FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

A Novel Algorithm to Secure Data in New Generation Health Care System from Cyber Attacks Using IoT

Author(s) : Addanki Kavitha1, B Srinivasa Rao2, Dr Nikhat Akhtar3, Dr Shaik Mohammad Rafi4, Prabhdeep Singh5, Dr Sunanda Das6 and Dr G Manikandan7

Publisher : FOREX Publication

Published : 22 June 2022

e-ISSN : 2347-470X

Page(s) : 270-275




Addanki Kavitha, Assistant Professor, Department of Computer Science Engineering, P B Siddhartha College of Arts and Science, Vijayawada, Andhra Pradesh, India; Email: dkavithamuller@gmail.com

B Srinivasa Rao, Professor, Department of Computer Science Engineering, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India; Email: bsrgriet2015@gmail.com

Dr Nikhat Akhtar, Associate Professor, Department of Computer Science & Engineering, Ambalika Institute of Management and Technology (AIMT), Lucknow, UP, India; Email: dr.nikhatakhtar@gmail.com

Dr Shaik Mohammad Rafi, Professor, Artificial intelligence and information technology, Sri Mittapalli engineering College, India; Email: mdrafi.527@gmail.com

Prabhdeep Singh, Assistant Professor, Department of Computer Science & Engineering, Graphic Era Deemed to be University,Dehradun, Uttarakhand, India; Email: prabhdeepsingh.cse@geu.ac.in

Dr Sunanda Das, Associate Professor, Jain University, Kanakpura Road, Bangalore, India; Email: das.sunanda2012@gmail.com

Dr G Manikandan, Assistant Professor, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai, India; Email: mrg.manikandan@gmail.com

[1] Muthuppalaniappan, M. and Stevenson, K., (2021). Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health. International Journal for Quality in Health Care, 33(1), p.mzaa117.[Cross Ref]

[2] Pranggono, B. and Arabo, A., (2021). COVID‐19 pandemic cybersecurity issues. Internet Technology Letters, 4(2), p.e247.[Cross Ref]

[3] He, Y., Aliyu, A., Evans, M. and Luo, C., (2021). Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. Journal of medical Internet research, 23(4), p.e21747.[Cross Ref]

[4] Jalali, M.S., Landman, A. and Gordon, W.J., (2021). Telemedicine, privacy, and information security in the age of COVID-19. Journal of the American Medical Informatics Association, 28(3), pp.671-672.[Cross Ref]

[5] Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C. and Bellekens, X., 2021. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, p.102248.[Cross Ref]

[6] Hijji, M. and Alam, G., (2021). A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: Challenges and prospective solutions. Ieee Access, 9, pp.7152-7169.[Cross Ref]

[7] Chigada, J. and Madzinga, R., (2021). Cyberattacks and threats during COVID-19: A systematic literature review. South African Journal of Information Management, 23(1), pp.1-11.[Cross Ref]

[8] Nallainathan, S., (2021). Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic. International Journal of Science and Research (IJSR), 10(4).[Cross Ref]

[9] Doyle, L., McCabe, C., Keogh, B., Brady, A. and McCann, M., (2020). An overview of the qualitative descriptive design within nursing research. Journal of Research in Nursing, 25(5), pp.443-455.[Cross Ref]

[10] Park, Y.S., Konge, L. and Artino, A.R., (2020). The positivism paradigm of research. Academic Medicine, 95(5), pp.690-694.[Cross Ref]

[11] Khan, N.A., Brohi, S.N. and Zaman, N., (2020). Ten deadly cyber security threats amid COVID-19 pandemic.[Cross Ref]

[12] Abdulghani, H.A., Nijdam, N.A., Collen, A. and Konstantas, D., (2019). A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective. Symmetry, 11(6), p.774.[Cross Ref]

[13] Lachner, C. and Dustdar, S., (2019), June. A performance evaluation of data protection mechanisms for resource constrained iot devices. In 2019 IEEE International Conference on Fog Computing (ICFC) (pp. 47-52). IEEE.[Cross Ref]

[14] Kuzminykh, I., Carlsson, A., Yevdokymenko, M. and Sokolov, V., (2019). Investigation of the IoT device lifetime with secure data transmission. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems (pp. 16-27). Springer, Cham.[Cross Ref]

[15] Richards, K.A.R. and Hemphill, M.A., (2018). A practical guide to collaborative qualitative data analysis. Journal of Teaching in Physical Education, 37(2), pp.225-231.[Cross Ref]

[16] Woiceshyn, J. and Daellenbach, U., (2018). Evaluating inductive vs deductive research in management studies: Implications for authors, editors, and reviewers. Qualitative Research in Organizations and Management: An International Journal.[Cross Ref]

[17] Marjani, M., Nasaruddin, F., Gani, A., Karim, A., Hashem, I.A.T., Siddiqa, A. and Yaqoob, I., (2017). Big IoT data analytics: architecture, opportunities, and open research challenges. ieee access, 5, pp.5247-5261.[Cross Ref]

[18] Torre, I., Koceva, F., Sanchez, O.R. and Adorni, G., (2016), December. A framework for personal data protection in the IoT. In 2016 11th international conference for internet technology and secured transactions (ICITST) (pp. 384-391). IEEE.[Cross Ref]

Addanki Kavitha, B Srinivasa Rao, Dr Nikhat Akhtar, Dr Shaik Mohammad Rafi, Prabhdeep Singh, Dr Sunanda Das and Dr G Manikandan (2022), A Novel Algorithm to Secure Data in New Generation Health Care System from Cyber Attacks Using IoT. IJEER 10(2), 270-275. DOI: 10.37391/IJEER.100236.