Equipment Identification in Cyber-Physical Systems, 2023, 19, 1551-3203, 1217, 10.1109/TII.2022.3193955 | |
7. | Abid Ali, Muhammad Munwar Iqbal, A Cost and Energy Efficient Task Scheduling Technique to Offload Microservices Based Applications in Mobile Cloud Computing, 2022, 10, 2169-3536, 46633, 10.1109/ACCESS.2022.3170918 | |
8. | Nawaz Ali Zardari, Razali Ngah, Omar Hayat, Ali Hassan Sodhro, Adaptive mobility-aware and reliable routing protocols for healthcare vehicular network, 2022, 19, 1551-0018, 7156, 10.3934/mbe.2022338 | |
9. | Weiping Ding, Mohamed Abdel-Basset, Hossam Hawash, Sara Abdel-Razek, Chuansheng Liu, Fed-ESD: Federated learning for efficient epileptic seizure detection in the fog-assisted internet of medical things, 2023, 630, 00200255, 403, 10.1016/j.ins.2023.02.052 | |
10. | Noman Zahid, Ali Hassan Sodhro, Usman Rauf Kamboh, Ahmed Alkhayyat, Lei Wang, AI-driven adaptive reliable and sustainable approach for internet of things enabled healthcare system, 2022, 19, 1551-0018, 3953, 10.3934/mbe.2022182 | |
11. | Chandini Avula Gopalakrishna, Prabhugoud I. Basarkod, An efficient lightweight encryption model with re‐encryption scheme to create robust blockchain architecture for COVID ‐19 data , 2023, 34, 2161-3915, 10.1002/ett.4653 | |
12. | Abdullah Lakhan, Mohamed Elhoseny, Mazin Abed Mohammed, Mustafa Musa Jaber, SK Hafizul Islam, SFDWA: Secure and Fault-Tolerant Aware Delay Optimal Workload Assignment Schemes in Edge Computing for Internet of Drone Things Applications, 2022, 2022, 1530-8677, 1, 10.1155/2022/5667012 | |
13. | Ali Hassan Sodhro, Charlotte Sennersten, Awais Ahmad, Towards Cognitive Authentication for Smart Healthcare Applications, 2022, 22, 1424-8220, 2101, 10.3390/s22062101 | |
14. | Abdullah Lakhan, Ali Hassan Sodhro, Arnab Majumdar, Pattaraporn Khuwuthyakorn, Orawit Thinnukool, A Lightweight Secure Adaptive Approach for Internet-of-Medical-Things Healthcare Applications in Edge-Cloud-Based Networks, 2022, 22, 1424-8220, 2379, 10.3390/s22062379 | |
15. | Abdullah Lakhan, Tor Morten Groenli, Arnab Majumdar, Pattaraporn Khuwuthyakorn, Fida Hussain Khoso, Orawit Thinnukool, Potent Blockchain-Enabled Socket RPC Internet of Healthcare Things (IoHT) Framework for Medical Enterprises, 2022, 22, 1424-8220, 4346, 10.3390/s22124346 | |
16. | Qiuying Xiao, Bingqing Wu, Wei Wu, Rui Wang, Ahmed Faeq Hussein, Adoption and Safety Evaluation of Comfortable Nursing by Mobile Internet of Things in Pediatric Outpatient Sedation, 2022, 2022, 1748-6718, 1, 10.1155/2022/3257101 | |
17. | Madeleine B. P. Vega, Antonio M. Saraiva, Marcos A. Simplicio, Bruno C. Albertini, Roberto F. Silva, 2022, A systematic review of the use of blockchain in Internet of Medical Things, 978-1-6654-5198-7, 1, 10.1109/iGETblockchain56591.2022.10087115 | |
18. | Aya Hamid Ameen, Mazin Abed Mohammed, Ahmed Noori Rashid, Dimensions of artificial intelligence techniques, blockchain, and cyber security in the Internet of medical things: Opportunities, challenges, and future directions, 2023, 32, 2191-026X, 10.1515/jisys-2022-0267 | |
19. | Houssem Mansouri, Rachida Hireche, Chahrazed Benrebbouh, Al-Sakib Khan Pathan, 2024, Chapter 28, 978-981-97-0640-2, 397, 10.1007/978-981-97-0641-9_28 | |
20. | Satya Bhushan Verma, Bineet Kumar Gupta, Sanjay Gupta, Brijesh Pandey, 2024, Chapter 22, 978-3-031-64649-2, 229, 10.1007/978-3-031-64650-8_22 | |
21. | Shrabani Sutradhar, Sunil Karforma, Rajesh Bose, Sandip Roy, A Dynamic Step-wise Tiny Encryption Algorithm with Fruit Fly Optimization for Quality of Service improvement in healthcare, 2023, 3, 27724425, 100177, 10.1016/j.health.2023.100177 | |
22. | P. Sathyaraj, S. Rukmani Devi, K. Kannan, A Cooperative Attack Detection Framework for MANET-IoT Network Using Optimized Gradient Boosting Convolutional Neural Network, 2023, 32, 0218-1266, 10.1142/S0218126623502274 | |
23. | J. Fotsing, J.-M. Moukam Kakmeni, A. Tiedeu, H. B. Fotsin, Image encryption algorithm based on 2D logistic map system in IoHT using 5G network, 2023, 83, 1573-7721, 30819, 10.1007/s11042-023-16730-x | |
24. | Noman Zahid, Ahmed Alkhayyat, Muhammad Ismail, Ali Hassan Sodhro, 2022, An Effective Traffic Management Approach For Decentralized BSNs, 978-1-6654-5468-1, 1, 10.1109/VTC2022-Fall57202.2022.10012931 | |
25. | Abdullah Lakhan, Mazin Abed Mohammed, Jan Nedoma, Radek Martinek, Prayag Tiwari, Neeraj Kumar, Blockchain-Enabled Cybersecurity Efficient IIOHT Cyber-Physical System for Medical Applications, 2023, 10, 2327-4697, 2466, 10.1109/TNSE.2022.3213651 | |
26. | Marcel Vološin, Eugen Šlapak, Zdenek Becvar, Taras Maksymyuk, Adam Petík, Madhusanka Liyanage, Juraj Gazda, Blockchain-Based Route Selection With Allocation of Radio and Computing Resources for Connected Autonomous Vehicles, 2023, 24, 1524-9050, 7230, 10.1109/TITS.2023.3255301 | |
27. | Abdessalem Mohamed Hadjkouider, Chaker Abdelaziz Kerrache, Ahmed Korichi, Yesin Sahraoui, Carlos T. Calafate, Sahraoui Dhelim, Asma Adnane, A Review of Service Selection Strategies in Mobile IoT Networks, 2024, 5, 2644-125X, 3229, 10.1109/OJCOMS.2024.3400981 | |
28. | Bimal Kumar Meher, Ruhul Amin, Mohammad Abdussami, Venkatasamy Sureshkumar, Md Ajaharul Hossain, Efficient Certificateless Anonymous Mutual Authentication in WBANs for Smart Healthcare, 2024, 25, 1524-9050, 17666, 10.1109/TITS.2024.3413321 | |
29. | Meenakshi Kandpal, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, Rabindra Barik, Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach, 2024, 37, 0353-3670, 317, 10.2298/FUEE2402317K |
Algorithm 1: FTSB algorithm |
Input: ∑Vvi=1, FaaS preference list ∑j=1M; Output: minZ 1 begin ![]() 13 End Main |
Notation | Description |
G | IoMT workflow application |
V | Number of tasks of application G |
vi | ith workflow task of application G |
vid | The deadline of a task vi |
K | Number of fog-cloud computing nodes |
k | The kth computing node of K |
ϵk | The resource capability of kth node |
M | Pool of functions |
j | jth function of node k |
C | Total number of containers in node k |
Ck | The Cth container of node k |
B | Number of blocks in the blockchain |
B1 | The ith block of B |
Bcapacity | Capacity of block B |
Algorithm 2: SFVM |
Input: Rules[Trojan, Bot, Worms, Ransomer], {j=1,…,M}; Output: {j=1,…,M} 1 begin ![]() |
Algorithm 3: QoS efficient-scheduling |
Input: Tasks Preference List ∑NG=1∑Vvi=1, FaaS preference list ∑j=1M; Output: Match[Cij×xijk]; 1 begin ![]() 12 End Main |
Algorithm 4: Task scheduling |
Input: {∑NG=1, ∑Mj=1, Match[Cij,xijk]};
1 begin ![]() 13 End Main |
Simulation parameters | Values |
Simulation Tool | Ifogsim |
Experimental Machine | Ubuntu X86-64-bit GPU |
Languages | JAVA, XML, Python |
Android Phone | Google Nexus 4, 5, and 7S |
IoMT devices | Aurdino board |
Providers | FaaS | Cost Dollar per Hour |
IBM OpenWhisk | Linux Amazon GenyMotion | 0.5 |
AWS Lambda | X86-64-bit AMI | 0.7 |
Azure Functions | JAVA, XML, Python | 0.3 |
Google Cloud Functions | Google Nexus 4, 5 and 7S | 0.5 |
AliBaba Function Compute | 160 times | 0.6 |
Kubeless Functions | 12 hours | 0.3 |
Algorithm 1: FTSB algorithm |
Input: ∑Vvi=1, FaaS preference list ∑j=1M; Output: minZ 1 begin ![]() 13 End Main |
Notation | Description |
G | IoMT workflow application |
V | Number of tasks of application G |
vi | ith workflow task of application G |
vid | The deadline of a task vi |
K | Number of fog-cloud computing nodes |
k | The kth computing node of K |
ϵk | The resource capability of kth node |
M | Pool of functions |
j | jth function of node k |
C | Total number of containers in node k |
Ck | The Cth container of node k |
B | Number of blocks in the blockchain |
B1 | The ith block of B |
Bcapacity | Capacity of block B |
Algorithm 2: SFVM |
Input: Rules[Trojan, Bot, Worms, Ransomer], {j=1,…,M}; Output: {j=1,…,M} 1 begin ![]() |
Algorithm 3: QoS efficient-scheduling |
Input: Tasks Preference List ∑NG=1∑Vvi=1, FaaS preference list ∑j=1M; Output: Match[Cij×xijk]; 1 begin ![]() 12 End Main |
Algorithm 4: Task scheduling |
Input: {∑NG=1, ∑Mj=1, Match[Cij,xijk]};
1 begin ![]() 13 End Main |
Simulation parameters | Values |
Simulation Tool | Ifogsim |
Experimental Machine | Ubuntu X86-64-bit GPU |
Languages | JAVA, XML, Python |
Android Phone | Google Nexus 4, 5, and 7S |
IoMT devices | Aurdino board |
Providers | FaaS | Cost Dollar per Hour |
IBM OpenWhisk | Linux Amazon GenyMotion | 0.5 |
AWS Lambda | X86-64-bit AMI | 0.7 |
Azure Functions | JAVA, XML, Python | 0.3 |
Google Cloud Functions | Google Nexus 4, 5 and 7S | 0.5 |
AliBaba Function Compute | 160 times | 0.6 |
Kubeless Functions | 12 hours | 0.3 |