.

Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems

LAUR Repository

Show simple item record

dc.contributor.author Haraty, Ramzi A.
dc.contributor.author Zbib, Mirna
dc.contributor.author Masud, Mehedi
dc.date.accessioned 2017-02-01T07:08:39Z
dc.date.available 2017-02-01T07:08:39Z
dc.date.copyright 2016 en_US
dc.identifier.issn 1936-6442 en_US
dc.identifier.uri http://hdl.handle.net/10725/5127
dc.description.abstract In a data sharing system in a cloud computing environment, such as health care system, peers or data sources execute transactions on-the-fly in response to user queries without any centralized control. In this case confidential data might be intercepted or read by hackers. We cannot consider any centralized control for securing data since we cannot assume any central third party security infrastructure (e.g., PKI) to protect confidential data in a data sharing system. Securing health information from malicious attacks has become a major concern. However, securing the data from attacks sometimes fail and attackers succeed in inserting malicious data. Hence, this presents a need for fast and efficient damage assessment and recovery algorithms. In this paper, we present an efficient data damage assessment and recovery algorithm to delete malicious transactions and recover affected transactions in a data source in a health care system based on the concept of the matrix. We compare our algorithm with other approaches and show the performance results. en_US
dc.language.iso en en_US
dc.title Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems en_US
dc.type Article en_US
dc.description.version Published en_US
dc.author.school SAS en_US
dc.author.idnumber 199729410 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.relation.journal Peer-to-Peer Networking and Applications en_US
dc.journal.volume 9 en_US
dc.journal.issue 5 en_US
dc.article.pages 812-823 en_US
dc.keywords Data security en_US
dc.keywords Data exchange en_US
dc.keywords Healthcare data protection en_US
dc.keywords Healthcare data tampering en_US
dc.identifier.doi http://dx.doi.org/10.1007/s12083-015-0361-z en_US
dc.identifier.ctation Haraty, R. A., Zbib, M., & Masud, M. (2016). Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems. Peer-to-Peer Networking and Applications, 9(5), 812-823. en_US
dc.author.email rharaty@lau.edu.lb en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url http://link.springer.com/article/10.1007/s12083-015-0361-z en_US
dc.orcid.id https://orcid.org/0000-0002-6978-3627
dc.author.affiliation Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account