Algorithm to Data in New Generation A Novel Algorithm to Secure Data in New Generation Health Care System from Cyber Attacks Using IoT

A Novel Secure ░ ABSTRACT- The rise of digital technology has essentially enhanced the overall communication and data management system, facilitating essential medical care services. Considering this aspect, the healthcare system successfully managed patient requirements through online services and facilitated patient experience. However, the lack of adequate data security and increased digital activities during Covid-19 made the healthcare system a soft target for hackers to gain unauthorized access and steal crucial and sensitive information. Countries such as the UK and the US recently received such challenges, highlighting the need for effective data maintenance. IoT emerged as one of the critical solutions for data management systems in terms of addressing data security which certainly can enhance overall data collection, storage, maintenance, prediction of potential data security breaches and taking appropriate measurements. The concerned research considers a secondary data collection process where necessary data is collected from original scholarly articles, books and journals. Apart from that, a positivism research philosophy, a deductive research approach and a descriptive research design have been considered for this study. Qualitative data analysis techniques have also been incorporated into this research. Upon viewing the pros and cons of IoT algorithms, DES, AES, triple data encryption standards, and RSA encryption can be used in the healthcare system to facilitate data protection.

lockdown's adoption and the introduction of the virus, the world has begun to shift toward digital functioning, which includes healthcare services. Telemedicine and virtual therapy have developed as a new trend in the healthcare system, making the sector a potential target for cybercriminals and hackers. A spate of cyberattacks against national healthcare systems has been reported in several countries, including the United States, the United Kingdom, the Czech Republic, and others. Upon considering the prevalence of cyberattacks, the need for effective data security maintenance emerged as one of the key trends within the healthcare system [3]. IoT appears to be one of the critical solutions to mitigate data protection and security challenges across different sectors. Specifically, for e-health devices, IoT emerged as a powerful application that certainly enhances eventual data security. IoT consists of sensors that collect data that is useful for consumers. Upon considering this factor, IoT is also used to protect data from potential cyber threats by utilising its full potential in addressing data security loopholes within the system. IoT sensors are mainly used to identify these loopholes and enhance data security within any sector [4].
"The Data Encryption Standard (DES)" appears to be one of the significant algorithms of IoT that essentially prevents potential data breaches within a system. It is a symmetric-key algorithm to ensure the encryption of digital data. On the other hand, data encryption is considered one of the effective ways to prevent potential data breaches and secure all types of data storage within a system. DES can avert possible attacks on the digital databases and ensure the data storage process upon viewing this factor. In addition, "Advanced Encryption Standard (AES)" is also considered an effective IoT algorithm that is used by several sectors to prevent potential data breaches through cyber-attacks [5]. On the other hand, "Triple Data Encryption Standard", "Twofish Encryption Algorithm", and "RSA Encryption" emerged as the necessary IoT algorithms used by several sectors across the world in terms of preventing data breaches and protecting data security.

░ 2. LITERATURE REVIEW
Over the years, with technology dependence increased, threats from cyberattacks emerged as a significant challenge that certainly hampers the level of data security for the users. Moreover, Covid-19 emergence has further highlighted this challenge due to poor data security maintenance and increased cyberattacks. "Malware", "Phishing", "SQL injections", "Man-in-the-Middle (MIM) attacks", "Denial-of-Service (DOS) attacks", and "Password attacks" emerged as the most common yet effective cyberattacks that certainly cause compromised data security within a system [6]. On the other hand, ransomware attacks and DOS attacks appear to be significant cyberattacks witnessed by the healthcare system. These particular attacks directly hamper data security by hacking digital data sources. Apart from that, phishing and password attacks emerged as other relevant and significant attacks that compromise data sources within the healthcare system due to its lack of adequate protection. Several countries, such as the US and the UK, have witnessed significant challenges related to data protection and data security violations within the healthcare system during Covid-19. Significant challenges such as database hacks, unauthorized access to sensitive patient data, and the stealing of Covid-19 research-related data have been observed in the world's healthcare system [7]. Countries such as the US and UK mostly witnessed malware, ransomware, phishing and password attacks in healthcare during Covid-19. The main aim of those cyberattacks was to gain access to central databases and steal information related to vaccination, Covid-19 research progress and sensitive patient data [8]. This highlights the significant challenges the concerned sector faces and the significance of data protection within the healthcare sector. On the other hand, facilities such as telemedicine and virtual treatment using digital platforms undoubtedly contributed to the increased cyberattacks across the world during the Covid-19 pandemic. The need for adequate data protection and utilization of active technologies appears relevant in the current time. IoT is considered one of the most effective solution to data security challenges and ensures appropriate data collection. In-built sensors in IoT help effective data collection, which is further enhanced by the different algorithms to improve data security management [9]. The advanced encryption standard is considered as one of the most compelling IoT algorithms that essentially addresses data security challenges by ensuring early prediction of potential cyberattacks. AES uses keys of 192 and 256 bits for heavy-duty encryption, effectively secures data access and protects the network from possible collapse due to unauthorized access of malware. On the other hand, RSA encryption is an IoT algorithm used by modern computers to decrypt and encrypt messages [10]. It appears to be one of the significant alternatives healthcare systems can use to prevent significant data breaches and potential cyberattacks. It is public-key as "public-key cryptography" because it gives one key to the public and keeps one critical private.

░ 3. METHODOLOGY
The search is based on secondary data to present comprehensive findings and enhance effective research outcomes. The main reason behind secondary data collection is its ability to quickly collect a wide range of data. Upon considering this aspect, the concerned research has collected necessary data on the type of cyberattacks faced by healthcare during Covid-19. On the other hand, positivism research philosophy integrates conducting scientific study and reaching effective outcomes. Considering this aspect, effective integration of the concerned research philosophy was integral in producing an objective-driven effect [11]. Identifying possible data patterns and trends is a significant advantage of positivism research philosophy. Applying this particular aspect, the concerned research ensured identifying necessary trends regarding cyberattacks in the healthcare system during Covid-19. In addition, a deductive research approach has also been undertaken in this research to conduct a logical analysis and enhance data generalization. This particular aspect has helped the concerned research incorporate efficient principles of providing a clear idea of concepts and variables, which happen to be one of the critical benefits of the deductive approach [12]. Moreover, the appropriate application of the reasoned approach also helped the concerned research with time-saving and produced an on-point discussion. Upon considering this particular aspect, the practical application of the reasoned research approach has allowed this study to outline concepts and variables and conduct thorough research on them.
A descriptive research design has been implemented to provide a systematic description of the phenomena and explain the experience during the study in the form of practical data analysis [13]. Moreover, the ability to conduct an in-depth analysis regarding the role of IoT algorithms in preventing cyberattacks appears to be another significant advantage provided by this particular research design. Secondary data for this research has been collected from authentic online sources. Major databases such as "Google Scholar" and "ProQuest" have been accessed to collect relevant scholarly journals for this research. In addition, online journals and websites have also been accessed to gather adequate information for the concerned study. The qualitative data analysis method has been used in this research to produce quality insights on the research topic. One of the significant advantages of the concerned data analysis technique is its ability to work as a content generator, facilitating the research outcome [14]. The concerned research presents data analysis and findings together using this particular data analysis method.

░ 4. ANALYSIS AND INTERPRETATION
The need for adequate data protection became more relevant during the Covid-19 outbreak due to the massive amount of cyberattacks across health institutions in the world. It has been observed that the lack of appropriate data protection systems and increased digital access essentially encouraged cyber attackers to launch online attacks on healthcare institutions [15]. Several countries such as the UK, the US, and the Czech Republic have witnessed such attacks and stealing of sensitive medical information. Patient data, Covid-19 vaccination data and research progress emerged as the essential data to be stolen by the hackers during the pandemic. Frequent attempts of data stealing and lack of adequate security emerged as the major concerns for the healthcare system during this time [16].
It is further believed that increased online medical activities such as telemedicine and digital treatment have certainly been the hackers' main targets in accessing sensitive medical information. Considering the contemporary healthcare system challenges, IoT algorithms appear to be one of the critical solutions to enhance data security within the healthcare system. The practical application of different IoT algorithms facilitates data security in the healthcare system differently. Primarily IoT is used for effective data collection, which enhances data analysis and predicts the potential trends in the healthcare sector [16]. IoT sensors play an influential role in data collection. However, this particular feature can further be utilized while predicting possible cyberattacks on the system. To ensure effective prediction regarding potential security threats, IoT algorithms are used to enhance tracking of the website health institutions are accessing along with the extent it is allowing access to external and dubious sources. IoT algorithms effectively predict potential data breach chances within the healthcare system and its probable solutions upon considering these data. On the other hand, DES, AES, triple data encryption standards, RSA encryption and Twofish encryption algorithms appear to be powerful IoT algorithms used for data protection within the healthcare system. Effective implementation of the IoT algorithm further ensures that digital data is secured with end-to-end encryption, which can certainly be a probable solution to the identified data security challenges [17]. Upon considering this factor, the healthcare system can essentially implement DES and RSA encryption to enhance its data security, which can facilitate the eventual outcome of data management within the healthcare system. This can also ensure sensitive data security within the concerned sector and boost overall data protection by predicting and preventing potential data breaches. The AES algorithm is a symmetric block cypher that encrypts and decrypts the information, enhancing data security. It significantly converts data to an unintelligible form called "ciphertext". This also can be solved if needed. Upon considering this aspect, the precise role of IoT algorithms in enhancing data security within the healthcare system can be seen.

░ 5. DISCUSSION AND FINDINGS
Over the years, digital data emerged as one of the major trends identified in healthcare in terms of maintaining solid databases and facilitating operations. Considering this aspect, effective data management emerged as the ultimate key to success for all industries worldwide. The emergence of Covid-19 has further increased the chances of utilizing digital platforms to ensure effective data management and communication with patients, doctors and other medical staff. Telemedicine and digital treatment appear to be key trends during the pandemic, which helped millions of people [18]. However, increased online activities emerged as critical reasons behind active cyberattack incidents within countries such as the US and UK. Healthcare emerged as the soft target for cyber attackers to conduct massive online attacks and gain access to sensitive information. Data related to confidential patient details, Covid-19 research progress and details about vaccination availability emerged as necessary targets for healthcare, which certainly created a collective threat for the health system in terms of securing sensitive medical information from hackers [18]. Further observed ransomware, malware attacks, password attacks, phishing and DOS emerged as the most common yet effective cyberattacks faced by the healthcare system, which essentially hampered healthcare data management. On the other hand, IoT algorithms emerged as an effective solution for the overall data management process in the healthcare system. Effective integration of IoT usually helps with appropriate data collection, which certainly considers data related to business trends, stakeholder expectations and essential market trends through IoT sensors [18]. The same can be used for effective data security purposes in predicting the potential cyberattacks and alerting the system about them. This, in turn, effectively can help the entire healthcare system to take appropriate measures to prevent potential cyberattacks in the healthcare system. Upon considering the pros and cons of the IoT algorithms DES, AES, triple data encryption standards, and RSA encryption emerged as the powerful IoT algorithms to enhance data security within the healthcare system. On the other hand, the appropriate application of necessary IoT algorithms can undoubtedly create a robust encryption system that is considered the eventual goal of maintaining adequate data privacy. By considering the same purpose, Naïve Bayes Classifier based algorithm has been used in this research study through which the conditional probability can be calculated. The main advantages of such algorithm is that it is intractable due to which the intrusion in the computer can be detected easily.
Hence, more security can be provided. In addition to this, bayes theorem also provides the principled ways for calculating the probability with conditions. The simple form of the calculations for Bayes theorem is Simplified or Naïve Bayes P(yi | x1, x2, …, xn) = P(x1, x2, …, xn | yi) * P(yi) In the next stages the conditional probability of the all the variables effectively changed into separate conditional probabilities. These independent conditional variables are also then multiplied together. P(yi | x1, x2, …, xn) = P(x1|yi) * P(x2|yi) * … P(xn|yi) * P(yi) In this research study a small example on a machine learning dataset has been derived below.
Hence, the input output elements of the first five example is healthcare system can use to facilitate data protection. Experts say AES might take several years to be broken by the hackers, mainly highlighting its effectiveness within the healthcare system. In addition, AES lasts longer than the IoT algorithms, making it a suitable fit in the healthcare system. RSA and AES, both IoT algorithms, are considered equally effective in protecting data and ensuring appropriate security in database systems. Upon viewing this aspect, the healthcare system can essentially use any of these algorithms to facilitate data protection and security enhancement.

░ 6. CONCLUSION
With time and the rise of digital technologies, the need for effective data collection, storage and management emerged as crucial aspects for industries worldwide. Effective integration of digital technology during the Covid-19 pandemic helped numerous people avail of health facilities through telemedicine and digital treatment. However, this appears to be one of the critical reasons behind increased cyberattack challenges within the healthcare system. Considering this aspect, the need for the effective integration of IoT algorithms can be identified. IoT algorithms such as DES, AES, triple data encryption standards and RSA encryption can essentially enhance the data protection of the healthcare system at present.