Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Secure Monitoring System for IoT Healthcare Data in the Cloud

Version 1 : Received: 5 July 2023 / Approved: 5 July 2023 / Online: 5 July 2023 (05:07:51 CEST)

A peer-reviewed article of this Preprint also exists.

Stergiou, C.L.; Plageras, A.P.; Memos, V.A.; Koidou, M.P.; Psannis, K.E. Secure Monitoring System for IoT Healthcare Data in the Cloud. Appl. Sci. 2024, 14, 120. Stergiou, C.L.; Plageras, A.P.; Memos, V.A.; Koidou, M.P.; Psannis, K.E. Secure Monitoring System for IoT Healthcare Data in the Cloud. Appl. Sci. 2024, 14, 120.

Abstract

Even if the field of medicine has made great strides in recent years, infectious diseases caused by novel viruses that damage the respiratory system continue to plague people all over the world. This type of virus is very dangerous, especially for people who deal with serious long-term breathing problems, like triggering asthma, pneumonia, or bronchitis infections. Thus, this paper demonstrates a new Secure Machine Learning Monitoring System for a model for virus detection. Our proposed model makes use of 4 basic emerging technologies, Internet of Things (IoT), Wireless Sensor Networks (WSN), Cloud Computing (CC), and Machine Learning (ML), to detect dangerous types of viruses that infect people or animals causing panic worldwide and deregulating human daily life. The proposed system is a robust system that could be established in various buildings, like hospitals, entertainment halls, universities, etc., and will provide accuracy, speed, and privacy for data collected in the detection of viruses.

Keywords

Internet of Things; Machine Learning; Cloud Computing; Artificial Intelligence; Security; Healthcare; Monitoring; Detection

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.