1 Introduction

Recent advancements in the field of wireless and multimedia technology as well as computing, hold out promise to perform real-time communication in the various user-based sectors of health, transportation, media, and education, etc. The vision of the Internet-of-Things (IoT) is one such and provides real time information to the connected users. The scope of the Internet-of-Things is broad and includes the living and non-living entities connected to each other in the network. Major IoT components include sensor devices, wireless communication devices, and application and services. A few additional components related to security and privacy can also be used. At a lower level these devices are networked with each other for timely processing of the information in real time and also categorized into various groups to manage the security related issues. In fact, the Internet-of-Things can be utilized with any of the sectors listed above, including eHealth. The meaning of term eHealth varies in terms of the source it is used for. World Health Organization (WHO) defines eHealth as the transfer of health-related information using electronic means[17]. Technologies like E-commerce and E-business play an important role in disseminating such information over the internet. Advancements in the field of wireless sensor network and cloud computing have also realized the vision of the sustainable health centers which monitor the health status and predict alerts in real time for both the health care personnels and users. Several organizations, like CISCO, General Electric etc. have expected that the IoT based health care market in future will become a $117 billion market by year 2020 [34].

In the current work, the concept of Internet-of-Things has been used with the proposed cloud centric architecture to predict the users physical activities at sustainable health center of smart city. Most health care personnel purport that if an individual exercises regularly, then the complications and increase in the dosages of medications for diseases like diabetes, blood pressure, and heart issues, can be postponed accordingly. Figure 1 represents the same information in which E shows the user group based on medications only, whereas E’ shows the user group on medications as well as performing regular physical activities. The E’ user group lives a healthy life and can postpone the complications of the diseases mentioned above, whereas the E user group needs to increase their medication intake over a period of time to live a normal life. In this work, we have emphasized on the use of embedded sensors rather than wearable sensors. In [33] Zhang et al. have also highlighted that wearable sensors are intrusive and place extra burden on users whereas use of embedded sensors are usually unobtrusive and enabling revolution in nearly all aspects of healthcare with reduced usability issues. The proposed architecture monitors the users during their regular activities in these health centers and predict alerts to and from their healthcare personnel. Zhang et al., [33] explained the use of the wireless sensor networks in healthcare in the future from a ubiquitous perspective. They proposed a three-tier system of architecture for healthcare applications. They also stated that with the technological advancements, the field of medical informatics has focused more on as well as emphasized the use of the Smartphone’s over wearable devices. They have realized several challenges in terms of information security, mobility control and applications while designing the applications. Chen et al., [4] have presented the vision of IoT from the perspective of China and specified that in ”Remote medical monitoring” data can be collected from various sensor-like devices placed on an individual’s body and once the data is processed advice can accordingly be given. In[12] Islam et al., have presented various aspects of the IoT-based health care technologies and stated that IoT can help any age group and address any disease in an innovative manner. They also focused on the various healthcare security challenges related to IoT and proposed an intelligent security model to mitigate these risks. They are confident that the use of the IoT and eHealth policies can lead to sustainable development in any country. In [18] Yang et al., have designed the home mobile healthcare system for wheelchair users. The proposed architecture utilizes the Smartphone for sending and receiving instructions from the source and sinks nodes. In [2] Amendola et al., have used the RFID based on wearable tags to identify the movement of the body parts like arms, legs etc.; in fact, they have used the IoT for monitoring the information collected on human lifestyles.

Fig. 1
figure 1

Effect of medicines over time

From the perspective of the health care personnel there are several advantages of real-time health monitoring of the users. This paper presents the use of technology like cloud computing and the Internet-of-Things and discusses the detailed implementation of the proposed architecture over the cloud centric environment. This framework reduces the complexity and challenges as discussed by Zhang et al., [33]. Using the Clouds enables the efficient handling of processing the information and security. The users can move freely without requiring any wearable sensor on their body and of the necessity to use the Smartphone too is avoided..

This work makes the following contributions:

  • A novel architecture has been proposed to monitor the users activities in sustainable health centers of a smart city.

  • The proposed framework monitors the details of the basic parameters such as heart rate, distance, speed, and calories burned daily by a user, and stores this information only at the end of the session using either the public cloud or private cloud, respectively. Thus, the proliferation of information can be reduced.

  • Health care personnel can access this stored information whenever required. In case of any irregularity is predicted in the users’ activity or basic parameters then an alert is automatically sent to the health care personnel to initiate action.

  • Provides better response time and security to the information stored.

Finally, this paper is organized into various sections where Section 2 summarizes about various works related to Internet-of-Things based architectures, and cloud based health care architectures proposed for eHealth. This section also presents summary about proposed health care applications that monitors the users activity continuously either using sensors or Smartphone’s. In Section 3, IoT based development architecture of proposed system has been presented. This section consists of overall development methodology presenting four layer architecture, user activity framework, and efficiency of proposed framework. In Section 4, we have presented the proposed cloud centric architecture representing the detailed connectivity, aligned with cluster of IoT based equipments to various types of clouds, and cloud datacenters. This section also presents major implemented cloud algorithms like predictive analysis mechanism, and Cloud security mechanism. Section 5, presents results and discussions and summarizes the results obtained for proposed architecture related to its adoption, predictive analysis of physical activities, efficiency, and security analysis. At last, we have concluded our work in Section 6.

1.1 Used terms

  • Sustainable Health Center: these health centers are the part of smart city and are equipped with various equipments to perform various physical activities and to keep the records updated of every physical activities for each user within local database server(s).

  • Health care personnel: are the person(s) who are concerned more about the user’s health and can suggest their advice to the concerned user whenever required. These personnels could be user’s family doctor or person who have similar or equivalent qualification to be a doctor.

2 Related work

The usage of IoT in the future lies in the hand of the technology and computing techniques, so that the information can be processed and provided in time to the user. A delay can result in the failure of the system. This section includes detailed focus on the work done related to the architecture of the IoT, health frameworks, health care frameworks and applications and Cloud based health care architectures.

2.1 IoT architecture

Over a period of time different definitions and architectures of IoT have been proposed by various organizations. Chen et al., [4] have listed some of these proposed definitions which include the terms like ”global infrastructure”, ”global network infrastructure” or ”worldwide network” to refer to Internet-of-Things. Here, one commonality in these definitions is that they build a bridge between the physical and virtual objects, which include communication technologies and data processing. These common features of IoT support its architecture. Chen et al., are also concerned with the high implementation cost of IoT because of the integration of data and use of private protocols by different organizations. They have focused on the need for an open and generic architecture of IoT. Yang and Zhang [13], as well as Ortiz et al., [23] have proposed an open and generic architecture of IoT, which is flexible, scalable, concurs with standard protocols, and can integrate multiple IoT applications. The China communication standard association has also proposed a generic IoT architecture consisting of three layers called sensing, network, and application [4]. Wan et al., [31] have discussed the IoT sensing framework which comprises four layers called sensing and information gathering, information delivery, information handling, and application. All of these layers ensure privacy and security throughout the use of the information. In [6] Domingo has proposed the three-tier IoT architecture for disabled individuals and includes layers like perception, network, and application. The proposed architecture was implemented for different application scenarios like shopping, school, and smart homes. Similarly, several more IoT architectures [5]-[32] have been proposed and discussed for various scenarios.

2.2 IoT based health care frameworks

With the rising demand and great future possibility of the implementation of the IoT in eHealth, several frameworks have been proposed for real time monitoring of the users and to provide support if required. In [26] Santos et al., have proposed a novel IoT based solution for ubiquitous m-Health scenarios and developed a prototype for remote monitoring. Proposed AMBRO platform architecture have there basic layers known as IoT world, intelligent clouds and user interfaces. Here, AMBRO clouds uses RESTful web services for communication. In [2] Amendola et al., have implemented the RFID technology with the sensing or physical layer of the IoT architecture to monitor user health and activate remote assistance when required. They have recorded the users personal health using the various body-centric RFID tags such as the wearable and implantable tags. Authors have also discussed the scenarios where these tags are sufficient to collect the data but lack the implantation details and the results make this work appear weak. They have concluded that there is great need to boost the data transfer rate of the readers, different softwares and devices to take timely action. In [28] Santos et al., has also proposed an RFID based M-health care system using the IoT based connected devices. They have focused on the enhancement of the health services using IoT and RFID technology. In [18] Yang et al., have designed a prototype of intelligent home healthcare monitoring system for disabled individuals. This prototype is implemented using the wireless body sensor networks such as wireless heart rate sensor, wireless pressure sensor, and home environment sensing. These sensors have been presented in their mHealth framework. They used the Smartphone to deploy the prototype for sending and receiving the commands. Here, the use of the Bluetooth v 2.0 limits and slows down the functioning of the prototype; the security aspects related to data have also not been discussed. In [33] the work presented by Zhang et al., discusses the use of the wireless sensor network in the health care systems. They have designed a three-tier framework to implement the proposed system. Authors have discussed the different aspects of data communication standards like IEEE 802.11-2012 standard for WLAN, IEEE 802.11-2011 standard for cognitive radio, IEEE 802.20 standard for high velocity mobile broadband system, IEEE 802.16-2009 standard for WiMAX and mostly used by telemedicine, and IEEE 802.15.1-2005 standard for Bluetooth. They have identified that the IEEE 802.16 standard can be used throughout the healthcare systems because it is collision free and provides high QoS in real time for various medical services. The authors have not discussed the security aspects of the proposed framework. In [19] Mitra et al., have proposed a KNOWME body area sensing platform for end-to-end communications and used the wearable sensors and Smartphone for collecting and transferring the captured information. The proposed KNOWME platform comprised is composed of four layers for performing the tasks and reduces the complexity of the communications by using the code-division multiple access system (CDMA). The authors have mainly focused on the sensor management, and maintaining the buffers as well as emphasized the need for revisiting the wireless communication standard for eHealth.

2.3 Health care applications

Rapid growth of health care related applications simplifies tasks deployment, collection and performing data analysis easier. Advances in sensor devices also lead to this development of new applications to be used by eHealth. Mobile healthcare which is also known as mHealth has only become possible because of this advancement in sensors technology and represents the new opportunities for mHealth applications. According to ITU, there are 5.9 billion mobile subscribers around the world and most of the organizations and researchers want to utilize this market as emerging mHealth market for health care delivery [11]. Wide range of mHealth applications can be found for monitoring of Diabetes [7], Blood Pressure [14], Heart rate [25], Physical activity [15], and Anti-Obesity [20] like areas. There are varieties of health care applications available for various types of Smartphone, Tablets, and iPad like devices and are known as BlueBox [25], WIHMD [14], AppPoint [21], HeartToGo[24], Instant heart rate [1]. Though various types of applications can be find over internet but somewhere these applications lack in security and privacy, reliability, efficiency, and acceptability. Moreover, these applications are designed for Smartphone like devices where battery life is another issue. Here, Fig. 2(a) represents the health care application to monitor ECG using Smartphone, Fig. 2(b) shows the mobile application for monitoring of Blood Pressure, heart rate, S P O 2, Fig. 2(c) represents the capturing of blood pressure monitoring device data using smart phone, and Fig. 2(d) represents the information of Glucometer using smartphone. These applications continuously checks for the incoming data obtained by sensor for activities like heart rate, ECG, pulse, blood pressure, and blood sugar levels of user and keep informing to the health care personnel in case of any emergency.

Fig. 2
figure 2

Health care applications uses Smartphones to monitor (a)ECG, (b)Blood pressure, heart rate, SPO2, and body temperature (c) Blood pressure and Pulse (d) Blood sugar level

2.4 Cloud based health care architectures

As we have seen, by introducing IoT in health care leads to development of new frameworks, and applications by researchers and organizations. Further, integration of clouds with IoT based frameworks could provide several benefits of easy to deploy mechanism over traditional networks, enhanced information security during communication, quick access of records, and energy savings over traditional existing health care frameworks. In [30] Tyagi et al. have proposed a cloud based conceptual framework for implementing Cloud centric IoT based health care framework. Authors have tried to build a network of various health care entities like patients, doctors, hospitals etc. and used this network for safe transfer of medical information. Authors have also emphasized that a complete security model for cloud need to be implemented. In [9] Hossain and Muhammad have focused on real-time health monitoring infrastructure for analyzing patients. They have presented a HealthIIoT framework to monitor ECG and other health care related data using smart phones. Proposed healthIIoT architecture is designed around clouds. Authors have used the watermarking techniques for security of data to be communicated. In [22] Nandyala and Kim have proposed a IoT based architecture for u-Healthcare monitoring. They have also mentioned that traditional cloud computing architecture faces a lot of challenges and presented an extension of cloud as Fog. They have proposed a Cloud to Fog computing model for implementing the proposed architecture of health care monitoring. In [16] Kumar et al., have proposed a RFID based intelligent authentication scheme in the health care using vehicular cloud computing. The authors have placed various tags and readers from users to road side units. Communication between these tags and readers are secured by elliptical curve cryptography based key generation algorithm. Authors have evaluated the effectiveness of proposed scheme using various parameters. In [10] Hassanalieragh et al., have presented the integration guidelines for remote health monitoring in to medicinal practice. They have used smartphones as concentrator in IoT infrastructure and for aggregation of data, cloudlet’s or clouds have been used. It is also realized that data processing could be done more efficiently using clouds rather that cloudlet’s and wearable sensors have been used to collect the information. Authors have performed two-three days of continuous physiological monitoring using these sensors and collected related physiological parameters to update the relevant health database. In [29] Seales et al., have proposed architecture for content centric networking for Health-IoT. This networking has several benefits and integrates health services and sensors, and clouds in Health-IoT. Proposed PHINet architecture automatically record the body data from user body sensors and further update the database accordingly. Use of clouds in this architecture makes data easy to handle for analysis of both user and health care personnel. Wan et al., [31] have implemented the platform production services using IoT and inter cloud computing architectures. Proposed framework was used by vehicular networking applications. Authors have evaluated the performance of proposed system using probabilistic theory.

3 Proposed IoT based development architecture

From the literature reviewed, we can find that there is still a lot of possibility for the improvement and optimization of the proposed and implemented frameworks until now. Most of the proposed health care frameworks are over optimized as they generate large amounts of data, and continuously send alerts to the users and health care personnel, which are of no use. Most of these frameworks and applications are designed to use the Smartphone for monitoring and capturing of data. In such a scenario, the continuous connectivity of the Smartphone devices is questionable. Keeping these shortcomings a priority, we have proposed the IoT based development framework as shown in Fig. 3 which consists of the evaluation, implementation, feedback and security layers in the IoT environment for a cloud centric communication between the user and health care personnel. Figure 3 also shows the capturing of user’s physical activity record from Treadmill located in a sustainable health centre of a smart city further this captured information if transferred using WIFI access point to local database servers and then to various cloud servers. At another end of Fig. 3 various connected devices like laptop, PDAs, mobile phones are shown, which are used for receiving of alerts for various health care personnels. The development framework simplifies the data acquisition and data analysis tasks and also reduces the complexity of implementation and connectivity of the devices at a physical level.Similar to several other frameworks, this proposed architecture is not Smartphone centric and keeps tracking the user’s activity in the sustainable health centers on a regular basis.

Fig. 3
figure 3

Proposed IoT based development architecture for Cloud centric communication

3.1 Development methodology

The methodology behind the application development is to implement the IoT architecture layers for cloud centric communications. This methodology proposes four different layers which are discussed later in this section and claims to provide simplified and faster communication between the user and health care personnel. This methodology also reduces the amount of data necessary to be stored for analysis purposes and requires regularity in the activity of the users so that the health care personnel can be kept informed on the users’ health and activity status.

  • Implementation layer simplifies the overall architecture from the capture of information to its storage and analysis. This architecture uses the embedded sensors of the equipment rather than any wearable sensors by the user. This layer implements an application for monitoring the health of each individual user. The application in turn transfers the collected data to the required cloud from where it can be accessed by the health care personnel.

  • Evaluation layer represents thorough usage of the implemented application by the user. Issues reported by the user and health care personnel related to the use of application or communications are addressed. This layer performs its functions throughout the utilization of the application. Here, the main focus is to ensure a reduction in the complexity and its adoption to improve the health care services.

  • Feedback layer uses the outputs of the evaluation layer which are used to modify the application accordingly. After each evolution cycle of the implemented application, reported modalities are rectified, which helps in improving the performance of the overall proposed architecture.

  • Security layer focuses on the security related issues during storage and communication of the information. This layer also provides its functioning for cloud centric environment for various types of cloud servers like User cloud, Mobile cloud and Cloud database. The purpose of this layer is to ensure the security of user information for which he/she has subscribed.

The role of each layer is to ascertain whether they meet the desired goals stated for them or not. These desired goals may be different for each layer and focus on the need of the user and health care personnel. These goals also ensure the overall quality of the system, and the collected information could be used to generate the visual results and alerts regarding the users’ health. This information is stored confidentially with various types of clouds by implementing appropriate security mechanism.

3.2 Application architecture

Application architecture for the IoT based system proposed above reduces the complexity of the information storage, communication and enhances the performance of the overall health care system. The proposed application architecture is modified form of traditional 3-Tier architecture that represents the client-tier, business logic at middle tier, and database at server-side. In the proposed application architecture, various web services, and security services reside inside the clouds which are further implemented as a part of middleware technologies Fig. 4 introduces the multi-layer application architecture which includes the IoT sensor devices, Treadmill equipment, application servers, base stations, and handheld devices like PDAs, Tablets, notebooks etc. at the bottom. These interconnected devices communicate with the user interfaces designed with JAVA. These user interfaces are responsible for capturing the information from the connected sensors of the treadmill equipment at the end of the user session and any further update of this information with the cloud servers. On the other hand, health care personnel can utilize these user interfaces to know the health status of the users and advise them accordingly. These user interfaces are further connected via the middleware with many Cloud Servers and support the inter cloud communication with Cloud Database. In middleware technologies, XML Web-Services can be used to carry secure information from these interfaces to the cloud and can also communicate with the required database for reporting to the user’s request. User database is defined and designed using the star schema for reporting purposes. This multi-dimensional star schema related to many relations including authentication and authorization, and processes the required information accordingly. Standard SQL queries have been used to fetch and insert records from the multi-select relations. It is also ensured that the information flow is consistent throughout the layers and appropriate Cloud security mechanisms like AES and RSA have been implemented for encryption and decryption of the information.

Fig. 4
figure 4

Application Architecture

3.3 User activity framework

This is an interactive user activity framework which keeps both the users and health care personnel updated. Here, user of the system has been considered as a smart user and performs health related activities in sustainable health centers. These sustainable health centers have equipment fitted with sensors which are sufficient to capture the basic parameters related to the users’ health activities such as average heart rate, total calories burned, total distance and average speed. This framework captures the information required once the user completes the exercise. Regular activities in these health centers are believed to be able to keep a user fit rather than on the heavy dependence on medicines. Health care personnel also suggest the same,and encourage regular physical activity to keep healthy for a longer time and avoid overdose of the prescribed medicines. Normally, brisk walking is recommended for users with diseases like diabetes, blood pressure, and heart patients and the treadmill equipment can be utilized for the same purpose. The proposed activity framework monitors the user’s activity on a regular basis and updates the captured information to the required cloud. In case the user does not perform an activity for a specific time period then this information will also be updated in the cloud database and an alert will be sent to the respective health care personnel, who can further communicate with the user regarding understanding the status of his health.

Figure 5 represents the user activity framework from the beginning and until end of the physical activity in a sustainable health center. As the biometric identification and authentication are completed for the user, a secure session gets established with the local database server to monitor the user’s activity on that equipment. Here, it is considered that the equipment have embedded sensors which can monitor and transfer the details of the basic parameters like heart rate, total calories burned, total distance and average speed to the connected local database servers. As soon as the physical activity session is over, the equipment stops and the respective values of the basic parameters are stored in the local database server of the sustainable health center. In case the users terminate the session in the middle of the physical activity then that session will be marked INCOMPLETE and the respective values of the basic parameters are stored in the database. In the next step of this framework, the information stored at the local level is transferred via the gateway to the various Cloud servers. These Cloud servers keep the information up-to-date and secure. Later on, this stored information is picked up by the real time communication servers located geographically with the different health care personnel. These real time communication servers process the record thus obtained and relate them to the user on a weekly basis to produce the reports accordingly. If the user regularly terminates the physical activity sessions, before the prescribed activity time for a particular equipment or is absent from the sustainable health center then an ALERT message is sent to the user’s health care personnel either in the form text message or an Email alert.

Fig. 5
figure 5

User activity framework

3.3.1 Efficiency analysis of the proposed framework

In this section we have analyzed the efficiency of the proposed framework using processing response time i.e. when the health issue had been noticed and when the advice to the user was provided in real time environment. As stated earlier, the proposed framework captures the basic health parameters of a user and if any health related issue is observed then the C o l l e c t B a s i c P a r a m e t e r s() method will provide the details related to that particular user.

figure d

Health care personnel can study these stored basic parameters, overall physical activity sessions and the health status of the U s e r to accordingly provide advice in real time. Cloud based XML services are used to find the locations of the U s e r and H e a l t h C e n t e r and to access the O v e r a l l H e a l t h S t a t u s. Function C o n d u c t C l o u d S e r v i c e s is used to obtain these details. In casethe overall health status of the user is found to be acceptable then function P l a n A d v i c e is used to support the user who requires attention. Therefore, the function, C o l l e c t B a s i c P a r a m e t e r s can provide the rough estimated efficiency of the proposed framework. If T a is the start of the advice time and T i is an issue reported time then cost function C can be described with certain assumptions, as follows:

$$ C = Min(T_{a} -T_{i}) $$
(1)

Assumptions:

  • User perform regular health checkup at least once in 6 months and keep the records updated with his cloud database.

  • User with critical disease can be put on high alerts and may require frequent advice.

4 Proposed Cloud centric architecture

The proposed cloud centric architecture reduces the overall complexity of the implementation of the system. It implements various security measures at each step of the communication of the information. As shown in Fig. 6, the initial level collects and stores the information for each user from the sustainable health centers into their database server at the local level. The information collected represents the daily values of the basic parameters the specific user has worked out. To communicate this information thus gathered over the cloud the XML Web services have been used as they are considered secure and faster. From the initial level, the information is collected from the various database clusters distributed to the cloud centric data center. These data centers also ensure the security of the stored information and further disseminates the information to the public and private clouds. The information stored in these clouds depends on the type of service and level of security required by the subscribed user.

Fig. 6
figure 6

Cloud Centric Architecture

Private Cloud :

- claims secure and prompt communication from the initial level to the health care personnel. Users can be subscribed to faster and secure communication by selecting this cloud. Users suffering with critical disease must subscribe to a private cloud for continuous monitoring by their health care personnel. If the system detects any emergency then an alert message is sent to all the attached devices of the health care personnel to handle the situation efficiently.

Public Cloud :

- compared with the private clouds, these clouds are freely available to access and store information. Here, the stored information is processed by the health care personnel on a weekly basis or whenever it is required. Usually, users with good health status subscribe to this cloud. Handling of alerts is similar to a private cloud.

Both private and public clouds are equipped with a Mobile information server, content management server, file server, and streaming media servers. These servers continuously exchange information whenever required with their respective clouds. While implementing this architecture, different algorithms are used with different types of clouds to maintain the integrity, consistency and security of the user’s information.

4.1 Cloud centric algorithms

In this study the major implemented algorithms which perform their functioning in a cloud centric environment have been presented. Algorithm 2 reveals the overall cloud centric mechanism using three levels viz., Initial, Cloud data center, and Alert mechanism. The initial level is associated with the user identification and authentication and supports the IoT based connectivity of the various equipment of the sustainable health center with local database servers. Here, the example of the Treadmill machine is used,where the user selects a maximum exercise time (T) of 20 minutes. If the registered user in the local database is absent or terminates the session in between, then an Incomplete or Absent message gets accordingly stored in the database. The value of the basic parameters gets stored after the end of each session with the local database servers. Once the value of the basic parameters is stored, it is then sent to the Cloud data center using the appropriate XML Webservice. The Cloud datacenter is connected to clusters of local database servers located within the smart city. As soon as the these cloud data centers receive the information, the rules defined for the aggregation of information are applied and stored with the public and private clouds, accordingly. Finally, in the section of alert mechanism, the type of user U is recognized and an alert is sent whenever any of the values of the basic parameters exceeds the defined threshold level (τ) for that user.

figure e

Here, Algorithm 3 shows the implemented cloud security mechanism for a private cloud (Ξ) and public cloud (ϒ). Based on the user type U, the type of cloud and its security mechanism are selected. Private cloud service providers are free to implement any security algorithm like Rivest, Shamir, and Adleman (RSA), DNA, and Bcrypt, etc. Here we have implemented the asymmetric and public key based RSA algorithm. For public cloud, we have used the Advanced Encryption Standards (AES) algorithm for implementation which is a symmetric cipher and iterative algorithm.

figure f

5 Results and discussion

In this Section, the results obtained after implementing the proposed framework and the algorithms discussed for the various scenarios have been discussed. For simulations of the scenarios proposed MATLAB v7.10, 32-bit editionhas been used. A graphical user interface (GUI)has been written using JAVA, which incorporates the XML WebService for sending and receiving the information in a cloud centric environment from both the user and health care personnel. We have evaluated the proposed cloud centric system architecture and user activity framework for their adoption, prediction analysis of physical activities, efficiency, and security purposes.

5.1 Adoption

In the case of the adoption of the proposed framework, it was found that the web-based health care services providing the applications are inadequate to track the user’s health status on a regular basis. From a survey of the literature it was found that the current trend is more towards the use of Smartphone like devices to monitor the status of the user’s health. Once the monitoring application stores the information using the Smartphone, it then provides it for use by the web-based applications, and then seeking the advice of the health care personnel becomes a big challenge in itself. This also downgrades the performance of the overall system as well. The proposed Internet-of-Things based platform and cloud centric architecture provides both with faster communication of information and security. The users are no longer required to focus on their Smartphones for storage of the values of the defined basic parameters. The proposed architecture is intended to change the way of eHealth, as it focuses on the regular activities of the users in sustainable health centers. In Fig. 7, the overall response time for sending information from a cluster of local database servers to a Cloud data center has been presented. Simulated results show that the response time remains almost constant,which is less than 0.02 sec, with the increase in the number of users from 50 to 5000. It is because we have considered the simultaneous occupancy of 50 to 5000 users in sustainable health centres but In real-time it is difficult to predict that 5000 users will be involved simultaneously to perform physical activity on embedded sensors based equipments. Due to this reason, the authors have neglected the raise in response time and considered it as a constant. These results are preliminary and highlight the reduction of complexity over the traditional web-based systems.

Fig. 7
figure 7

No. of Users vs. response time

5.2 Predictive analysis of physical activities

The proposed framework presents the ease of interface to both the health care personnel and users. While performing a physical activity in a sustainable health center it represents no interface to the user except for identification, authentication and establishing the session with the local database server which is responsible for storing the values of the basic parameters as the user completes the session. We have performed the analysis on average data collected in real-time from 5 different nodes up-to duration of 30 days for time interval 20 minutes every day. To vary the considered data for experimental purpose requires more nodes and time so that the data could be collected in real-time. However, this will not affect the overall performance of proposed architecture as from collected data our main objective is to test the alert mechanism of proposed user activity framework. Figure 8 represents the values of the basic parameters stored after 20 minutes of each physical activity session by the users. Figure 8 shows the various scatter plots for the distance, calories burned, heart rate, and speed with respect to the age of the users. Health care personnel can thus define the daily maximum threshold value of these parameters for their users individually and further predictive analysis can be performed accordingly. Here, Fig. 8(a) represents the threshold value for distance >=4.5k m, Fig. 8(b) represents the threshold value for the calories burned >=340, Fig. 8(c) represents the threshold value for the heart rate >=170b p m, and Fig. 8(d) represents the threshold value for speed >=13k m/h r. While performing prediction analysis, the defined threshold values of these basic parameters are checked and if any of value exceeds the limit then an alert is sent to respective health care personnel to initiate the necessary action. Also, if a user misses the physical activity session for a whole day or terminates the session in between, then too a message ”INCOMPLETE/ABSENT” gets stored into the database.

Fig. 8
figure 8

Scatter analysis of users on treadmill (a) Distance (km.) vs. Age (Yrs.) (b) Calories burned (Kcal.) vs. Age (Yrs.) (c) Heart rate (bpm) vs. Age (Yrs.) (d) Speed (km) vs. Age (Yrs.)

5.3 Efficiency

The efficiency of the proposed framework is evaluated using the total communication time, and end-to-end delay.

  • Total communication time represents the total time taken for the storage of information from the local database server to the Cloud data center and further to the public or private clouds. This time can exceed if there is any alert sent from the public or private clouds to the health care personnel. Here, Eq. 2 shows the computation of the total transmission time where nrepresents the number of clusters, t is the time, and w the total offloading iterations, and x total number of alerts.

    $$ T_{Time} = \sum\limits_{i=1}^{n}\left( t(w)) + t(x))\right) $$
    (2)

    If there is no alert then the value of t(x)=0. Then Eq. 2 will become:

    $$ T_{Time} = \sum\limits_{i=1}^{n} (t(w)) $$
    (3)

    Figure 9 represents the total transmission time for both the public cloud and private cloud. Here, the value of T T i m e reaches up to 12 seconds for the public cloud and 7 seconds in case of the private cloud. The higher value of T T i m e for the public cloud shows that more users are connected with it, as the services are not payable to this cloud.

  • End-to-End Delay represents the information delay time between the nodes. This can be computed by subtracting the minimum time of communication from the total time of communication. Its minimum value shows the early arrival of information at the destination node.

    $$ T_{delay} = T_{Time} - T_{minimum} $$
    (4)
    $$ T_{minimum} = f(T_{Time}, minimum) $$
    (5)

    In the case of the end-to-end delay, as shown in Fig. 9 the value of T d e l a y is at its minimum for the public cloud and almost negligible in the case of the private cloud.

Fig. 9
figure 9

Efficiency of Cloud centric framework

5.4 Security analysis

Cloud centric computing places various security threats on the information to be communicated or stored. These threats could be related to privacy, integrity, trust, or authentication of information. These threats become more vulnerable to danger when a user is associated with the public clouds. Private cloud provides different type of security mechanism which can be implemented throughout the communication for individual user on the basis of ”Pay-per-use” model. In this section, two different algorithms RSA and AES have been implemented for private cloud and public cloud respectively. These algorithms have no issue of interoperability and can be easily implemented with embedded sensors equipped equipments. However, the algorithm like DES, DNA encryption etc. can also be considered for the same. Implementation of the AES provides confidentiality to information in the cloud environment. This algorithm implements the variable size of the key length with a fixed data clock length of 128 bit. From Fig. 10(a) it can be observed that the average encryption time taken for the data block varies with number of bits. It also increases if the mixed type of data is used that may include text and data. Figure 10(b) represents the average decryption time which is almost constant for the different numbers of bits of key lengths. Here, the execution time is measured in microseconds and depends on the length of selected text. The RSA algorithm provides several benefits over other existing algorithms, which isthe reason for the Private cloud service providers choosing to use it. TheRSA algorithm is an asymmetric and public key algorithm wherethe user’s confidential information consists of two prime numbers p and q. Here, the computation of the key depends upon the values of p and q and the value is represented by the product of p and q. For the experiments, we selected the values of p = 2 and q = 3, , and from Fig. 10(c) it can be observed that the average encryption time of the RSA increases with the increase in the text length. Figure 10(d) shows the time taken to decrypt the information which varies with the increase in the number of bits. Here, it is also observed that the RSA is more secure, which is the reason why it takes a little more time while encrypting or decrypting the information when compared with the AES, where the decryption time is almost constant.

Fig. 10
figure 10

Encryption and Decryption time vs. No. of bits (a) AES Encryption (b) AES Decryption (c) RSA Encryption (d) RSA Decryption

6 Conclusion and future work

At present, the health care sector is getting a boost with several advanced technologies like the Internet-of-Things and Cloud Computing which has enabled to perform prediction analysis in real time. Different varieties of advanced applications are being designed for Smartphone like devices to monitor the user activity and health status throughout the day. From our literature survey, this can be find that most of these applications have been found to suffer from the optimization issue and continuous proliferation of information which can be difficult to predict and store. The proposed IoT based cloud centric architecture simplifies several of these issues and stops the proliferation of information. This framework can be used by any age user group. For the proposed framework, we have evaluated on the basis of its adoption, predictive analysis of physical activities, efficiency, and security. There was also the understanding that to minimize the overall cost there should be a minimum time delay between the advice time and issue reported time. This can be observed from the results obtained for the end-to-end delay for the proposed framework. Predictive analysis of the physical activities represents the results collected in real time using the sensors for the various users on the treadmill for a 20-minutes time duration. These results also present the common threshold value for all the users,although the health care personnel can define it separately for the individual users. The results for the security analysis reveal the thorough encryption and decryption of information using the AES and RSA algorithms for the public and private clouds, respectively. Overall, the architecture presented and discussed is more robust and secure in nature, although a lot of work could still be done in the future for its improvement. We will consider the issue of load balancing and information distribution throughout the Cloud servers, implementation of more security algorithms like DNA encryption, XML DNA Encryption, Bcrypt etc., and extending the proposed framework to include more health parameters and activities.