Abstract

In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft and cybercrime. This paper presents an approach for database damage assessment for healthcare systems. Inspired by the current behavior of COVID-19 infections, our approach views the damage assessment problem the same way. The malicious transactions will be viewed as if they are COVID-19 viruses, taken from infection onward. The challenge of this research is to discover the infected transactions in a minimal time. The proposed parallel algorithm is based on the transaction dependency paradigm, with a time complexity O((M+NQ+N^3)/L) (M = total number of transactions under scrutiny, N = number of malicious and affected transactions in the testing list, Q = time for dependency check, and L = number of threads used). The memory complexity of the algorithm is O(N+KL) (N = number of malicious and affected transactions, K = number of transactions in one area handled by one thread, and L = number of threads). Since the damage assessment time is directly proportional to the denial-of-service time, the proposed algorithm provides a minimized execution time. Our algorithm is a novel approach that outperforms other existing algorithms in this domain in terms of both time and memory, working up to four times faster in terms of time and with 120,000 fewer bytes in terms of memory.

Highlights

  • Most of the applications of information systems, especially healthcare systems, are based on online databases that contain huge amounts of data

  • The number of affected transactions tended to decrease as the malicious transaction ID increased and got closer to the last recorded transaction

  • That the number rose at malicious transaction ID 200, since many of the rows inserted later referenced the row inserted by this transaction

Read more

Summary

Introduction

Most of the applications of information systems, especially healthcare systems, are based on online databases that contain huge amounts of data The security of such databases is essential to ensure an information system that follows the CIA security model: confidentiality, integrity, and availability [1]. Cryptographic hash functions are widely used in information security in many areas, like digital signatures and authentication, cybersecurity for risk management, and healthcare systems security [3,4,5,6]. A framework for remote patient monitoring allowing multiple users from one device is presented in [5] Another automated method for assessing the impact of privacy and security is presented in [6], based on interdependency graph models and data processing flows

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call