Research Article |
A Novel Algorithm to Secure Data in New Generation Health Care System from Cyber Attacks Using IoT
Author(s) : Addanki Kavitha1, B Srinivasa Rao2, Dr Nikhat Akhtar3, Dr Shaik Mohammad Rafi4, Prabhdeep Singh5, Dr Sunanda Das6 and Dr G Manikandan7
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 10, Issue 2, Special Issue on IIoT-WSN
Publisher : FOREX Publication
Published : 22 June 2022
e-ISSN : 2347-470X
Page(s) : 270-275
Abstract
The rise of digital technology has essentially enhanced the overall communication and data management system, facilitating essential medical care services. Considering this aspect, the healthcare system successfully managed patient requirements through online services and facilitated patient experience. However, the lack of adequate data security and increased digital activities during Covid-19 made the healthcare system a soft target for hackers to gain unauthorized access and steal crucial and sensitive information. Countries such as the UK and the US recently received such challenges, highlighting the need for effective data maintenance. IoT emerged as one of the critical solutions for data management systems in terms of addressing data security which certainly can enhance overall data collection, storage, maintenance, prediction of potential data security breaches and taking appropriate measurements. The concerned research considers a secondary data collection process where necessary data is collected from original scholarly articles, books and journals. Apart from that, a positivism research philosophy, a deductive research approach and a descriptive research design have been considered for this study. Qualitative data analysis techniques have also been incorporated into this research. Upon viewing the pros and cons of IoT algorithms, DES, AES, triple data encryption standards, and RSA encryption can be used in the healthcare system to facilitate data protection.
Keywords: IoT algorithms
, data protection
, data security
, healthcare system
, data management
, cyberattacks
Addanki Kavitha, Assistant Professor, Department of Computer Science Engineering, P B Siddhartha College of Arts and Science, Vijayawada, Andhra Pradesh, India; Email: dkavithamuller@gmail.com
B Srinivasa Rao, Professor, Department of Computer Science Engineering, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India; Email: bsrgriet2015@gmail.com
Dr Nikhat Akhtar, Associate Professor, Department of Computer Science & Engineering, Ambalika Institute of Management and Technology (AIMT), Lucknow, UP, India; Email: dr.nikhatakhtar@gmail.com
Dr Shaik Mohammad Rafi, Professor, Artificial intelligence and information technology, Sri Mittapalli engineering College, India; Email: mdrafi.527@gmail.com
Prabhdeep Singh, Assistant Professor, Department of Computer Science & Engineering, Graphic Era Deemed to be University,Dehradun, Uttarakhand, India; Email: prabhdeepsingh.cse@geu.ac.in
Dr Sunanda Das, Associate Professor, Jain University, Kanakpura Road, Bangalore, India; Email: das.sunanda2012@gmail.com
Dr G Manikandan, Assistant Professor, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai, India; Email: mrg.manikandan@gmail.com
[1] Muthuppalaniappan, M. and Stevenson, K., (2021). Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health. International Journal for Quality in Health Care, 33(1), p.mzaa117.[Cross Ref]
[2] Pranggono, B. and Arabo, A., (2021). COVID‐19 pandemic cybersecurity issues. Internet Technology Letters, 4(2), p.e247.[Cross Ref]
[3] He, Y., Aliyu, A., Evans, M. and Luo, C., (2021). Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. Journal of medical Internet research, 23(4), p.e21747.[Cross Ref]
[4] Jalali, M.S., Landman, A. and Gordon, W.J., (2021). Telemedicine, privacy, and information security in the age of COVID-19. Journal of the American Medical Informatics Association, 28(3), pp.671-672.[Cross Ref]
[5] Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C. and Bellekens, X., 2021. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, p.102248.[Cross Ref]
[6] Hijji, M. and Alam, G., (2021). A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: Challenges and prospective solutions. Ieee Access, 9, pp.7152-7169.[Cross Ref]
[7] Chigada, J. and Madzinga, R., (2021). Cyberattacks and threats during COVID-19: A systematic literature review. South African Journal of Information Management, 23(1), pp.1-11.[Cross Ref]
[8] Nallainathan, S., (2021). Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic. International Journal of Science and Research (IJSR), 10(4).[Cross Ref]
[9] Doyle, L., McCabe, C., Keogh, B., Brady, A. and McCann, M., (2020). An overview of the qualitative descriptive design within nursing research. Journal of Research in Nursing, 25(5), pp.443-455.[Cross Ref]
[10] Park, Y.S., Konge, L. and Artino, A.R., (2020). The positivism paradigm of research. Academic Medicine, 95(5), pp.690-694.[Cross Ref]
[11] Khan, N.A., Brohi, S.N. and Zaman, N., (2020). Ten deadly cyber security threats amid COVID-19 pandemic.[Cross Ref]
[12] Abdulghani, H.A., Nijdam, N.A., Collen, A. and Konstantas, D., (2019). A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective. Symmetry, 11(6), p.774.[Cross Ref]
[13] Lachner, C. and Dustdar, S., (2019), June. A performance evaluation of data protection mechanisms for resource constrained iot devices. In 2019 IEEE International Conference on Fog Computing (ICFC) (pp. 47-52). IEEE.[Cross Ref]
[14] Kuzminykh, I., Carlsson, A., Yevdokymenko, M. and Sokolov, V., (2019). Investigation of the IoT device lifetime with secure data transmission. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems (pp. 16-27). Springer, Cham.[Cross Ref]
[15] Richards, K.A.R. and Hemphill, M.A., (2018). A practical guide to collaborative qualitative data analysis. Journal of Teaching in Physical Education, 37(2), pp.225-231.[Cross Ref]
[16] Woiceshyn, J. and Daellenbach, U., (2018). Evaluating inductive vs deductive research in management studies: Implications for authors, editors, and reviewers. Qualitative Research in Organizations and Management: An International Journal.[Cross Ref]
[17] Marjani, M., Nasaruddin, F., Gani, A., Karim, A., Hashem, I.A.T., Siddiqa, A. and Yaqoob, I., (2017). Big IoT data analytics: architecture, opportunities, and open research challenges. ieee access, 5, pp.5247-5261.[Cross Ref]
[18] Torre, I., Koceva, F., Sanchez, O.R. and Adorni, G., (2016), December. A framework for personal data protection in the IoT. In 2016 11th international conference for internet technology and secured transactions (ICITST) (pp. 384-391). IEEE.[Cross Ref]
Addanki Kavitha, B Srinivasa Rao, Dr Nikhat Akhtar, Dr Shaik Mohammad Rafi, Prabhdeep Singh, Dr Sunanda Das and Dr G Manikandan (2022), A Novel Algorithm to Secure Data in New Generation Health Care System from Cyber Attacks Using IoT. IJEER 10(2), 270-275. DOI: 10.37391/IJEER.100236.