Recovery of business intelligence systems

With the intensive use of the internet, patient centric healthcare systems shifted away from paper-based records towards a computerized format. Electronic patient centric healthcare databases contain information about patients that should be kept available for further reference. Healthcare databases...

Full description

Saved in:
Bibliographic Details
Main Author: Haraty, Ramzi A. (author)
Other Authors: Kaddoura, Sanaa (author), Zekri, Ahmed Sherif (author)
Format: article
Published: 2018
Online Access:http://hdl.handle.net/10725/6938
https://doi.org/10.1016/j.tele.2017.12.010
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://www.sciencedirect.com/science/article/pii/S0736585316305354
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513481071394816
author Haraty, Ramzi A.
author2 Kaddoura, Sanaa
Zekri, Ahmed Sherif
author2_role author
author
author_facet Haraty, Ramzi A.
Kaddoura, Sanaa
Zekri, Ahmed Sherif
author_role author
dc.creator.none.fl_str_mv Haraty, Ramzi A.
Kaddoura, Sanaa
Zekri, Ahmed Sherif
dc.date.none.fl_str_mv 2018-01-23T12:50:06Z
2018-01-23T12:50:06Z
2018
2018-01-23
dc.identifier.none.fl_str_mv 0736-5853
http://hdl.handle.net/10725/6938
https://doi.org/10.1016/j.tele.2017.12.010
Haraty, R. A., Kaddoura, S., & Zekri, A. S. (2018). Recovery of business intelligence systems: Towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach. Telematics and Informatics, 35(4), 801-814.
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://www.sciencedirect.com/science/article/pii/S0736585316305354
dc.language.none.fl_str_mv en
dc.relation.none.fl_str_mv Telematics and Informatics
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.title.none.fl_str_mv Recovery of business intelligence systems
towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach
dc.type.none.fl_str_mv Article
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/article
description With the intensive use of the internet, patient centric healthcare systems shifted away from paper-based records towards a computerized format. Electronic patient centric healthcare databases contain information about patients that should be kept available for further reference. Healthcare databases contain potential data that makes them a goal for attackers. Hacking into these systems and publishing their contents online exposes them to a challenge that affects their continuity. Any denial of this service will not be tolerated since we cannot know when we need to retrieve a patient’s record. Denial of service affects the continuity of the healthcare system which in turn threatens patients’ lives, decreases the efficiency of the healthcare system and increases the operating costs of the attacked healthcare organization. Although there are many defensive security methods that have been devised, nonetheless malicious transactions may find a way to penetrate the secured safeguard and then modify critical data of healthcare databases. When a malicious transaction modifies a patient record in a database, the damage may spread to other records through valid transactions. Therefore, recovery techniques are required. The efficiency of the data recovery algorithm is substantial for e-healthcare systems. A patient cannot wait too long for his/her medical history to be recovered so that the correct medication be prescribed. Nevertheless, in order to have fast data recovery, an efficient damage assessment process should precede the recovery stage. The damage assessment must be performed as the intrusion detection system detects the malicious activity. The execution time of the recovery process is a crucial factor for measuring the performance because it is directly proportional to the denial of service time of any healthcare system. This paper presents a high performance damage assessment and recovery algorithm for e-healthcare systems. The algorithm provides fast damage assessment after an attack by a malicious transaction to keep the availability of the e-healthcare database. Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. It is about six times faster than the most recent proposed algorithm. In the worst case, the proposed algorithm takes 8.81 ms to discover the damaged part of the database; however, the fastest recent algorithm requires 50.91 ms. In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. This is a significant reduction of execution time compared with other available approaches. Saving the damage assessment time means shorter denial of service periods, which in turn guarantees the continuity of the patient centric healthcare system.
eu_rights_str_mv openAccess
format article
id LAURepo_f600bdd267eda9012daf4eec7b9d99f6
identifier_str_mv 0736-5853
Haraty, R. A., Kaddoura, S., & Zekri, A. S. (2018). Recovery of business intelligence systems: Towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach. Telematics and Informatics, 35(4), 801-814.
language_invalid_str_mv en
network_acronym_str LAURepo
network_name_str Lebanese American University repository
oai_identifier_str oai:laur.lau.edu.lb:10725/6938
publishDate 2018
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Recovery of business intelligence systemstowards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approachHaraty, Ramzi A.Kaddoura, SanaaZekri, Ahmed SherifWith the intensive use of the internet, patient centric healthcare systems shifted away from paper-based records towards a computerized format. Electronic patient centric healthcare databases contain information about patients that should be kept available for further reference. Healthcare databases contain potential data that makes them a goal for attackers. Hacking into these systems and publishing their contents online exposes them to a challenge that affects their continuity. Any denial of this service will not be tolerated since we cannot know when we need to retrieve a patient’s record. Denial of service affects the continuity of the healthcare system which in turn threatens patients’ lives, decreases the efficiency of the healthcare system and increases the operating costs of the attacked healthcare organization. Although there are many defensive security methods that have been devised, nonetheless malicious transactions may find a way to penetrate the secured safeguard and then modify critical data of healthcare databases. When a malicious transaction modifies a patient record in a database, the damage may spread to other records through valid transactions. Therefore, recovery techniques are required. The efficiency of the data recovery algorithm is substantial for e-healthcare systems. A patient cannot wait too long for his/her medical history to be recovered so that the correct medication be prescribed. Nevertheless, in order to have fast data recovery, an efficient damage assessment process should precede the recovery stage. The damage assessment must be performed as the intrusion detection system detects the malicious activity. The execution time of the recovery process is a crucial factor for measuring the performance because it is directly proportional to the denial of service time of any healthcare system. This paper presents a high performance damage assessment and recovery algorithm for e-healthcare systems. The algorithm provides fast damage assessment after an attack by a malicious transaction to keep the availability of the e-healthcare database. Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. It is about six times faster than the most recent proposed algorithm. In the worst case, the proposed algorithm takes 8.81 ms to discover the damaged part of the database; however, the fastest recent algorithm requires 50.91 ms. In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. This is a significant reduction of execution time compared with other available approaches. Saving the damage assessment time means shorter denial of service periods, which in turn guarantees the continuity of the patient centric healthcare system.PublishedN/A2018-01-23T12:50:06Z2018-01-23T12:50:06Z20182018-01-23Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article0736-5853http://hdl.handle.net/10725/6938https://doi.org/10.1016/j.tele.2017.12.010Haraty, R. A., Kaddoura, S., & Zekri, A. S. (2018). Recovery of business intelligence systems: Towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach. Telematics and Informatics, 35(4), 801-814.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttps://www.sciencedirect.com/science/article/pii/S0736585316305354enTelematics and Informaticsinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/69382021-03-19T10:43:19Z
spellingShingle Recovery of business intelligence systems
Haraty, Ramzi A.
status_str publishedVersion
title Recovery of business intelligence systems
title_full Recovery of business intelligence systems
title_fullStr Recovery of business intelligence systems
title_full_unstemmed Recovery of business intelligence systems
title_short Recovery of business intelligence systems
title_sort Recovery of business intelligence systems
url http://hdl.handle.net/10725/6938
https://doi.org/10.1016/j.tele.2017.12.010
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://www.sciencedirect.com/science/article/pii/S0736585316305354