This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...ijaia
The paper proposes the results of a research industry project concerning predictive maintenance process
optimization, applied to a machine cutting polyurethane. A company producing cutting machines, has been
provided with an online control system able to detect blade status of a machine supplied to a customer
producing polyurethane components. A software platform has been developed for the real time monitoring
of the blade status and for the prediction of the break up conditions adopting a multi-parametric data
analysis approach, based on the simultaneous use of unsupervised and supervised machine learning
algorithms. Specifically, the proposed method adopts a k-Means algorithm to classify bidimensional risk
maps, and a Long Short Term Memory (LSTM) one to predict the alerting levels based on the analysis of
the last values for some process variables. The analysed algorithms are applied to an experimental dataset.
Autonomous vehicles: A study of implementation and security IJECEIAES
Autonomous vehicles have been invented to increase the safety of transportation users. These vehicles can sense their environment and make decisions without any external aid to produce an optimal route to reach a destination. Even though the idea sounds futuristic and if implemented successfully, many current issues related to transportation will be solved, care needs to be taken before implementing the solution. This paper will look at the pros and cons of implementation of autonomous vehicles. The vehicles depend highly on the sensors present on the vehicles and any tampering or manipulation of the data generated and transmitted by these can have disastrous consequences, as human lives are at stake here. Various attacks against the different type of sensors on-board an autonomous vehicle are covered.
The Study of Smart Grid Knowledge Visualization Key TechnologiesNooria Sukmaningtyas
To solve the problems of knowledge visualization for smart grid, such as single manifestations,
low-efficient use and not high model reuse rate, a general three-dimensional smart grid knowledge
visualization model was presented in this paper. First, the construction method of grid device models
based on knowledge-based reasoning was given. Then, the grid visual scene building method was
proposed. This included rapid scene organization strategy, and exploration on the storage and re-use
mechanism of three-dimensional visualization scene. Moreover, collision detection using swarm
intelligence and bionic computing to solve its existing problems. Finally, The feasibility and practicality of
the method was verified by a developed intelligent power virtual drill platform based on JME (J Monkey
Engine).
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
A novel real time video and data capture of vehicular accident in intelligent...IJCNCJournal
In this paper, a novel real-time video and data capture of vehicle accident is proposed in Intelligent
Transportation System (ITS). The proposed scheme solves the problem of huge storage needed for
recording vehicle accident in the smart vehicle and in the remote ITS server. It works efficiently with small
amount of storage size and guarantee saving accident video in secondary storage. It enables user to
capture real-time video and data of running vehicle. It enables user to get vehicle accident video and data
anytime anywhere. The scheme is implemented using testbed and its performance is evaluated. The results
show that the proposed scheme guarantees record the vehicle accident in the ITS server. The proposed
scheme has better results in comparison with full time video recording scheme.
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
Multiagent multiobjective interaction game system for service provisoning vehicular cloud
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
The use of the internet of things (IoT) in solar photovoltaic (PV) systems is a critical feature for remote monitoring, supervising, and performance evaluation. Furthermore, it improves the long-term viability, consistency, efficiency, and system maintenance of energy production. However, previous researchers' proposed PV monitoring systems are relatively complex and expensive. Furthermore, the existing systems do not have any backup data, which means that the acquired data could be lost if the network connection fails. This paper presents a simple and low-cost IoT-based PV parameter monitoring system, with additional backup data stored on a microSD card. A NodeMCU ESP8266 development board is chosen as the main controller because it is a system-on-chip (SOC) microcontroller with integrated Wi-Fi and low-power support, all in one chip to reduce the cost of the proposed system. The solar irradiance, ambient temperature, PV output voltage and PV output current, are measured with photo-diodes, DHT22, impedance dividers and ACS712. While, the PV output power is a product of the PV voltage and PV current. ThingSpeak, an opensource software, is used as a cloud database and data monitoring tool in the form of interactive graphics. The results showed that the system was designed to be highly accurate, reliable, simple to use, and low-cost.
nable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...ijaia
The paper proposes the results of a research industry project concerning predictive maintenance process
optimization, applied to a machine cutting polyurethane. A company producing cutting machines, has been
provided with an online control system able to detect blade status of a machine supplied to a customer
producing polyurethane components. A software platform has been developed for the real time monitoring
of the blade status and for the prediction of the break up conditions adopting a multi-parametric data
analysis approach, based on the simultaneous use of unsupervised and supervised machine learning
algorithms. Specifically, the proposed method adopts a k-Means algorithm to classify bidimensional risk
maps, and a Long Short Term Memory (LSTM) one to predict the alerting levels based on the analysis of
the last values for some process variables. The analysed algorithms are applied to an experimental dataset.
Autonomous vehicles: A study of implementation and security IJECEIAES
Autonomous vehicles have been invented to increase the safety of transportation users. These vehicles can sense their environment and make decisions without any external aid to produce an optimal route to reach a destination. Even though the idea sounds futuristic and if implemented successfully, many current issues related to transportation will be solved, care needs to be taken before implementing the solution. This paper will look at the pros and cons of implementation of autonomous vehicles. The vehicles depend highly on the sensors present on the vehicles and any tampering or manipulation of the data generated and transmitted by these can have disastrous consequences, as human lives are at stake here. Various attacks against the different type of sensors on-board an autonomous vehicle are covered.
The Study of Smart Grid Knowledge Visualization Key TechnologiesNooria Sukmaningtyas
To solve the problems of knowledge visualization for smart grid, such as single manifestations,
low-efficient use and not high model reuse rate, a general three-dimensional smart grid knowledge
visualization model was presented in this paper. First, the construction method of grid device models
based on knowledge-based reasoning was given. Then, the grid visual scene building method was
proposed. This included rapid scene organization strategy, and exploration on the storage and re-use
mechanism of three-dimensional visualization scene. Moreover, collision detection using swarm
intelligence and bionic computing to solve its existing problems. Finally, The feasibility and practicality of
the method was verified by a developed intelligent power virtual drill platform based on JME (J Monkey
Engine).
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
A novel real time video and data capture of vehicular accident in intelligent...IJCNCJournal
In this paper, a novel real-time video and data capture of vehicle accident is proposed in Intelligent
Transportation System (ITS). The proposed scheme solves the problem of huge storage needed for
recording vehicle accident in the smart vehicle and in the remote ITS server. It works efficiently with small
amount of storage size and guarantee saving accident video in secondary storage. It enables user to
capture real-time video and data of running vehicle. It enables user to get vehicle accident video and data
anytime anywhere. The scheme is implemented using testbed and its performance is evaluated. The results
show that the proposed scheme guarantees record the vehicle accident in the ITS server. The proposed
scheme has better results in comparison with full time video recording scheme.
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
Multiagent multiobjective interaction game system for service provisoning vehicular cloud
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
The use of the internet of things (IoT) in solar photovoltaic (PV) systems is a critical feature for remote monitoring, supervising, and performance evaluation. Furthermore, it improves the long-term viability, consistency, efficiency, and system maintenance of energy production. However, previous researchers' proposed PV monitoring systems are relatively complex and expensive. Furthermore, the existing systems do not have any backup data, which means that the acquired data could be lost if the network connection fails. This paper presents a simple and low-cost IoT-based PV parameter monitoring system, with additional backup data stored on a microSD card. A NodeMCU ESP8266 development board is chosen as the main controller because it is a system-on-chip (SOC) microcontroller with integrated Wi-Fi and low-power support, all in one chip to reduce the cost of the proposed system. The solar irradiance, ambient temperature, PV output voltage and PV output current, are measured with photo-diodes, DHT22, impedance dividers and ACS712. While, the PV output power is a product of the PV voltage and PV current. ThingSpeak, an opensource software, is used as a cloud database and data monitoring tool in the form of interactive graphics. The results showed that the system was designed to be highly accurate, reliable, simple to use, and low-cost.
nable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication user name and static password or PIN code can be easily broken by the skillful attacker. An Unauthorized user can easily enter into the system if he knows the user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password OTP approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third party is not required to generate OPT in the proposed paper. This paper can help to solve the user authentication problem in Cloud environment. Kyaw Swar Hlaing | Nay Aung Aung "Secure One Time Password (OTP) Generation for user Authentication in Cloud Environment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28037.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28037/secure-one-time-password-otp-generation-for-user-authentication-in-cloud-environment/kyaw-swar-hlaing
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
The major challenging issue in Cloud computing is Security. Providing Security is big issue
towards protecting data from third person as well as in Internet. This mainly deals the Security how it is
provided. Various type of services are there to protect our data and Various Services are available in Cloud
Computing to Utilize effective manner as Software as a Service (SaaS), Platform as a Service (PaaS),
Hardware as a Service (HaaS). Cloud computing is the use of computing resources (hardware and
software) that are delivered as a service over Internet network. Cloud Computing moves the Application
software and databases to the large data centres, where the administration of the data and services may not
be fully trustworthy that is in third party here the party has to get certified and authorized. Since Cloud
Computing share distributed resources via network in the open environment thus it makes new security
risks towards the correctness of the data in cloud. I propose in this paper flexibility of data storage
mechanism in the distributed environment by using the homomorphism token generation. In the proposed
system, users need to allow auditing the cloud storage with lightweight communication. While using
Encryption and Decryption methods it is very burden for a single processor. Than the processing
Capabilities can we utilize from Cloud Computing.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A Third Party Auditor Based Technique for Cloud Securityijsrd.com
Cloud security means providing security to users data. There are so many methods for doing this task. They all have their merits and demerits. To ensure the security of users' data in the cloud, we propose an effective, scalable and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack, The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
International Refereed Journal of Engineering and Science (IRJES)irjes
The core of the vision IRJES is to disseminate new knowledge and technology for the benefit of all, ranging from academic research and professional communities to industry professionals in a range of topics in computer science and engineering. It also provides a place for high-caliber researchers, practitioners and PhD students to present ongoing research and development in these areas.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Leading Change strategies and insights for effective change management pdf 1.pdf
Mi health care - multi-tenant health care system
1. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 1
Mi-HealthCare: MULTI-TENANT HEALTH CARE SYSTEM
Muhammad Awis Jamaluddin Johari (awis.johari@mimos.my), Lee Chee Kiam (ck.lee@mimos.my)
, Muhammad Azlan Shahariman Ahmad, (azlan.ahmad@mimos.my), Muhammad Fuad Mustafa
(fuad.mustafa@mimos.my)
Healthcare and Education Solution, Corporate Technology Division, MIMOS Berhad
Abstract
Multi-tenant architecture, commonly referred to as multitenancy, is a software architecture in which
multiple single instances of software run on a single physical server. The server then serves the software
to multiple tenants. These tenants can be within an organization or different businesses. This
architecture is gaining popularity among software development houses due to its capability to save the
cost of deployment and resources. Besides that, this architecture will give better protection to the system
which means less interaction with the outside world and thus the exposure to malicious software is
reduced. Healthcare domain is chosen as the software as services (SaaS) by the authors since this
domain is infrequently used by other software development houses and also the challenging part is to
understand the model of business in healthcare. Thus, the objective of this paper is to present a system
that uses this architecture to make use of the current technology to healthcare system. This system, from
here and onward will be referred to as Mi-HealthCare.
Keywords: Multitenancy, Health Care System, SaaS Application, Cloud Computing.
2. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 2
Introduction
Software architecture is the most important part during software development process. It serves as a
blueprint for a system. It also provides an abstraction to manage the system complexity and establish a
communication and coordination mechanism among components. The architecture of a system
describes it’s their relationships (structures), major components, and how it’s interacted with each other.
Furthermore, the architecture depends on several contributing factors such as business strategy, quality
attributes, human dynamics, design, and IT environment. For this paper, the authors decide to use multi-
tenant architecture. The business strategy and it’s IT environment will be elaborated on later.
Previously, the authors have produced project (Awis et al., 2019) that have same features as this paper
but using different architecture. From that paper, the authors use hybrid architecture due to the business
strategy, which is depends on stakeholder requirements and IT environment infrastructure defined by
the stakeholders. These include limited access to the internet and outreach visits. This challenged the
authors to come out with new ideas to make the system hybrid. After doing some study on architecture
and the evolution of architecture from the paper (Trilochan & Verma, 2017) they have mentioned that
nowadays evolution is cloud computing technology, becoming an adoptable technology for many of the
organizations with its dynamic scalability and usage of virtualized resources as a service through the
Internet. Before we to go deeper on the multitenant topic, let the authors give a brief on multitenant,
which is one of the options under cloud computing technology. The other subtopic is single tenant.
Figure 1, show the differentiate between single tenant and multitenant.
Single Tenant
Database Server
Customer A Customer B Customer C
Apps Server
Database Server
Multitenant
Customer A Customer B Customer C
Apps Server
Database Server Database Server
Database Server Database Server
Apps Server Apps Server
Figure 1: Single tenant vs Multitenant
Multi-tenancy is a popular option in cloud computing, offering shared tenancy on public cloud services
such as Microsoft Azure, Google Cloud Platform and Amazon Web Services. The advantages of using
multitenant is to align with the project that authors propose which authors listed that the system must
follow the characteristic as below:
1. Lower IT infrastructure
2. Lower costs for computer users
3. Improved performance
4. Increase data safety
3. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 3
5. Backup and recovery
6. Fewer maintenance issue
7. Instant software updates
8. Improved compatibility between Operating systems
9. Performance and Scalability
Mi-HealthCare is SaaS (software-as-a-service) in cloud computing. SaaS is to use the web to deliver
applications that are managed by a third-party vendor and whose interface is accessed on the clients’
side. Most SaaS applications can be run directly from a web browser without any downloads or
installations required, although some require plugins. With SaaS, it’s easy for enterprises to streamline
their maintenance and support, because everything can be managed by vendors: applications, runtime,
data, middleware, OSes, virtualization, servers, storage and networking. Furthermore, the authors have
made decision to use multitenant option for Mi-HealthCare system because the feature that have been
implemented in this system will be used by all the users afterward will be called as tenants. Below is
the list of the features of this system which consists of:
1. Patient Management
2. Queue Management
3. Users and Role Management.
4. Clinical Documentation
5. Prescription
6. Administration
7. Dashboard
8. Integration with Internet of Thing (IoT) devices
9. Licensing at data centre
Figure 2: Patient Management
Figure 2 shows the screenshot of the system using Chrome web browser. The page is about patient
management, tenant able to knowing details about the patient on this page. Other than that, authors also
implement queue management in this system to enable tenant to call patient as shown in Figure 3 below.
4. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 4
Figure 3: Queue Management
Figure 4: Clinical Documentation
Multitenancy Database Design
In a multi-tenant environment, multiple different customers will use the same application, on the same
hardware and with the same storage mechanism. However, the database is either logically or physically
isolated on per tenant or group basis. In general, there are 3 levels of separation:
1. A single, shared database schema
- This approach uses a single database to host data for all tenants. Logical separation is
achieved via storing tenant identifier for each data.
2. Single database, multiple schemas
- This approach divides tenants’ data without having to set up multiple databases. The
tenant identifier is the database schema itself. Each tenant is only granted access to its
own schema to achieve isolation and operates differently.
5. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 5
3. Multiple databases
- A new database is provisioned for each new tenant. With database per tenant approach,
customization for individual tenant is straightforward to be achieved.
In the digital age, more and more personally identifiable information (PII) and personal health
information (PHI) of millions of users are stored outsides of users. A number of regulations and acts
have been introduced. This includes European Union General Data Protection Regulation (GDPR),
United States of America The Health Insurance Portability and Accountability Act (HIPAA) and
Malaysia Personal Data Protection Act (PDPA).
Pseudonymization is a process that allows the user to switch the original data set, for example data
subject’s e-mail or a patient’s National Registration Identity Card (NRIC) Number with an alias or
pseudonym. This pseudonym is often a numeric or alphanumeric identifier, which is usually generated
randomly. Pseudonymization is used in data security to conceal the identity of a person. Sensitive data
can then be stored with the pseudonym and the list of pseudonyms and related personal information is
stored separately. This makes it harder for an attacker to steal the data. Pseudonymization is a reversible
process that de-identifies data but allows the reidentification later on if necessary. This is a well-known
data management technique that is highly recommended by the GDPR as one of the data protection
methods.
On the other hand, anonymization is the irreversible removal of information that could lead to an
individual being identified, either on the basis of the removed information or in combination with other
information. This definition emphasizes that anonymized data must be stripped of any identifiable
information, making it impossible to derive insights on a discreet individual, even by the party that is
responsible for the anonymization. Anonymization is the permanent replacement of sensitive data with
unrelated characters, either using scrambling, generalization or masking techniques. A data once
anonymized, cannot be re-identified.
Pseudonymization makes it easier for data processors to process personal information without the fear
of exposing sensitive data to personnel and employees who should not have access to it. For example,
in Health Information System (HIS) or Clinical Information System (CIS) system, which is considered
as primary database usage, the user of the systems, e.g. health care provider (HCP) like nurse, doctor,
dentist, specialist shall be able to identify the patient to prevent wrong diagnosis which could cause
serious and critical impact to patient. For secondary database usage like data warehouse, statistical or
research purposes, anonymization techniques should be used to protect sensitive PHI and achieve data
privacy.
Virtualization vs Containerization
When using cloud computing, there are two options to improve scalability, reduce overhead costs, and
standardize software deployments across multiple machines and platforms, virtualization and
containerization. The goal of these two options is to host a maximize number of applications per
physical server. Furthermore, satisfying rate of performance, security performance and scalability of
the system need to highlight when using those option. In this section the authors will elaborate more on
which one that will be used for this project and why the authors choose that option for this project.
Virtualization is a technology that can enables a single personal computer (PC), workstation or server
to simultaneously run multiple operating systems or multiple sessions in a single operating system (OS).
In other words, this technology allows multiple OS’s and workloads to run on the same physical
hardware including computer hardware platform, storage device and computer network resources.
There are three type of virtualization which is full virtualization, paravirtualization and hardware
assisted virtualization.
6. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 6
Full virtualization, one or more OSs and the applications they contain are run on top of virtual hardware.
Each instance of an OS and its applications runs in a separate VM called a guest operating system. The
guest OSs on a host are managed by the hypervisor, which controls the flow of instructions between the
guest OSs and the physical hardware, such as control processor unit (CPU), disk storage, memory, and
network interface cards. The hypervisor can partition the system’s resources and isolate the guest OSs
so that each has access to only its own resources, as well as possible access to shared resources such as
files on the host OS. Also, each guest OS can be completely encapsulated, making it portable. Some
hypervisors run on top of another OS, which is known as the host operating system (Scarfone et al.,
n.d.).
Paravirtualization refers to communication between the guest OS and the hypervisor to improve
performance and efficiency. This involves modifying the OS kernel to replace non-virtualizable
instructions with hypercalls that communicate directly with the virtualization layer hypervisor. The
hypervisor also provides hypercall interfaces for other critical kernel operations such as memory
management, interrupt handling and time keeping. Paravirtualization is different from full
virtualization, where the unmodified OS does not know it is virtualized and sensitive OS calls are
trapped using binary translation. The value proposition of paravirtualization is in lower virtualization
overhead, but the performance advantage of paravirtualization over full virtualization can vary greatly
depending on the workload (VMware, n.d.).
Hardware-assisted virtualization is also called native virtualization, accelerated virtualization, or
hardware VM, depending on the vendor. Hardware-assisted virtualization is a technology of
virtualization approach that enables efficient full virtualization using help from hardware capabilities,
primarily from the host processors. This type can reduce the maintenance overhead of paravirtualization
as it reduces (ideally, eliminates) the changes needed in the guest operating system. It is also
considerably easier to obtain better performance. The disadvantages of this type is requires explicit
support in the host CPU, which is not available on all x86/x86_64 processors. To identify the CPU that
use this technology like Intel Virtualization Technology (VT-x) and AMD-V.
From Docker website, container is a standard unit of software that packages up code and all its
dependencies so the application runs quickly and reliably from one computing environment to another.
Containerization is the process of engineering a software architecture using multiple containers.
Containers are becoming more common because they provide many of the isolation benefits of VMs
without as much overhead. Although containers are typically hosted on some version of Linux, they are
beginning to also be hosted on other OSs such as Windows. Containers are being heavily used in Cloud-
hosted applications. Containers are increasingly being used to support the continuous development and
integration (CD/CI) of containerized microservices.
Above is the elaboration and study on fundamental on virtualization and containerization. After doing
some research and study on both options, the author also found paper (Vestman, n.d.) that do the
comparison between containers and virtual machine. On that paper, he concludes that the virtual
machine is the better choice for application where privacy is a higher priority, due to the complete
isolation and abstraction from the rest of physical location. The authors agreed on that statement but the
authors have some characteristics that make containers more suitable for our solution as listed in Table
1.
7. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 7
Characteristic Virtualization Containerization
Number of applications per server Lower Higher
Number of copies of single application One Many
Performance (throughput, not response time) Lower Higher
Readily share resources (devices, services) No Yes
Robustness via failover and restart Not supported Supported
Scalability & load balancing (dynamic deployment) Slower and Harder Faster and easier
Table 1: Mi-HealthCare Characteristics
https://www.armor.com/resources/containerization-the-need-to-know/
Figure 3: Virtualization vs Containerization
Container Orchestration
Container orchestration is all about managing the lifecycles of containers, especially in large, dynamic
environments. It also includes simplifies tasks of building, deploying, and maintaining containers across
servers. Below is the list of tasks that mostly software team use for container orchestration:
1. Provisioning and deployment of containers.
2. Redundancy and availability of containers.
3. Scaling up or removing containers to spread application load evenly across host infrastructure.
4. Movement of containers from one host to another if there is a shortage of resources in a host,
or if a host die.
5. Allocation of resources between containers.
6. External exposure of services running in a container with the outside world.
7. Load balancing of service discovery between containers.
8. Health monitoring of containers and hosts.
9. Configuration of an application in relation to the containers running it.
There are a lot of tools for container orchestration like Kubernetes, Docker Swarm, Mesos Marathon
and many more. But need to clearly understanding on the key features that they provide depending upon
the use case, it will be easier to opt for the best one. In our project the authors have decided after doing
some study on paper (Platform9, 2018) to use Docker Swarm as our orchestrator. The reason why we
chose Docker Swarm is due to the fact that we are using Docker as our containerization. To avoid
conflict during integration, we decide to use same vendor for orchestration. Furthermore, the features
that have in Docker Swarm which is the configuration to have multi-container by using YAML files
8. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 8
only to configure. Then, using these vendors also we can embed health check functionality into their
Docker images using the HEALTHCHECK instruction. Figure 4 is a diagram that show the concept of
container orchestration.
https://devopedia.org/container-orchestration
Figure 4: Concept of Container Orchestration
Conclusion & Future Scope
Mi-HealthCare is a clinical web-based application that use full cloud-based system and use multitenant
architecture to make use of the current technology to healthcare domain. Not limited on that, Mi-
HealthCare has automated deployment and auto-scaling for applications depending on number of users,
number of 3rd
party integration and how much patients visit per day. Mi-HealthCare also has cloud-
based clinic queue management that is able to connect within branches or states using internet. It is fully
developed by open sources, using Java for backend, Angular for frontend and also the PostgreSQL
Server as the database. By using this system, the organization can reduce cost on maintaining hardware
within branches or states. Other than that, the organization can feel more secure that all data that has
been uploaded to cloud, only the authorized person can access and manage it.
This system is currently in development phase using the required features cross the various modules.
For future enhancements which can be carried out include adding dental functionalities to the system,
data exchange between public clinic and private clinic on patient history. Mobile support for patient
related modules will also be an added advantage to support integration with medical devices through
the Internet of Things (IOT)
Pseudonymization and anonymization are two of the pioneering and core techniques to be used on the
forefront of the health data privacy protection. It is relevant and valid for both GDPR and HIPAA.
Although the PDPA states that a data subject has the right to anonymize their personal data, unlike the
GDPR, it does not specifically define anonymized or pseudonymized data. This paper also suggests that
the Malaysian government improves on the coverage of PDPA by introducing pseudonymization and
anonymization.
9. E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 9
References
1. Awis, M., Johari, J., Shahariman, M. A., Izyan, N., Faizulnizam, N., & Kiam, L. C. (2019). HYBRID
DENTAL CHARTING SYSTEM (HyDeCS). E-Proceeding Of The 8th International Conference On
Social Science Research 2019 Conference On Social Science Research 2019, 2019(November), 1–
9.
2. Platform9. (2018). Container Management : Kubernetes vs Docker Swarm , Mesos + Marathon ,
Amazon ECS. https://platform9.com/wp-content/uploads/2018/08/kubernetes-comparison-
ebook.pdf
3. Scarfone, K., Hoffman, P., & Hoffman, P. (n.d.). Guide to Security for Full Virtualization
Technologies Recommendations of the National Institute of Standards and Technology.
4. Trilochan, & Verma, A. (2017). Cloud Computing: Evolution and Challenges. International Journal
of Engineering Science and Computing, 7(4), 10197–10200. http://ijesc.org/
5. Vestman, S. (n.d.). Cloud application platform-Virtualization vs Containerization A comparison
between application containers and virtual machines. http://www.diva-
portal.org/smash/get/diva2:1112069/FULLTEXT01.pdf
6. VMware. (n.d.). Understanding Full Virtualization, Paravirtualization, and Hardware Assist. 1–11.
https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/techpaper/VMware_
paravirtualization.pdf