Open Access

ARTICLE

Analyzing the Implications of Healthcare Data Breaches through Computational Technique

Ahmed H. Almulihi1, Fawaz Alassery2, Asif Irshad Khan3, Sarita Shukla4, Bineet Kumar Gupta4, Rajeev Kumar4,*
1 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
2 Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
3 Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
4 Department of Computer Applications, Shri Ramswaroop Memorial University, Barabanki, 225003, Uttar Pradesh, India
* Corresponding Author: Rajeev Kumar. Email:

Intelligent Automation & Soft Computing 2022, 32(3), 1763-1779. https://doi.org/10.32604/iasc.2022.023460

Received 09 September 2021; Accepted 18 October 2021; Issue published 09 December 2021

Abstract

The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that companies face. In addition, the study’s main purpose is to investigate and draw conclusions from healthcare big data breaches, with the goal of improving healthcare big data confidentiality. From the beginning of 2020–21, both years, practically our entire world moved online due to the COVID-19 pandemic. The coronavirus pandemic dramatically increased the extent of use of technology. Hacking/IT incidents, followed by unauthorised internal disclosures, are the most typical attacks behind healthcare data breaches, according to the report. This has become a main enticement for healthcare data theft and misuse. The number of healthcare big data breaches, the number of records exposed, and the resulting significant commercial losses are increasing. In the report, they analyze and investigate the number of healthcare big data breaches, the number of records exposed during the COVID-19 pandemic. Also, the study assesses the correctness of the datasets in order to achieve a dynamic digital healthcare data breaches environment using fuzzy based computational technique.

Keywords

Big data security; healthcare big data breaches; cost effectiveness; big data analysis

Cite This Article

A. H. Almulihi, F. Alassery, A. Irshad Khan, S. Shukla, B. Kumar Gupta et al., "Analyzing the implications of healthcare data breaches through computational technique," Intelligent Automation & Soft Computing, vol. 32, no.3, pp. 1763–1779, 2022.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1106

    View

  • 623

    Download

  • 0

    Like

Share Link

WeChat scan