| Literature DB >> 34035927 |
Mohammad Zarour1, Mamdouh Alenezi1, Md Tarique Jamal Ansari2, Abhishek Kumar Pandey3, Masood Ahmad3, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3.
Abstract
Data integrity continues to be a persistent problem in the current healthcare sector. It ensures that the data is correct and has not even in any manner been improperly changed. Incorrect data might become significant health threats for patients and a big responsibility for clinicians, resulting in problems such as scam, misconduct, inadequate treatment and data theft. This sort of endangering scenario causes tremendous difficulty in handling healthcare data. This research intends to describe the threat plot of data integrity in healthcare through numerous attack statistics from around the world and Saudi Arabia and identify the criticality in Saudi Arabia in particular. A literature review by descriptive analysis, unit analysis and rating analysis to achieve the planned systematic literature review goal is outlined. The outcome of ranking analysis using a fuzzy analytical hierarchy process methodology offers a route for Saudi Arabian researchers to promote medical records or data security in Arabic healthcare. It is suggested that blockchain is the most prioritized method for regular use and adaptation across Saudi Arabia in all data integrity management techniques. To address the challenges of data integrity and future path, the authors critically examine the challenges posed by data integrity in the healthcare sector.Entities:
Year: 2021 PMID: 34035927 PMCID: PMC8136763 DOI: 10.1049/htl2.12008
Source DB: PubMed Journal: Healthc Technol Lett ISSN: 2053-3713
FIGURE 1Total data breaches and records exposed graph
FIGURE 2Healthcare sector breches percentage ratio
FIGURE 3Country wise total data record stole [37]
FIGURE 4PRISMA flow diagram for paper selection
Literature search figures
|
|
|
|
|
|
|---|---|---|---|---|
| PubMed | 4 | 21 | 25 | 16 |
| Science direct | 5 | 17 | 22 | 22.72 |
| Google scholar | 5 | 15 | 20 | 25 |
| IEEE Xplorar | 4 | 18 | 22 | 18.18 |
| Cite‐seeker | 2 | 14 | 16 | 12.5 |
| Total | 20 | 85 | 105 | 19.04 |
Exploratory analysis of studies
|
|
|
|
|---|---|---|
| William J. Gordon et al. (2018) [ | The study provides descriptive information of how to facilitate the block chain approach in healthcare sector. The paper also discusses about the challenges that are associated with blockchain in order to provide a secure communication. | Blockchain |
| James Brogan et al. (2018) [ | The study provides distributed Ledger technologies in advancing electronic health information's. The paper provides a cost‐effective and novel approach for the healthcare organization. | Masked authenticated messaging extension |
| Peng Zhang et al. (2018) [ | The paper provides a blockchain‐based architecture FHIR‐chain for securing Medicare. | Blockchain |
| Christian Esposito et al. (2016) [ | The study uses cloud storage environment for data available in healthcare organizations and for patients. Authors also use blockchain approach for secure lab report transaction and communication. | Blockchain |
| Prosanta Gope et al. (2015) [ | The study uses body sensor network approach for facilitating secure and integrity managed architecture of IoT in healthcare. | Secure‐BSN |
| P. Vimalachandran et al. (2017) [ | Authors proposed authorization based model for Australian healthcare services. | Authentication |
| M. ELHOSENY et al. (2018) [ | The study provides a stenographic technique with hybrid encryption mechanism for securing health records and images. |
Encryption |
| EntaoLuo et al. (2018) [ | The study provides a secure sharing based data transfer in IoT environment for data security of healthcare organization. |
Slepian‐ Wolf‐coding‐based secret sharing (SW‐SSS) |
| Moshaddique Al Ameen et al. (2010) [ | The paper discusses about the challenges and issues associated with the wireless sensors in healthcare sector. | ‐ |
| Gunasekaran Manogaran et al. (2017) [ | Authors give a secure organizational IoT based model for storing and processing wearable sensor data in medical services. |
Secure Cloud |
| Benjamin Fabiana et al. (2014) [ | The study provides inter organizational data transfer security through various security attributes. The paper provides the architecture for secure data transfer from one organization to another. | Secure Cloud |
| Jinyuan Sun et al. (2011) [ | The paper provides a secure health record system for patient privacy based on cryptographic techniques and IoT environment of healthcare industry. | Cryptography |
| Abdullah Al Omar et al. (2017) [ | The study presents a data management system for healthcare services to facilitate patients through blockchain technology. | Blockchain |
| Sue Bowmanet et al. (2013) [ | The study highlights the current challenges and other error causes in healthcare data integrity in healthcare organization. The paper provides a review on current HER system of healthcare. | ‐ |
| Anastasia Theodouli et al. (2018) [ | The study presents mechanism for facilitating blockchain technology for providing auditable and sharable data in healthcare organization. | Blockchain |
| Zarour et al. (2020) [ | The study used hybrid fuzzy based methodology for evaluating the impact of different blockchain technology models in a healthcare perspective. | Blockchain |
| Karim Abouelmehdi et al. (2018) [ | In this study, the authors have discussed about the challenges and survey the current situation of healthcare big data. | ‐ |
| Anam Sajid et al. (2016) [ | The study presents review on healthcare medical data security for providing privacy to the patients. Paper also discusses about the currently used techniques and approaches in healthcare system. | ‐ |
| Brihat Sharma et al. (2018) [ | The study proposes a model, the Merkle tree‐based approach to secure the integrity of health records. The software model closely refers to the Blockchain technology. | Merkle tree‐based approach |
| Katharine Gammon (2018) [ | The article illustrates the blockchain application in healthcare sector in various domains. | ‐ |
Unit analysis
|
|
|
|
|
|
|
|---|---|---|---|---|---|
| William J. Gordon et al. (2018) | √ | √ | |||
| James Brogan et al. (2018) | √ | ||||
| Peng Zhang et al. (2018) | √ | ||||
| Christian Esposito et al. (2016) | √ | √ | √ | ||
| Prosanta Gope et al. (2015) | √ | ||||
| P. Vimalachandran et al. | √ | ||||
| M. ELHOSENY et al. (2018) | √ | ||||
| Entao Luo et al. (2018) | √ | ||||
| Moshaddique Al Ameen et al. (2010) | √ | √ | |||
| Gunasekaran Manogaran et al. | √ | √ | |||
| Benjamin Fabiana et al. (2014) | √ | ||||
| Jinyuan Sun et al. (2011) | √ | ||||
| Abdullah Al Omar et al. (2017) | √ | ||||
| Sue Bowman et al. (2013) | √ | √ | |||
| Anastasia Theodouli et al. | √ | √ | |||
| Xueping Liang et al. (2017) | √ | √ | |||
| Karim Abouelmehdi et al. (2018) | √ | √ | |||
| Anam Sajid et al. (2016) | √ | √ | |||
| Brihat Sharma et al. (2018) | √ | ||||
| Katharine Gammon (2018) |
Scientometric analysis
|
|
|
|
|
|---|---|---|---|
| William J. Gordon et al. (2018) | Computational and Structural Biotechnology Journal | Q1 | Computer science application |
| James Brogan et al. (2018) | Computational and Structural Biotechnology Journal | Q1 | Computer science application |
| Peng Zhang et al. (2018) | Computational and Structural Biotechnology Journal | Q1 | Computer science application |
| Christian Esposito et al. (2016) | IEEE Cloud Computing | Q1 | Computer science (miscellaneous) |
| Prosanta Gope et al. (2015) | IEEE SENSORS JOURNAL | Q1 | Electrical and electronic engineering |
| P. Vimala Chandran et al. | 2017 International Conférence on Orange Technologies (ICOT) | ‐ | ‐ |
| M. ELHOSENY et al. (2018) | IEEE Access | Q1 | Engineering (miscellaneous) |
| Entao Luo et al. (2018) | IEEE Communications Magazine | Q1 | Computer networks and communications |
| Moshaddique Al Ameen et al. (2010) | Journal of Medical Systems | Q2 | Health informatics |
| Gunasekaran Manogaran et al. | Thames L., Schaefer D. (eds) Cybersecurity for Industry 4.0. Springer Series in Advanced Manufacturing | ‐ | ‐ |
| Benjamin Fabiana et al. (2014) | Information Systems | Q1 | Information system |
| Jinyuan Sun et al. (2011) | 2011 31st International Conference on Distributed Computing Systems | ‐ | ‐ |
| Abdullah Al Omar et al. (2017) | International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage | ‐ | ‐ |
| Sue Bowmanet al. (2013) | Perspective Health Information Managing | Q2 | Medicine (miscellaneous) |
| Anastasia Theodouli et al. | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering(TrustCom/ BigDataSE) | ‐ | ‐ |
| Xueping Liang et al. (2017) | 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) | ‐ | ‐ |
| Karim Abouelmehdi et al. (2018) | Journal of Big Data | Q1 | Information system and management |
| Anam Sajid et al. (2016) | Journal of Medical Systems | Q2 | Health information management |
| Brihat Sharma et al. (2018) | 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) | ‐ | ‐ |
| Katharine Gammon (2018) | Nature Medicine | Q1 | Medicine (miscellaneous) |
FIGURE 5Data integrity approaches hierarchy and their sub‐fields of healthcare
Fuzzy based pair‐wise comparison matrix
|
|
|
|
|
|
| |
|---|---|---|---|---|---|---|
| (C1) | 1.00, 1.00, 1.00 | 1.35, 1.82, 2.39 | 1.41, 1.97, 2.48 | 0.31, 0.44, 0.63 | 0.87, 0.90, 0.95 | 0.23, 0.29, 0.42 |
| (C2) | ‐ | 1.00, 1.00, 1.00 | 0.85, 1.11, 1.45 | 0.55, 0.89, 1.37 | 0.79, 0.88, 1.02 | 0.25, 0.33, 0.50 |
| (C3) | ‐ | ‐ | 1.00, 1.00, 1.00 | 2.04, 3.16, 4.23 | 0.26, 0.36, 0.59 | 0.69, 1.00, 1.51 |
| (C4) | ‐ | ‐ | ‐ | 1.00, 1.00, 1.00 | 0.36, 0.52, 0.96 | 0.36, 0.52, 0.80 |
| (C5) | ‐ | ‐ | ‐ | ‐ | 1.00, 1.00, 1.00 | 0.89, 1.14, 1.39 |
| (C6) | ‐ | ‐ | ‐ | ‐ | ‐ | 1.00, 1.00, 1.00 |
Fuzzy based combined pair‐wise comparison matrix for data soundness at level‐2
|
|
| |
|---|---|---|
| (C11) | 1.00, 1.00, 1.00 | 0.49, 0.70, 0.93 |
| (C12) | ‐ | 1.00, 1.00, 1.00 |
Fuzzy based combined pair‐wise comparison matrix for data robustness at level‐2
|
|
| |
|---|---|---|
| (C21) | 1.00, 1.00, 1.00 | 0.40, 0.54, 0.78 |
| (C22) | ‐ | 1.00, 1.00, 1.00 |
Fuzzy based combined pair‐wise comparison matrix for data auditability at level‐2
|
|
| |
|---|---|---|
| (C31) | 1.00, 1.00, 1.00 | 0.80, 1.23, 1.78 |
| (C32) | ‐ | 1.00, 1.00, 1.00 |
Fuzzy based combined pair‐wise comparison matrix for privacy at level‐2
|
|
|
| |
|---|---|---|---|
| (C41) | 1.00, 1.00, 1.00 | 0.48, 0.67, 0.89 | 0.59, 0.70, 0.90 |
| (C42) | ‐ | 1.00, 1.00, 1.00 | 0.27, 0.38, 0.63 |
| (C43) | ‐ | ‐ | 1.00, 1.00, 1.00 |
Fuzzy based combined pair‐wise comparison matrix for data honesty at level‐2
|
|
|
| |
|---|---|---|---|
| (C51) | 1.00, 1.00, 1.00 | 0.55, 0.58, 0.66 | 0.63, 0.91, 1.34 |
| (C52) | ‐ | 1.00, 1.00, 1.00 | 0.42, 0.63, 0.96 |
| (C53) | ‐ | ‐ | 1.00, 1.00, 1.00 |
Fuzzy based combined pair‐wise comparison matrix for data backup at level 2
|
|
| |
|---|---|---|
| (C61) | 1.00, 1.00, 1.00 | 0.38, 0.54, 0.83 |
| (C62) | ‐ | 1.00, 1.00, 1.00 |
Combined pair‐wise comparison matrix and local weights at level 1
|
|
|
|
|
|
|
| |
|---|---|---|---|---|---|---|---|
| (C1) | 1.00 | 1.84 | 1.95 | 0.45 | 0.90 | 0.30 | 0.146 |
| (C2) | 0.54 | 1.00 | 1.13 | 0.93 | 0.89 | 0.36 | 0.114 |
| (C3) | 0.51 | 0.88 | 1.00 | 3.15 | 0.39 | 1.05 | 0.160 |
| (C4) | 0.94 | 1.07 | 2.51 | 1.00 | 0.59 | 0.55 | 0.131 |
| (C5) | 1.80 | 1.11 | 1.67 | 0.317 | 1.00 | 1.14 | 0.208 |
| (C6) | 0.87 | 2.20 | 1.10 | 3.25 | 2.77 | 1.00 | 0.241 |
| C.R. = 0.00932 | |||||||
Combined pair‐wise comparison matrix for data soundness at level‐two
|
|
|
| |
|---|---|---|---|
| (C11) | 1.00 | 0.71 | 0.415 |
| (C12) | 1.41 | 1.00 | 0.585 |
| C.R. = 0.000 | |||
Combined pair‐wise comparison matrix for data backup at level two
|
|
|
| |
|---|---|---|---|
| (C61) | 1.00 | 0.58 | 0.367 |
| (C62) | 1.72 | 1.00 | 0.633 |
| C.R. = 0.000 | |||
Overall weights and ranking of methods
| 1st level methods | Local weights of first level | Second level methods | Local weights of second level | Overall weights | Percentage | Overall ranks |
|---|---|---|---|---|---|---|
| (C1) | 0.146 | (C11) | 0.415 | 0.06059 | 6.059 % | 11 |
| (C12) | 0.585 | 0.08541 | 8.541 % | 4 | ||
| (C2) | 0.114 | (C21) | 0.363 | 0.04138 | 4.138 % | 12 |
| (C22) | 0.637 | 0.07262 | 7.262 % | 6 | ||
| (C31) | 0.558 | 0.08928 | 8.928 % | 2 | ||
| (C3) | 0.160 | (C32) | 0.442 | 0.07072 | 7.072 % | 8 |
| (C41) | 0.251 | 0.03228 | 3.228 % | 14 | ||
| (C42) | 0.275 | 0.03603 | 3.603 % | 13 | ||
| (C4) | 0.131 | (C43) | 0.474 | 0.06209 | 6.209 % | 10 |
| (C51) | 0.301 | 0.06261 | 6.261 % | 9 | ||
| (C5) | 0.208 | (C52) | 0.345 | 0.07176 | 7.176 % | 7 |
| (C53) | 0.354 | 0.07363 | 7.363 % | 5 | ||
| (C6) | 0.241 | (C61) | 0.367 | 0.08845 | 8.845 % | 3 |
| (C62) | 0.633 | 0.15255 | 15.255 % | 1 |
FIGURE 6Graphical representation of global weights and ranking of data integrity approaches
Combined pair‐wise comparison matrix for Data robustness at level‐two
|
|
|
| |
|---|---|---|---|
| (C21) | 1.00 | 0.57 | 0.363 |
| (C22) | 1.74 | 1.00 | 0.637 |
| C.R. = 0.000 |
Combined pair‐wise comparison matrix for data auditability at level two
|
|
|
| |
|---|---|---|---|
| (C31) | 1.00 | 1.26 | 0.558 |
| (C32) | 0.79 | 1.00 | 0.442 |
| C.R. = 0.000 |
Combined pair‐wise comparison matrix for privacy preserving at level two
|
|
|
|
| |
|---|---|---|---|---|
| (C41) | 1.00 | 0.66 | 0.73 | 0.251 |
| (C42) | 1.50 | 1.00 | 0.42 | 0.275 |
| (C43) | 1.36 | 2.37 | 1.00 | 0.474 |
| CR = 0.002544 | ||||
Combined pair‐wise comparison matrix for data honesty at level two
|
|
|
|
| |
|---|---|---|---|---|
| (C51) | 1.00 | 0.59 | 1.26 | 0.301 |
| (C52) | 1.67 | 1.00 | 0.66 | 0.345 |
| (C53) | 0.78 | 1.50 | 1.00 | 0.354 |
| C.R. = 0.00759 | ||||