IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v13y2021i4p90-d527348.html
   My bibliography  Save this article

A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems

Author

Listed:
  • Sanaa Kaddoura

    (College of Technological Innovation, Zayed University, Abu Dhabi 144534, United Arab Emirates)

  • Ramzi A. Haraty

    (Department of Computer Science and Mathematics, Lebanese American University, Beirut 1102 2801, Lebanon)

  • Karam Al Kontar

    (Department of Computer Science and Mathematics, Lebanese American University, Beirut 1102 2801, Lebanon)

  • Omar Alfandi

    (College of Technological Innovation, Zayed University, Abu Dhabi 144534, United Arab Emirates)

Abstract

In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft and cybercrime. This paper presents an approach for database damage assessment for healthcare systems. Inspired by the current behavior of COVID-19 infections, our approach views the damage assessment problem the same way. The malicious transactions will be viewed as if they are COVID-19 viruses, taken from infection onward. The challenge of this research is to discover the infected transactions in a minimal time. The proposed parallel algorithm is based on the transaction dependency paradigm, with a time complexity O((M+NQ+N^3)/L) (M = total number of transactions under scrutiny, N = number of malicious and affected transactions in the testing list, Q = time for dependency check, and L = number of threads used). The memory complexity of the algorithm is O(N+KL) (N = number of malicious and affected transactions, K = number of transactions in one area handled by one thread, and L = number of threads). Since the damage assessment time is directly proportional to the denial-of-service time, the proposed algorithm provides a minimized execution time. Our algorithm is a novel approach that outperforms other existing algorithms in this domain in terms of both time and memory, working up to four times faster in terms of time and with 120,000 fewer bytes in terms of memory.

Suggested Citation

  • Sanaa Kaddoura & Ramzi A. Haraty & Karam Al Kontar & Omar Alfandi, 2021. "A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems," Future Internet, MDPI, vol. 13(4), pages 1-18, March.
  • Handle: RePEc:gam:jftint:v:13:y:2021:i:4:p:90-:d:527348
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/13/4/90/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/13/4/90/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Ramzi Ahmed Haraty & Sanaa Kaddoura & Ahmed Zekri, 2017. "Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix," International Journal on Semantic Web and Information Systems (IJSWIS), IGI Global, vol. 13(2), pages 74-86, April.
    2. Dimitrios Papamartzivanos & Sofia Anna Menesidou & Panagiotis Gouvas & Thanassis Giannetsos, 2021. "A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly," Future Internet, MDPI, vol. 13(2), pages 1-34, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Alessandro Midolo & Emiliano Tramontana, 2023. "An Automatic Transformer from Sequential to Parallel Java Code," Future Internet, MDPI, vol. 15(9), pages 1-19, September.
    2. Sanaa Kaddoura, 2022. "Evaluation of Machine Learning Algorithm on Drinking Water Quality for Better Sustainability," Sustainability, MDPI, vol. 14(18), pages 1-18, September.
    3. Namhla Mtukushe & Adeniyi K. Onaolapo & Anuoluwapo Aluko & David G. Dorrell, 2023. "Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems," Energies, MDPI, vol. 16(13), pages 1-25, July.
    4. Kumari, Pooja & Shankar, Amit & Behl, Abhishek & Pereira, Vijay & Yahiaoui, Dorra & Laker, Benjamin & Gupta, Brij B. & Arya, Varsha, 2024. "Investigating the barriers towards adoption and implementation of open innovation in healthcare," Technological Forecasting and Social Change, Elsevier, vol. 200(C).
    5. Anupama Mishra & Neena Gupta & Brij B. Gupta, 2023. "Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 82(2), pages 229-244, February.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sanaa Kaddoura, 2022. "Evaluation of Machine Learning Algorithm on Drinking Water Quality for Better Sustainability," Sustainability, MDPI, vol. 14(18), pages 1-18, September.
    2. Weizhi Meng & Thanassis Giannetsos & Christian D. Jensen, 2022. "Information and Future Internet Security, Trust and Privacy," Future Internet, MDPI, vol. 14(12), pages 1-2, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:13:y:2021:i:4:p:90-:d:527348. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.