Journal of Medical Systems

, 39:141 | Cite as

Big Data, Internet of Things and Cloud Convergence – An Architecture for Secure E-Health Applications

  • George Suciu
  • Victor Suciu
  • Alexandru Martian
  • Razvan Craciunescu
  • Alexandru Vulpe
  • Ioana Marcu
  • Simona Halunga
  • Octavian Fratu
Patient Facing Systems
Part of the following topical collections:
  1. Health Information Systems & Technologies


Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.


Big data IoT M2M Cloud computing E-health 



This work has been funded by the Sectoral Operational Programme Human Resources Development 2007–2013 of the Ministry of European Funds through the Financial Agreement POSDRU/159/1.5/S/134398, POSDRU/159/1.5/S/134397 and POSDRU/159/1.5/S/132395 and supported in part by UEFISCDI Romania under grants no. 262EU/2013 “eWALL” support project, grant no. 337E/2014 “Accelerate” project and by European Commission by FP7 IP project no. 610658/2013 “eWALL for Active Long Living - eWALL”.


  1. 1.
    Kahn, E., Natural language processing, big data, bioinformatics and biology. Int. J. Biol. Biomed. Eng. 8:107–117, 2014.Google Scholar
  2. 2.
    Ochian, A., Suciu, G., Fratu, O., and Suciu, V., Big data search for environmental telemetry. In: Communications and Networking (BlackSeaCom), IEEE International Black Sea Conference on, 182–184, 2014.Google Scholar
  3. 3.
    Vermesan, O., Friess, P., Guillemi, P., and Gusmeroli, S., Internet of things strategic research agenda. In: Internet of Things – Global Technological and Societal Trends. River Publishers, 2011.Google Scholar
  4. 4.
    Suciu, G., Halunga, S., Fratu, O., Vasilescu, A., and Suciu, V., Study for renewable energy telemetry using a decentralized cloud M2M system. In: Wireless Personal Multimedia Communications (WPMC), IEEE 15th International Symposium on, 1–5, 2013.Google Scholar
  5. 5.
    McFedries, P., The cloud is the computer. IEEE Spectr. 45(8):20–22, 2008.CrossRefGoogle Scholar
  6. 6.
    CISCO: visual networking index global mobile data traffic forecast 2014–2019, CISCO whitepaper, 2015.Google Scholar
  7. 7.
    Hassan, M. M., Song, B., and Huh, E. N., A framework of sensor-cloud integration opportunities and challenges. In: Proceedings of International Conference Ubiquitous Information Management Communication, 618–626, 2009.Google Scholar
  8. 8.
    Fox, G. C., Kamburugamuve, S., and Hartman, R. D., Architecture and measured characteristics of a cloud based internet of things. In: IEEE Collaboration Technologies and Systems (CTS), International Conference on, 6–12, 2012Google Scholar
  9. 9.
    Kranz, M., Holleis, P., and Schmidt, A., Embedded interaction - interacting with the internet of things. IEEE Internet Comput. 14(2):46–53, 2010.CrossRefGoogle Scholar
  10. 10.
    Jara, A. J., Genoud, D., and Bocchi, Y., Sensors data fusion for smart cities with KNIME - a real experience in the SmartSantander Testbed. In: Internet of Things (WF-IoT), 2014 I.E. World Forum on, 173–174, 2014.Google Scholar
  11. 11.
    McAfee, A., Brynjolfsson, E., Davenport, T. H., Patil, D. J., and Barton, D., Big data. The management revolution. Harv. Bus. Rev. 90(10):61–67, 2012.Google Scholar
  12. 12.
    The 3rd Generation Partnership Project (3GPP), TS 23.888 “System improvements for Machine-Type Communications (MTC),” Version 11.0.0, 2012Google Scholar
  13. 13.
    Venkatasubramanian, K. K., Banerjee, A., and Gupta, S. K. S., Pska: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1):60–68, 2010.CrossRefPubMedGoogle Scholar
  14. 14.
    Banerjee, A., Gupta, S., Venkatasubramanian, K. K. PEES: Physiology-based End-to-End Security for mHealth. In: The Wireless Health Academic/Industry Conference, 1–8, 2013.Google Scholar
  15. 15.
    Bagade, P., Banerjee, A., Milazzo, J., and Gupta S. K. S., Protect your BSN: No Handshakes, just Namaste!. In: Proc. 2013 I.E. International Conference on Body Sensor Networks (BSN), 1–6, 2013.Google Scholar
  16. 16.
    Ottenwälder, B., Koldehofe, B., Rothermel, K., and Ramachandran, U. MigCEP: operator migration for mobility driven distributed complex event processing. In: 7th ACM Int. Conf. Distributed Event-based Systems, 183–194, 2013.Google Scholar
  17. 17.
    Zhu, J., Chan, D.S., Prabhu, M.S., Natarajan, P., Hao, H., and Bonomi, P., Improving web sites performance using edge servers in fog computing architecture. In: 7th IEEE International Symposium on Service Oriented System Engineering (SOSE), 320–23, 2013.Google Scholar
  18. 18.
    Nishio, T., Shinkuma, R., Takahashi, T., and Mandayam, N.B., Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud. In: 1st ACM International Workshop on Mobile Cloud Computing & Networking, 19–26, 2013Google Scholar
  19. 19.
    Dsouza, C., Ahn, G.-J., and Taguinod, M., Policy-driven security management for fog computing: preliminary framework and a case study. In: 15th IEEE International Conference on Information Reuse and Integration (IRI), pp. 16--23 (2014)Google Scholar
  20. 20.
    Stojmenovic, I., and Sheng W., The fog computing paradigm: scenarios and security issues. In: Federated Conference on Computer Science and Information Systems (FedCSIS), 1–8 2014.Google Scholar
  21. 21.
    Stolfo, S.J., Salem, M.B., and Keromytis, A.D., Fog computing: mitigating insider data theft attacks in the cloud. In: IEEE Symposium on Security and Privacy Workshops (SPW), 125–28, 2012.Google Scholar
  22. 22.
    Bonomi, F., Milito, R., Zhu, J., and Addepalli, S., Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, 13–16, 2012.Google Scholar
  23. 23.
    Stojmenovic, I., Fog computing: a cloud to the ground support for smart things and machine-to-machine networks. In: Telecommunication Networks and Applications Conference (ATNAC), 117–22, 2014.Google Scholar
  24. 24.
    Saad, W., Abbes, H., Jemni, M., and Cerin, C., Designing and implementing a cloud-hosted SaaS for data movement and sharing with SlapOS. Int. J. Big Data Intell. 1(2):18–35, 2014.CrossRefGoogle Scholar
  25. 25.
    Shah, T., Rabhi, F., and Ray, P., Investigating an ontology-based approach for big data analysis of inter-dependent medical and oral health conditions. In: Cluster Computing, 1–17, 2014.Google Scholar
  26. 26.
    Eckstein, R. Interactive search processes in complex work situations - a retrieval framework, In: University of Bamberg Press, vol. 10, 62–67, 2011.Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • George Suciu
    • 1
  • Victor Suciu
    • 1
  • Alexandru Martian
    • 1
  • Razvan Craciunescu
    • 1
    • 2
  • Alexandru Vulpe
    • 1
  • Ioana Marcu
    • 1
  • Simona Halunga
    • 1
  • Octavian Fratu
    • 1
  1. 1.Faculty of Electronics, Telecommunications and IT, Telecommunication DepartmentUniversity POLITEHNICA of BucharestBucharest-6Romania
  2. 2.Center for TeleInfrastruktur (CTIF)Aalborg UniversityAalborgDenmark

Personalised recommendations