Bridging IoT and Healthcare: Secure, Real-Time Data Exchange with Aerospike and Salesforce Marketing Cloud

Authors

  • Jiten Sardana Research Scholar
  • Mukesh Reddy Dhanagari

DOI:

https://doi.org/10.22399/ijcesen.3853

Keywords:

Aerospike, , Salesforce Marketing Cloud (SFMC), Healthcare IoT, Real‑time data processing, HIPAA compliance

Abstract

The architecture presented in this paper describes a secure and real‑time bridge between healthcare Internet of Things (IoT) telemetry and engagement by mapping Aerospike as the low-latency data plane and Salesforce Marketing Cloud (SFMC) as the consent-aware engagement plane. Heterogeneous streams, viz. wearables, implants, bedside monitors, pumps, and sensors, consume through BLE to gateways, which transit across MQTT/HTTPS with mutual TLS. Kafka has fans emitting extensions of events to streams of processors that unit-normalise, schema-validate, de-duplicate, and identify features. Aerospike maintains time Series and change-data capture and alert state using hybrid memory, TTLs, secondary indexes, optional strong consistency, and supports emission of immutable events that serve as change-data capture. SFMC is fed de-identified attributes; Journey Builder uses SMS, push, or email to trigger on threshold violations, missed doses, or offline devices respecting consent. HIPAA governance is enforced with interoperability through FHIR resources and OAuth APIs; tokenization, audit trails, and DevSecOps guardrails. Experiments support >300k events/s with median write 3 5 ms (p99 <20 ms), bedside read p99 <35 ms, and fast-path interaction ~6 7 s between abnormal signal and journey entry. AZ failures and gateway restarts provide bounded backpressure and automatic recovery; the addition of a policy‑decision point provides sub‑millisecond overhead. A fault‑tolerant, pragmatic blueprint decouples ingestion, analysis, and outreach to provide timely alerts and privacy preservation. The strategy demonstrates that Aerospike and SFMC can secure, cost-conscious, scalable real-time IoT communication supporting bedside applications, remote patient monitoring, and population initiatives

References

[1] Almagrabi, A. O., & Al-Otaibi, Y. D. (2020). A survey of context-aware messaging-addressing for sustainable internet of things (IoT). sustainability, 12(10), 4105.

[2] S. K. Gunda, "Machine Learning Approaches for Software Fault Diagnosis: Evaluating Decision Tree and KNN Models," 2024 Global Conference on Communications and Information Technologies (GCCIT), BANGALORE, India, 2024, pp. 1-5, https://doi.org/10.1109/GCCIT63234.2024.10861953

[3] Bock, M. (2023). Measuring adoption of phishing-resistant authentication methods on the web (Master's thesis).

[4] S. K. Gunda, "Fault Prediction Unveiled: Analyzing the Effectiveness of Random Forest, Logistic Regression, and KNeighbors," 2024 2nd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), Erode, India, 2024, pp. 107-113, https://doi.org/10.1109/ICSSAS64001.2024.10760620

[5] S. K. Gunda, "Analyzing Machine Learning Techniques for Software Defect Prediction: A Comprehensive Performance Comparison," 2024 Asian Conference on Intelligent Technologies (ACOIT), KOLAR, India, 2024, pp. 1-5, https://doi.org/10.1109/ACOIT62457.2024.10939610

[6] Chavan, A. (2024). Fault-tolerant event-driven systems: Techniques and best practices. Journal of Engineering and Applied Sciences Technology, 6, E167. http://doi.org/10.47363/JEAST/2024(6)E167

[7] Chavan, A., & Romanov, Y. (2023). Managing scalability and cost in microservices architecture: Balancing infinite scalability with financial constraints. Journal of Artificial Intelligence & Cloud Computing, 5, E102. https://doi.org/10.47363/JMHC/2023(5)E102

[8] S. K. Gunda, "Enhancing Software Fault Prediction with Machine Learning: A Comparative Study on the PC1 Dataset," 2024 Global Conference on Communications and Information Technologies (GCCIT), BANGALORE, India, 2024, pp. 1-4, https://doi.org/10.1109/GCCIT63234.2024.10862351

[9] Dhanagari, M. R. (2024). MongoDB and data consistency: Bridging the gap between performance and reliability. Journal of Computer Science and Technology Studies, 6(2), 183-198. https://doi.org/10.32996/jcsts.2024.6.2.21

[10] Dhanagari, M. R. (2024). Scaling with MongoDB: Solutions for handling big data in real-time. Journal of Computer Science and Technology Studies, 6(5), 246-264. https://doi.org/10.32996/jcsts.2024.6.5.20

[11] Fong, S. (2024). The Legal Implications of Data Retention for Law Enforcement Purposes in the European Union: Do we need a new Data Retention Framework? (Master's thesis, Universidade NOVA de Lisboa (Portugal)).

[12] Goel, G., & Bhramhabhatt, R. (2024). Dual sourcing strategies. International Journal of Science and Research Archive, 13(2), 2155. https://doi.org/10.30574/ijsra.2024.13.2.2155

[13] Goodwin, A. J. (2023). High Frequency Physiological Data Quality Modelling in the Intensive Care Unit (Doctoral dissertation).

[14] Heiskari, J. J. (2022). Computing paradigms for research: cloud vs. edge.

[15] Humbel, L. (2022). Modern hardware abstractions for firmware (Doctoral dissertation, ETH Zurich).

[16] Karwa, K. (2023). AI-powered career coaching: Evaluating feedback tools for design students. Indian Journal of Economics & Business. https://www.ashwinanokha.com/ijeb-v22-4-2023.php

[17] Karwa, K. (2024). The role of AI in enhancing career advising and professional development in design education: Exploring AI-driven tools and platforms that personalize career advice for students in industrial and product design. International Journal of Advanced Research in Engineering, Science, and Management. https://www.ijaresm.com/uploaded_files/document_file/Kushal_KarwadmKk.pdf

[18] Kirchhof, J. C., Malcher, L., & Rumpe, B. (2021, October). Understanding and improving model-driven IoT systems through accompanying digital twins. In Proceedings of the 20th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences (pp. 197-209).

[19] S. K. Gunda, "Comparative Analysis of Machine Learning Models for Software Defect Prediction," 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS), Chennai, India, 2024, pp. 1-6, https://doi.org/10.1109/ICPECTS62210.2024.10780167

[20] Lachkov, P., Tawalbeh, L. A., & Bhatt, S. (2022). Vulnerability assessment for applications security through penetration simulation and testing. Journal of Web Engineering, 21(7), 2187-2208.

[21] Lakshminarayana, S., Praseed, A., & Thilagam, P. S. (2024). Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects. IEEE Communications Surveys & Tutorials, 26(4), 2510-2546.

[22] Wyciślak, S. (2024). Real-time visibility as a catalyst for operational enhancements. Logforum, 20(2).

[23] Lasch, R. (2024). Heterogeneous memory technologies in database management systems (Doctoral dissertation, Dissertation, Ilmenau, TU Ilmenau, 2024).

[24] Le, K. T. (2023). Building a Blockchain-based API Access Control System (Doctoral dissertation, University of Saskatchewan).

[25] Malik, G., & Prashasti. (2023). Blockchain security: Security challenges and solutions for decentralized systems and cryptocurrencies. International Journal of Science and Research Archive, 9(2), 1074–1100. https://doi.org/10.30574/ijsra.2023.9.2.0515

[26] Nyati, S. (2018). Revolutionizing LTL carrier operations: A comprehensive analysis of an algorithm-driven pickup and delivery dispatching solution. International Journal of Science and Research (IJSR), 7(2), 1659-1666. Retrieved from https://www.ijsr.net/getabstract.php?paperid=SR24203183637

[27] S. K. Gunda, "A Deep Dive into Software Fault Prediction: Evaluating CNN and RNN Models," 2024 International Conference on Electronic Systems and Intelligent Computing (ICESIC), Chennai, India, 2024, pp. 224-228, https://doi.org/10.1109/ICESIC61777.2024.10846549

[28] S. K. Gunda, "Software Defect Prediction Using Advanced Ensemble Techniques: A Focus on Boosting and Voting Method," 2024 International Conference on Electronic Systems and Intelligent Computing (ICESIC), Chennai, India, 2024, pp. 157-161, https://doi.org/10.1109/ICESIC61777.2024.10846550

[29] Rhoads, J., & Smith, A. (2024). Effectiveness of Continuous Verification and Micro-Segmentation in Enhancing Cybersecurity through Zero Trust Architecture.

[30] Sardana, J. (2022). Scalable systems for healthcare communication: A design perspective. International Journal of Science and Research Archive. https://doi.org/10.30574/ijsra.2022.7.2.0253

[31] Sharma, S. (2024). Mastering IoT for Industrial Environments: Unlock the IoT Landscape for Industrial Environments with Industry 4.0, Covering Architecture, Protocols like MQTT, and Advancements with ESP-IDF. Orange Education Pvt Limited.

[32] Singh, V. (2022). Explainable AI in healthcare diagnostics: Making AI models more transparent to gain trust in medical decision-making processes. International Journal of Research in Information Technology and Computing, 4(2). https://romanpub.com/ijaetv4-2-2022.php

[33] Singh, V. (2023). Enhancing object detection with self-supervised learning: Improving object detection algorithms using unlabeled data through self-supervised techniques. International Journal of Advanced Engineering and Technology. https://romanpub.com/resources/Vol%205%20%2C%20No%201%20-%2023.pdf

[34] Strandquist, G. (2024). Where is the Person in Personalized Medicine? The Missing Expert in Adaptive Neurotechnology (Doctoral dissertation, University of Washington).

[35] Sultanum, N. B. (2022). Text-Centric Visual Approaches to Support Clinical Overview of Medical Text (Doctoral dissertation, University of Toronto (Canada)).

[36] Takyi, H. K. (2019). Security, privacy, confidentiality and integrity of emerging healthcare technologies: A framework for quality of life technologies to be HIPAA/HITECH compliant, with emphasis on health kiosk design (Doctoral dissertation, University of Pittsburgh).

[37] Vattikonda, B., Das, M., Bhardwaj, T., Panja, S., Arora, P., Gupta, A., & Aswal, D. K. (2020). Time and Frequency Metrology: Part II: Application of Indian Standard Time for Safe Digital India. In Metrology for Inclusive Growth of India (pp. 197-236). Singapore: Springer Singapore.

[38] S. K. Gunda, “Accelerating Scientific Discovery With Machine Learning and HPC-Based Simulations,” in Integrating Machine Learning Into HPC-Based Simulations and Analytics, B. Ben Youssef and M. Ben Ismail, Eds. Hershey, PA, USA: IGI Global, 2025, pp. 229–252, doi: 10.4018/978-1-6684-3795-7.ch009

[39] Volminger, A. (2021). A comparison of Data Stores for the Online Feature Store Component: A comparison between NDB and Aerospike.

[40] Wyciślak, S. (2024). Real-time visibility as a catalyst for operational enhancements. Logforum, 20(2).

Downloads

Published

2025-09-16

How to Cite

Sardana, J., & Mukesh Reddy Dhanagari. (2025). Bridging IoT and Healthcare: Secure, Real-Time Data Exchange with Aerospike and Salesforce Marketing Cloud. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.3853

Issue

Section

Research Article