This is my dissertation project Topic of the dissertation is to design or make “A SECURE AND EFFICIENT E-HEALTHCARE SYSTEM WHICH CAN HELPS PROTECTING PATIENT DATA IN THE HEALTHCARE ORGANISATION” The...

1 answer below »
A SECURE AND EFFICIENT E-HEALTHCARE SYSTEM PROTECTING PATIENT DATA IN THE HEALTHCARE ORGANISATION


This is my dissertation project Topic of the dissertation is to design or make “A SECURE AND EFFICIENT E-HEALTHCARE SYSTEM WHICH CAN HELPS PROTECTING PATIENT DATA IN THE HEALTHCARE ORGANISATION” The outline of your thesis will be: -Abstract -Acknowledgement -Chapter One (Proposal) -Chapter two(Literature Review) -Chapter three (Research Methodology) -Chapter Four (Result and Discussion) -Chapter Five (Conclusion and Future Works) -Appendix -References Background of the study: You should keep all the materials that help to understand the reader to get the overview of your targeted domain of knowledge, challenges and issues, Applications, Technologies and so on. - Taxonomy of the Existing Works: You should explain the existing works based on the proposed taxonomy and do the comparative study in a tabular form. - Critical Analysis of the Existing Works and finding Research GAP: -Outcome of your frame work and research Similar papers LINKS GIVEN BY MY PROFSSOR FOR HELP: https://ieeexplore.ieee.org/search/searchresult.jsp?queryText=Data%20security%20in%20healthcar e&highlight=true&returnFacets=ALL&returnType=SEARCH&matchPubs=true&refinements=ContentT ype:Journals https://ieeexplore.ieee.org/search/searchresult.jsp?queryText=Data%20security%20in%20healthcare&highlight=true&returnFacets=ALL&returnType=SEARCH&matchPubs=true&refinements=ContentType:Journals https://ieeexplore.ieee.org/search/searchresult.jsp?queryText=Data%20security%20in%20healthcare&highlight=true&returnFacets=ALL&returnType=SEARCH&matchPubs=true&refinements=ContentType:Journals https://ieeexplore.ieee.org/search/searchresult.jsp?queryText=Data%20security%20in%20healthcare&highlight=true&returnFacets=ALL&returnType=SEARCH&matchPubs=true&refinements=ContentType:Journals MSc Data Science and MSc Artificial Intelligence Project Handbook School of Mathematics and Computer Science Project Coordinator: Dr. Andrew Gascoyne 1 1 Introduction This handbook is intended for use by students and staff involved in level 7 projects. Hopefully, it should contain all the information that they need regarding the project module. If this is not the case, or if you find any typos, inaccuracies or contradictions, then please contact the project coordinator (contact details on Canvas). Level 7 Projects are opportunities for a student to study a topic in the relevant and develop their research skills, including developing an artefact, writing reports and giving presentations. The projects will be supervised by a member of academic staff with expertise in the project area, who will also serve as first assessor for the project. A reader will be allocated to the project as the second assessor. The projects will run over both semesters. The supervisor will meet with their project students to set tasks and discuss various aspects of the work. These may be group meetings with all of the supervisors students or on an individual basis at the discretion of the supervisor. Total contact hours for the whole duration of the project will be about 10 hours, including final presentations. Assessment will be based on the report submitted at the end of the semester, and an oral/poster presentation, including questioning. Oral/Poster presentations will take place at the end of the Semester. The amount of work required for project modules depends on the number of credits. For a sixty-credit module the standard University rules imply that such a module involves 600 hours of student work. One aim of project work is that students should enjoy an opportunity to study indepen- dently and hence should be allowed a certain amount of leeway how they do the project. This is best done by agreement between students and supervisors and so although these notes contain certain rules (e.g., supervisors should meet students in Weeks 2-3 of the modules and provide an outline of the project), it is important that both parties feel able to negotiate between themselves an appropriate course of action in most instances. A key aim is that students should be given the opportunity to show their strengths. Students should realise that this project module is very different from any previous module taken by them as it will require their independent work on open-ended questions, where there might be no definitive answer or solution. 2 Allocation of Projects and Supervisor The process of allocating the projects begins informally before the module begins, with the list of the offered projects published to students as early as possible on canvas. In Week 1 of the academic year, students will be asked to list 3 projects in their order of preference. A survey/quiz will be provided on canvas for students to submit their project choices. Final allocation is done by the Project Coordinator based on students’ choices and demand. It is the responsibility of the project coordinator to ensure that each student (who has supplied their project choices) has been allocated a project by the end of Week 2 of the module. The ideal situation is one in which all projects are allocated by the end of Week 2. Students should be aware that it is very difficult to change supervisors once the module has started and this will be done in exceptional cases only, and only if the circumstances 2 allow that. No changes of project are allowed after Week 4. Once allocated a project and supervisor, it is your responsibility to contact your super- visor and arrange meetings at the appropriate times to discuss issues and report on your progress, and to ensure you understand what is required in terms of submission and as- sessment. The contact may be by scheduled meeting (face-to-face/online), telephone or e-mail. A log of meetings should be kept by student and supervisor. 3 Supervisor Meetings You should have regular contact with your supervisor. Meetings are likely to be frequent at the beginning, as you will probably need more guidance and support when you are preparing the project plan and ethical approval documentation. At the beginning of the meeting you should give a brief account of your progress and then the discussion should be under the following headings: • tasks undertaken since your last meeting • tasks you plan to work on before your next meeting • any issues you have encountered or are at risk of encountering During your meeting you should review the project plan with your supervisor. Also discuss any problems you are having and check any external communications you would like to make. It is your responsibility to schedule and attend these meetings, keeping the appropriate project management documentation. 4 Submission of Project The final report should be submitted electronically via the module canvas page by the submission deadline (see canvas assignment task). The electronic versions should be in Word, pdf or some other common format. (Electronically scanned copies of a wholly handwritten report are not permitted.) Students must keep a copy of the report for their own records. The submission will be checked for plagiarism using the standard University software. If any plagiarism is suspected, the standard University procedures on plagiarism will be followed. Information on what constitutes plagiarism can be found on the University website: https://www.wlv.ac.uk/current-students/conduct-and-appeals/academic-misconduct/ If a student is unable to submit the work, for whatever reason, then they should contact their supervisor and project coordinator as soon as possible. The final project report should include a summary (typically, in the introductory section) describing the scope of the work and the main results, indicating the main sources used. Pages and sections should be numbered for easy reference and the title page should contain student name, student number, module code and title, title of project, supervisor and the 3 date of submission. The report should include a contents page and a full reference list, indicating all the books, articles or websites used. Due to the variety of suitable project topics there is no official word count. However as a very rough guide you should keep your report to between 40-80 pages (excluding bibliography and appendices). Recall that, in the text, if a results, piece of code etc., is taken from some source, there must be an indication of the source, and whether it has been significantly expanded or adapted. Apart from short statements, students should not copy directly from sources, and everything must be expressed in the student’s own words, except where explicitly stated. Students whose work is too closely based on their sources will have marks de- ducted. Guidelines for the required method of referencing can be found on the University Learning Centre’s webpage: http://www.wlv.ac.uk/lib/skills for learning/referencing.aspx http://www.wlv.ac.uk/lib/skills for learning/referencing/harvard referencing.aspx 5 Resources Each project is individual so there are no set books for the module; however, the following books are useful for general project advice and are available from the Library. Recommended Biggam, J. (2011) Succeeding with your master’s project – A step-by-step handbook, 2nd ed. Maidenhead: Open University Press. Oates, B.J. (2006) Researching information systems and computing. London: Sage Publications Ltd. Background Sharp, J.A. (2002) The management of a student research project, 3rd ed. Alder- shot: Gower. Wallace, M. and Wray, A. (2006) Critical reading and writing for postgraduates. Sage Study Skills Series. London: Sage Publications Ltd. Wisker, G. (2008) The postgraduate research handbook, 2nd ed. Basingstoke: Pal- grave Macmillan. 6 Presentation/Viva Voce Each student is required to give a presentation after submitting their project report. It should last about 20 minutes with time for questions. The focus of the presentations should be on communicating the main aspects of the project and demonstrate an under- standing of the project under the scrutiny of the questions asked by the audience. The presentation should be pitched at your fellow students, and it should be aimed at them as the audience. Questions will be asked by the supervisor and reader to ascertain the 4 students understanding of the project and also to ensure the project report is the students own work. If you fail to convince the examiners that the work is your own, you may fail the module and be asked to resit it. Usually, cases of academic misconduct are picked up before the viva/presentation, but sometimes it only becomes obvious once a student presents the work orally or is asked questions! There are three main aims of the presentation: (i). The presentation should cover the main aspects of the project, be well summarised, coherent and have a clear narrative. (ii). Students should demonstrate that they understand and have mastered the material. (iii). Ensure the project report is the students own work. Students can make the presentation in any acceptable format, PowerPoint, Beamer, poster, even white board (“chalk and talk”) etc. although this should be agreed with the supervisor. Students should inform the project coordinator, supervisor and reader at least one week ahead of time of their requirements for the presentation. It cannot be assumed that the room for the presentation will contain a computer with every possible computer program. Students are advised to bring electronic files on a memory stick or bring their own device (laptop). Advice to students on presentations • The presentation will pass by quicker than you think so plan carefully. • Cover some part of the material in depth rather than all parts superficially. • Give yourself enough time to demonstrate your artefact. • A good example is worth a thousand words. • Practise in front of friends and family, even those that have no understanding of the area. This will give you confidence and you will be less nervous. It also allows you to judge the timing. • Imagine that the presentation is for a job interview
Answered 21 days AfterDec 03, 2021

Answer To: This is my dissertation project Topic of the dissertation is to design or make “A SECURE AND...

Neha answered on Dec 17 2021
128 Votes
A SECURE AND EFFICIENT E-HEALTHCARE SYSTEM PROTECTING PATIENT DATA IN THE HEALTHCARE ORGANISATION
Abstract
As me move in the coming future then the cyber operations will be able to employ digital information so that it can compromise the integrity instead of disrupting the access or deleting it this can have impact over the lives as it is tempering the information. There has been emerging type of the cybercrime which is posing our gigantic threat and it needs to be addressed at the urgent basis so that we can handle the consequences done by the tempering of data. Hence it is important for the researchers and the security practitioners to abreast of the perils of data tampering. The data integrity is still one of the most critical concerns in the industry of health care that data integrity breach present in the health care institution can also result in multiple number of potentially serious consequences there has been cyber security incidents which have been perceived as the gravest threats to the hospitals. It has become a challenging problem for the security practitioners to preserve the data integrity in the healthcare industry as the organizational structure of these institutions have high end point complexity and the regulatory pressures. This error in information, or the data will be used by the attacker in different types of the further attacks. The main aim of this paper is to illustrate the current data integrity techniques which are currently used by the researchers for securing the health care data.
Acknowledgement
This is to acknowledge all those without whom this project would not have been possible. Firstly, I would like to thank our lecturer who provided us this opportunity to complete this research work. I got his immense support and he also dedicated time towards me to make me understand about this project. This project would not have been completed without his guidance I took help from Google scholars and the research papers were published online.
Contents
Abstract    2
Acknowledgement    3
Chapter 1: Proposal    5
Chapter 2: Literature Review    9
Chapter 3: Research Methodology    18
3.1 IoT Healthcare Applications    19
3.2 Methodology to conduct SLR    24
3.3 Scientometric analysis    25
3.4 Cloud Computing    27
3.5 Fog Computing    28
3.7 Elliptic Curve Diffie-Hellman    30
3.8 Radio Frequency Identification    31
3.9 Edge Computing    31
3.11 Grid computing    32
Chapter 4: Result and Discussion    33
4.1 Challenges associated with blockchain approach    34
4.2. Challenges associated with future of data integrity breaches in healthcare    34
4.3 Challenges associated with healthcare data risk    35
4.4 challenges associated with human awareness    36
4.4 Challenges associated with researchers    37
Chapter 5: Conclusion and Future Works    38
5.1 Conclusion    38
5.2 Suggestions
    41
References    42
Chapter 1: Proposal
    In today’s world, all leading organizations and businesses rely on data and therefore, it has become one of the most important assets in business success. Nowadays, every industry has slowly transitioned towards a digitalized platform and portfolio. As a result of this mass digitalization, a large amount of data is generated, every second. It is essential to manage this large amount of the data in a secure manner. But this task is becoming very complex and challenging for the security experts in the industry as each data-type have their unique usage patterns, algorithms and significance. The data importance completely depends on the data type. For example, the data generated in the healthcare organizations have their significance in context of feasibility of treatment [1]. The numbers and frequency of cyber-attacks on healthcare data bases have increased noticeably. The breached data are being used for monetary exploitation, which resulting in the fact that the care users are becoming hesitant to share their data with the healthcare data bases. It is also admitted by data experts that the detection of data breach is very difficult and is often left unnoticed.
In near future, all medical treatment will be provided, based on medical history of care users, so that accurate treatment can be provided. Therefore, collection and storing of data will increase with time. Hence, it is important to have safety and regulatory policies for data preservation. Developing and imposing such security would increase security against data hackers. As me move towards coming future then the cyber operations will be able to employ digital information so that it can compromise the integrity instead of disrupting the access or deleting it this can have impact over the lives as it is tempering the information. There has been emerging type of the cybercrime which is posing our gigantic threat and it needs to be addressed at the urgent basis so that we can handle the consequences done by the tempering of data [2]. Hence it is important for the researchers and the security practitioners to abreast of the perils of data tampering. It is important to have the rigorous and continuous data protection solution so that it can provide guarantee that information will be kept protected against any type of the manipulative breaches.
    The integrity of data remains to be a major issue in the industry of health care that data integrity breach present in the health care institution can also create multiple data breach related issues of concern. There have been cyber security incidents which have been perceived as the gravest threats to the hospitals. It has become a challenging problem for the security practitioners to preserve the data integrity in the healthcare industry as the organizational structure of these institutions have complexity data processing systems and the authoritative pressures when it comes to data storing and information formulation [2]. The increasing number of data breaches and cybercrimes, indicate that the healthcare industry is yet to get onto the same levels as other industries, when it comes to data security and control. Therefore, this industry needs to put efforts in protecting the data integrity of the stakeholders.
The organizational data-integrity can be used to make sure that organization is able to hold the brand image and trust of the customers. If the healthcare organizations, who use have transitioned towards digitized data preservation, do not take proper measures in securing the collected data of the care users, it would create problem, not only for the revenue of the organization, but also for the development of confidence among the care users [1]. This type of threat is comparatively more concerning than the other data breaches faced by organizations. If the data breaches are not identified, then those breaches would result in future attacks on data.
The celebrated research paper aims at identifying the trends in data collection, processing and unethical breaches, in context of health care data. This literature review study also tried to compile the repository of the techniques used for data integrity which are further exploited by the attackers. Based on these findings, it aims to make data experts realize the necessity data security, integrity and regulatory interventions [3]. In the first phase of this research, previous data breaches and data hack attacks are discussed for context. Then these breaches and cyber-attacks are linked with the healthcare sector. It shows that we can get the overview of the rational criticism over current data integrity scenarios in the healthcare. The second phase of this literature review provides the systematic review about previous research initiatives which were related with the data integrity of healthcare departments.
    The different perspectives of daily living have already observed a continuous growth in the usage of information technology, especially internet. As a result of increasing usage of the internet, a significant number of people are not bothered with the data collection being done and exploited on regular basis. Kevin Ashton named the term Internet of Things, and it is used to represent the Internet based information with the help of emerging Global Services architecture. The Internet of Things healthcare applications now have the capacity to track people, specimens, equipment, supplies accurately and it can also take care of the different types of the stack holders which includes diagnosis, community, hospitals and nursing homes for analyzing the capturing data we can use biometrics information or measure the important parameters with the help of the sensors to get better quality and also use the resources in efficient manner [3]. For detecting the misuse activation in the form of extreme cardio practice or accelerated exercising as analyzed for training at the medical movement then the aforementioned data will be used to collect relevant information in the system and also control the disease.
    In our past decade the Internet of Things have become the mega trend in the 4th generation of revolution technologies, and it is able to offer excellent interconnection for every uniquely identifiable smart device or the object present in Internet infrastructure. The structure of the advanced connectivity for these services and their devices can proceed with the machine to machine scenarios the Internet of Things is the highly powerful distributed network which is created with the combination of multiple objects we can dominate the prospect of the Internet of Things which will be able to serve as the global policy for connecting physical objects, humans, substances and enable multiple new methods to work communicate, entertain, live and interact. The Internet of Things helps to transform the physical objects so that it can perform and receive the information [4].
It will be able to coordinate their decisions by utilizing the present technologies like pervasive computing, intelligence technologies, Internet protocols, sensor networks, domain specific applications and embedded devices the Internet of Things can be defined as the new fashioned paradigm which is present in every physical object which we are wearing, what we read or see, what we drive and anything which also includes the people we meet or the places we go. All these things are connected, controlling addressed remotely. There has been a number of such physical things which are connected with each other and finally with the Internet for sharing the data with cyberspace there has been millions of the new Internet of Things devices every year which are deployed to different applications domains with the help of research are anticipating in the Internet of Things technologies [5].
There have been multiple distributed survey papers which are related with the different aspects of the applications and they are already published. If we talk about the standard paper then it includes the four most intelligence empowering technologies and they are the different components of wireless sensor networks wireless and variable there has been a lot of appropriate solutions which are collected from the broad spectrum of applications in IoT and they are embedded in the smart cities waste management, traffic congestion, security, structural health, health care, logistics, automated control, emergency services and retails.
We have already discussed about the security base which is present currently in the healthcare application on the Internet of Things and it also describes the level of the protection[5]. The Internet of Things applications have default security and they are required for protecting themselves any healthcare domain specification system needs to be addressed in terms of the trust, privacy and security with this paper we will try to analyze a variety of the research is done on the healthcare and also show different healthcare technologies, protocols, applications, services, late works, security challenges, security and IT requirements, different proposed and implemented security models, open issues which needs to be faced for the IoT and the market opportunity.
We will do the review work which will include the survey done on state of the art technologies used in the Internet of Things based healthcare, classify the current Internet of Things based healthcare networks and present a summary [6], Model the analysis of standard Internet of Things healthcare protocol and provided detailed discussion regarding it, provide broad survey over the applications and their services and model the extensive insights about the IoT healthcare security, it's requirements and privacy issues in this department.
The telemedicine is one of the most important and emerging fields of the E health search. If we talk about the telemedicine service then it includes the images, multimedia medical data and the MVD which is transmitted over the family with the help of insecure Internet connections as they are required by the remote doctors the healthcare cloud infrastructure can make it much easier to perform different healthcare information together for the patient when the patient is moving from one hospital to another this will result in easy management and tracking of the information about patient [6]. The healthcare cloud can be defined as the cloud computing infrastructure in which all the health care service providers and the stack holders will be able to communicate with each other through the cloud servers.
The healthcare cloud computing can offer multiple benefits of both hardware and software with the help of provision of the services over the Internet. The cloud computing can be defined as the model to enable convenient and on-demand network access over the shared pool of configurable computing resources which are networks, storage, services, application and servers and they can be rapidly provisioned and released with the minimal management effort or the interaction with the service provider the healthcare cloud computing is similar to the cloud computing and it has multiple issues related with the security and the most important issues are legal and policy issues, lack of transparency, privacy protection, data protection, software licensing, cyber security and absence of the security standards [7].
Chapter 2: Literature Review
It is very important to manage the large amount of the data in a secure manner. But this task is becoming very complex and challenging for the security experts in the industry as different types of data sets have their own significance and uses. The relevance of the data depends on the type of data we have in hand. For instance, data related to healthcare industry has its own significance in the everyday lives of individuals. Undoubtedly, cyber-attacks in the healthcare industry have increased significantly primarily for the purpose of unethically accessing the data so that monetary benefits can be drawn out of it. Drift in the data could not be identified easily owing to the present-day technological advancements, which are being used as a tool by the attackers [8]. Maintaining the integrity of the data to protect the data from breaches has turned out to be of great importance in the modern-day scenario. Furthermore, data, which has been breached is being used by the attackers to carry on more attacks. Continuous rise of internet and internet of things is inevitable in the healthcare industry. Kevin Ashton named the term Internet of Things, which is now used as a global service architecture and contains a lot of healthcare related information, which needs to be handled with great efficiency and effectiveness.
The data integrity issue is the most demanding concern present in the healthcare industry if we compare this across the world. If the health care organization is facing integrity breach, then it can have disastrous consequences. The data about the patient has been tampered and it can be provided wrong medications which can cause fatalities. There are many health care organizations currently which have weak and vulnerable data storage procedures and they also lack to have secure mechanism two foil malware attacks [8].
Such issues have been posing multiple challenges which are related with the integrity of data in healthcare organizations this work has been done to have the novel approach so that we can provide the overview about the current data integrity plot present in the healthcare by studying about attack statistics there has been numerous surveys done under increasing number of the data intrusions specifically which has target on the healthcare industry. HIPPA is an online survey, which is conducted to take on a study on data breaches or cyber-attacks between the year 2009 and 2019. The study has come up with a number of facts and figures, which highlights the fact that malware attacks have increased significantly in the healthcare industry and therefore, strict safeguard measures are required to protect the integrity and confidentiality of data.
Fig1: Graph for data breach attacks
This report also cites 25 largest data breaches done in the health care industry over a period of 10 years. Through these records we can easily characterize the percentage ratio of this type of attack which was implemented mostly in the health care organization. As per the available data, it is evident that 62% of the healthcare cyberattacks have taken place through information technology means and methods. Critical analysis can be done for this type of the categorization, and it shows that there is requirement of systematic and foolproof package to manage the smart hospital security and data integrity as per the study 94% of the health care organizations have reported cyberattacks over their system [9].
In an annual analysis report, it has been clearly highlighted that number of data breaches in the healthcare industry has tripled in the year 2018 as compared to 2017. There has been an online article which shows that average cost of the healthcare record present on the dark web can cost from one dollar $2000. It is the second largest cost for any of the assets present on the dark web in 2019 there were around 16,890 records about the cancer patients which were disclosed at the cancer treatment centers of America, and they were getting targeted by their emails. As per the online news website in early 2019 the American Medical collection agency was hacked for 8 months and around 25 million patients where are tagged. The data of about 25 million patients were compromised during this. This data was sensitive as the billing record and the prescription of the patients was compromised during this attack [9].
Fig2: Pie chart for types of attacks
In a report of the research done by global market insights, it is evident that cybersecurity market might surpass 27 billion humans by the year 2085. Another data breach case, which shook the world in the year 2019 was related with $10,000 in the American homes of the Midwest as they were compromised by their email and network servers. The statistics was discussed in this section to clearly explain about the attack trends and it also provides the review about the attacks done on the health care services in the recent years [10].
A critical study about these attacks can be used to provide clear status of the data integrity and the cyberattacks there in the health care services. The data manipulation can result in uncertainty if we talk about the current data driven world then there are consequences of the uncertainty, and they are frightening. The data integrity breach can also undermine the basics of health, commerce, political systems and infrastructure national security the manipulation of the data is more insidious. This has been questioning the integrity of the data in the industry. For instance, the consequences if the terrorist manipulate all the healthcare sensitive information.
Attack on highly confidential medical data can result in some serious consequences. Such scenarios make it extremely vital to understand the importance of data integrity in the healthcare industry. Systematic literature review on previous methods deployed to maintain integrity of data can help to eliminate such extreme situations. The authors were also able to identify most effective technique which needs more deeper research, and it should be the priority of the security experts to preserve the data integrity.
    As per the authors in 2014 there have been different security issues which are present in the mobile cloud computing these issues can be further divided into five major categories which are [11]:
· physical threats and it includes mobile possession, stolen or lost devices
· application based threads which includes the malware, valuable applications, privacy and spyware
· network based mobile security threats which includes address impersonation, Wi-Fi sniffing and denial of service
· that based threats like drive by downloads, jailbroken devices and browser exploits
· other active attacks which include vulnerabilities, information recovery vulnerability, Internet Protocol and unauthorized access of the management interface.
One such usage scenario involves usage of the decoy present in the local computer and it means that we can place the decoy document in the same environment in which it was initially created in the other scenario we can't locate the decoy over the network level in these both scenarios the decoy can be used for protecting the documents on different levels however the decoy can also be used for protecting the software as it is being made to look like the legitimate source code the decoy software will be able to protect the real software from any type of the unauthorized usage another decoy usage scenario can be applied over the voicemail [12] decoy for detecting the malicious activity in this case the decoy is the legitimate voice message but it will have false information.
The cloud-based decoy can also be used for protecting the documents present in the cloud against any type of insider attack there has been few studies which have focused to secure the cloud data with the help of decoy documents. Daughters first carried out the user behavior profiling for determining the unauthorized access end the attacker accesses the cloud then the decoy document is returned so that the information about the real user will be kept secure every decoy document header will have hidden hash-based message authentication code. The verification will be done whether the document is a decoy or not by calculating this value on the basis of the content present in the document if two of these values match then the document is a decoy, and the alert will be issued.
In this case the decor document will be used for two purposes. The first one is to validate whether or not that data access is authorized when abnormal information access is detected and another one is to confuse the attacker by providing false document it is important to note down that only decoy documents will be used in this study, and they are selected manually and added into the file system by the user.
For conducting the systematic literature review we did survey on different healthcare related literature reviews. Some of the authors have also discussed about the administrative qualities and the requirements. Some of them have discussed about the different approaches for privacy and security of the data [13]. It was found that though the data integrity management is crucial in healthcare, and it is the most challenging topic for the current security experts, but it does not have much literature work available on the data integrity issues in the healthcare. It is proved that most of the researchers have focused over the available data integrated techniques or the methods for the healthcare. The references related with this study are based on the research work done by the different researchers.
P. Asma et al. has come up with a review regarding the data handling mechanism. In their paper it provides the comprehensive and brief knowledge related with the big data handling mechanism in healthcare through different aspects. The study further categorizes the mechanism into multiple fields to have easy and comparative analysis. P. P. Biancone et al. discussed about the data quality of healthcare in this paper [14]. Their study shows the different types of the data quality assurance methodologies of the multiple research work done and they are published from the current state of data quality methods available in the healthcare.
These methods can be helpful for the future researchers. In another paper it provides the brilliant review about the current situation of health care to develop road map of the blockchain technology in their paper they discuss about multiple issues like accountability, interoperability and the law related with the implications of health care so that they can analyze the blockchain technology properly. This study also describes the road map for allowing the healthcare industry to use blockchain technology and prepare the taxonomy. This paper has contribution for significant and effective information in the healthcare industry. P.Behrouz et al. Provides the review over the Internet of Things the Internet of Things is the most significant part of the smart hospitals currently the author discuss about the mechanism used for data integration of I OT to have better communication and effective usage.
This study also contributes over different aspects as it is able to provide comprehensive study over multiple mechanisms of data aggregation. All the research work initiatives can be used to provide knowledge regarding healthcare industry the authors also found that there is requirement of having systematic literature review which will have focus over the multiple data integrity techniques, and it will provide the road map to help the future researchers so that they can show their research initiatives. To achieve this goal in this paper we will discuss about the different data integrity management techniques as they were initially discussed in the top quartile research articles. Before creating a solution, it is important to understand the problem in detail and then select the best method for solving it [14].
In one of the research paper the author introduced about anonymous authentication for the network with the help of provable security. Another paper discussed about the role of the big data analysis and mobile cloud computing in the network healthcare. It also includes the capabilities of big data analysis and mobile cloud computing there are many health care methods, applications and tools of the big data analytics which are discussed in this paper. Ho-Gun Ha et al. represents the summary related with augmented reality. It discusses about the current applications of the medication. Initially it discusses about the concept and provide the brief features of the three elements which are software, hardware and the application. It also includes the basic concept about augmented reality [15]. The authors were involved in reviewing multiple applications which are applied in the laboratory. In another paper the author reviews the applications, existing technologies and the concepts present in the health care system.
They were involved in reviewing and noting down the differences between those techniques. They also provided the brief explanation in the personalized IoT healthcare. The major focus was over the ubiquitous wearable devices which are able to collect data from the body of the patient. Khan et el. Proposed and designed the effective monitoring system for the health care with the help of io T and RFID tags. The experiment performed in this paper shows the output against multiple medical emergencies. As per the proposed system it has combination of the microcontrollers which are attached with the sensors and they are used for obtaining the results of an adult rated assessments, get the health status of the patient and monitor it.
This system is also able to increase the power...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here