Recovery of business intelligence systems

LAUR Repository

Show simple item record

dc.contributor.author Haraty, Ramzi A.
dc.contributor.author Kaddoura, Sanaa
dc.contributor.author Zekri, Ahmed Sherif
dc.date.accessioned 2018-01-23T12:50:06Z
dc.date.available 2018-01-23T12:50:06Z
dc.date.copyright 2018 en_US
dc.date.issued 2018-01-23
dc.identifier.issn 0736-5853 en_US
dc.identifier.uri http://hdl.handle.net/10725/6938
dc.description.abstract With the intensive use of the internet, patient centric healthcare systems shifted away from paper-based records towards a computerized format. Electronic patient centric healthcare databases contain information about patients that should be kept available for further reference. Healthcare databases contain potential data that makes them a goal for attackers. Hacking into these systems and publishing their contents online exposes them to a challenge that affects their continuity. Any denial of this service will not be tolerated since we cannot know when we need to retrieve a patient’s record. Denial of service affects the continuity of the healthcare system which in turn threatens patients’ lives, decreases the efficiency of the healthcare system and increases the operating costs of the attacked healthcare organization. Although there are many defensive security methods that have been devised, nonetheless malicious transactions may find a way to penetrate the secured safeguard and then modify critical data of healthcare databases. When a malicious transaction modifies a patient record in a database, the damage may spread to other records through valid transactions. Therefore, recovery techniques are required. The efficiency of the data recovery algorithm is substantial for e-healthcare systems. A patient cannot wait too long for his/her medical history to be recovered so that the correct medication be prescribed. Nevertheless, in order to have fast data recovery, an efficient damage assessment process should precede the recovery stage. The damage assessment must be performed as the intrusion detection system detects the malicious activity. The execution time of the recovery process is a crucial factor for measuring the performance because it is directly proportional to the denial of service time of any healthcare system. This paper presents a high performance damage assessment and recovery algorithm for e-healthcare systems. The algorithm provides fast damage assessment after an attack by a malicious transaction to keep the availability of the e-healthcare database. Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. It is about six times faster than the most recent proposed algorithm. In the worst case, the proposed algorithm takes 8.81 ms to discover the damaged part of the database; however, the fastest recent algorithm requires 50.91 ms. In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. This is a significant reduction of execution time compared with other available approaches. Saving the damage assessment time means shorter denial of service periods, which in turn guarantees the continuity of the patient centric healthcare system. en_US
dc.language.iso en en_US
dc.title Recovery of business intelligence systems en_US
dc.type Article en_US
dc.description.version Published en_US
dc.title.subtitle towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach en_US
dc.author.school SAS en_US
dc.author.idnumber 199729410 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.relation.journal Telematics and Informatics en_US
dc.journal.volume 35 en_US
dc.journal.issue 4 en_US
dc.article.pages 801-814 en_US
dc.keywords Damage assessment en_US
dc.keywords Data dependency en_US
dc.keywords Healthcare data en_US
dc.keywords Recovery en_US
dc.keywords Transaction depedency en_US
dc.identifier.doi https://doi.org/10.1016/j.tele.2017.12.010 en_US
dc.identifier.ctation Haraty, R. A., Kaddoura, S., & Zekri, A. S. (2018). Recovery of business intelligence systems: Towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach. Telematics and Informatics, 35(4), 801-814. en_US
dc.author.email rharaty@lau.edu.lb en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url https://www.sciencedirect.com/science/article/pii/S0736585316305354 en_US
dc.orcid.id https://orcid.org/0000-0002-6978-3627 en_US
dc.author.affiliation Lebanese American University en_US

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search LAUR

Advanced Search


My Account