Ranking analysis provides a prioritization technique for various data integrity techniques and selects a most prioritized blockchain approach for KSA's healthcare sector as a suggestion for future research. The first goal was to offer a simple and straightforward review using different analysis methods of earlier studies. This research intends to describe the threat plot of data integrity in healthcare through numerous attack statistics from around the world and Saudi Arabia and identify the criticality in Saudi Arabia in particular. It will also allow potential researchers to prioritize past studies to pick the most appropriate solution and to consider the needs of the healthcare industry. Furthermore, a successful unit analysis of studies evaluates the priority of various previous data integrity techniques through a hierarchy with a fuzzy AHP technique.
published an article addressing blockchain as health related storage [, Anastasia etal.
Alteration of data is more subtle, corrupting not only the secret in an industry's ability to secure its data, but also questioning the integrity of data from the industry. Although, for conducting an accurate search, the following keywords were usedhealthcare data integrity, electronic medical record security, healthcare information security, medical data transfer etc.
The study provides descriptive information of how to facilitate the block chain approach in healthcare sector. PMC legacy view [13] and lays down guidelines for the development of Systematic studies and metaexamination. published a model dealing with the big data situation in the latest healthcare industry and offering a stable cloud solution for the management of broad healthcare data [, Merkle Treebased approach: Brihat Sharma etal. The groups of informatics and health knowledge have two, two articles, respectively. Healthcare sector breches percentage ratio, Country wise total data record stole [37].
The study targeted numerous healthcarerelated SLR's to perform a systematic literature review.
Most scholars in their studies have explicitly concentrated on defining data integrity approaches or healthcare methodologies. The study uses body sensor network approach for facilitating secure and integrity managed architecture of IoT in healthcare. To contribute in this context, authors examine the previous literature of the healthcare data integrity management techniques in the following heading. Secondly, the data integrity strategies should be enumerated in all previously mentioned methods. The study presents a data management system for healthcare services to facilitate patients through blockchain technology. Hence, protecting the integrity of data in medical is the most prioritized issue. In this study, the authors have discussed about the challenges and survey the current situation of healthcare big data. While data integrity management of healthcare is the most critical and demanding subject for modern security scientists and scholars, authors have also noticed that there is not much literature is published on the healthcare data integrity issues. See Table2 for an overview of the included research. Healthcare provision is the most essential focus area for the Kingdom of Saudi Arabia (KSA) in all these emerging issues. The paper provides a costeffective and novel approach for the healthcare organization. It creates a disastrous situation for patients and medical organizations in the instance of health information security. This research indicates that the data breach on the healthcare sector is actually in its worst state to 2009 [4]. government site.
The adopted inclusion criteria were defined as follows: For excluding criteria were defined as follows: As mentioned in Figure4, the researchers excluded the articles in the screening and eligibility process based on their analysis. explores how the blockchain solution in an organization of healthcare sector is facilitated [, Peng Zhang etal.
used a hybrid fuzzy based methodology for assessing the effect of different blockchain technology models and delivers an original awareness and track to the future scientists [, Securebody sensor network (BSN): Prosanta Gope etal. Table7 depicts the fuzzy based pairwise comparison matrix for data backup at level2 of Data robustness. They require a comprehensive and fool proof entity for maintaining the data integrity, which is demonstrated by critical examination of this form of categorization. It ensures that the data is correct and has not even in any manner been improperly changed. It is specifically encouraged to implement and perform highquality research continually to achieve the exploitation of free data processing in medical services.
Study suggested by William J. Gordon etal.
In this study the unit analysis is significant step of a methodical analysis wherein the researchers identify and classify the revisions as per their respective healthcare field of study. The latest data breach events happened in two major healthcare industries, LabCorp and Quest Diagnostics, the incidents settled approximately 19 million patients' records through a shared service provider [10]. The statistics examined clearly reveal the patterns in attack and include a history of attacks on healthcare in past years. Manipulation of data often creates anxiety. A research on the data breach on healthcare carried out in the period of 200919 was performed by an online survey journal, HIPPA.
Total data breaches and records exposed graph.
Also, the key reason for choosing this target was to attract the research group's attention to this critical topic. Attackers specifically target healthcare subdomains to manipulate valuable data. Pandey, D. Received 2020 Oct 3; Revised 2021 Mar 21; Accepted 2021 Mar 23. Level2 of data auditability consists of secure cloud and Blockchain techniques. [33].
Alenezi, M. Uttar Pradesh, The quantitative and qualitative outcomes of the studies are summarized in Table4 by the authors, journal indexing, ranking, group and quartile. The fuzzy based pairwise comparison matrix for privacypreserving of level2 has been shown in Table9. ,
To quickly grasp the previous situation, the above overview of studies assorts in the previous research of data integrity strategies in the health care system into different criteria.
However, whichever survey is available, it does provide useful information.
sharing sensitive information, make sure youre on a federal Department of Computer Application, The CSB journal published three papers on the integrity of data.
The study proposes a model, the Merkle treebased approach to secure the integrity of health records. ,
with a Boolean operator AND.
Finally, in Table19, dependent weights were seen via the hierarchy. The defuzzified pairwise comparison matrix is depicted by Table12. Norse, Breached patient records tripled in 2018 vs 2017, as health data security challenges worsen, Here's how much your personal information is selling for on the dark web, The 10 biggest healthcare data breaches of 2019, so far, A wake-up call for data integrity invulnerability, Healthcare data breaches reach record high April, Healthcare device security: Insights and implications, Preferred reporting items for systematic reviews and metaanalyses: the PRISMA statement, Blockchain technology for healthcare: Facilitating the transition to patientdriven interoperability.
The numerous studies examined and datasets accessible to authors are limited. The study uses cloud storage environment for data available in healthcare organizations and for patients. Uttar Pradesh, Riyadh
The second most significant driver is securing the healthcare sector.
These accidents include employees' mistakes, incompetence and suspicious insiders' activities. published an article on the strategy of the BSN in the IoT setting of healthcare. Vision 2030 aims to lead the Kingdom as a Middle East Asian leader and a country of innovation and a prosperous economy [1]. Ermakova, T.
The fuzzy based pairwise comparison matrix for data honesty of level2 is depicted in Table10 that includes data honesty and contains cryptography, Blockchain and masked authentication messaging extension. The above hierarchy defines different methods of data integrity that are used in various subfields of the system. The data breach of 10,993 patients in the American Baptist Homes of the Midwest by compromising emails and network serves was another shocking case in 2019 [12]. Department of Information Technology, As per their Indexed category, the quartile area contains all the types the journals provided.
Uttar Pradesh, Tables13, 18 also depict the combined pairwise comparison matrix for all groups. The paper provides a blockchainbased architecture FHIRchain for securing Medicare.
published a model addressing the security of scientific data and providing FHIRchain architecture based on blockchain [, Abdullah Al Omar etal. The numerous researches covering various facets of the healthcare platform for data integrity protection are outlined in Table3. In the healthcare sector, it can include keeping patient's private information, health report, diagnostic reports, laboratory tests reports and other records. Authors also use blockchain approach for secure lab report transaction and communication. Table19 and Figure6 summarize the outcomes acquired after the estimation of data integrity measures by the fuzzyAHP procedure. : Authenticating health activity data using distributed ledger technologies, FHIRChain: Applying blockchain to securely and scalably share clinical data, Blockchain: A Panacea for healthcare cloudbased data security and privacy, BSNcare: A secure IoTbased modern healthcare system using body sensor network, Preserving patientcentred controls in electronic health record systems: A reliancebased model implication, 2017 International Conference on Orange Technologies (ICOT), Singapore, Secure medical data transmission model for IoTbased healthcare systems, Device security assessment of Internet of healthcare things, Security and privacy issues in wireless sensor networks for healthcare applications, Big data security intelligence for healthcare industry 4.0. The remaining parts of our studies are structured as: The first section discusses the critical threat plot of data integrity in the current healthcare sector worldwide and the KSA's perspective. After all these study searching, we apply the inclusion and exclusion criteria for filtering the most relevant studies. Table1 explains the studies in tabular format and their corresponding percentages. Managing data integrity is a crucial task for experts in healthcare. This paper used statistical procedure, to describe the challenges and consequences. While the researchers accessed several databases, there are undoubtedly studies and datasets that cannot be included in the SLR profile.
Exclude articles which did not apply the conditions of the request and the examination intention. Figure2 depicts that IT incidents alone account for 62% of the largest healthcare attacks, and this is a significant ratio for any sector [4].
Table4 explicitly indicates that the highest number of publications is in the field of computer science. Descriptive analysis of literature provides information about previous trends and techniques of data integrity in healthcare, and unit analysis presents a clear view of prior techniques used to facilitate only a subpart of healthcare infrastructure. In the computer science group, a total of 5 articles published are accessible. Prince Sultan University, : Store: Security Threat Oriented Requirements Engineering Methodology, Journal of King Saud UniversityComputer and Information Sciences, http://creativecommons.org/licenses/by/4.0/, https://www.hipaajournal.com/healthcaredatabreachstatistics/, https://www.sans.org/readingroom/whitepapers/firewalls/paper/34735, https://www.protenus.com/press/pressrelease/breachedpatientrecordstripledin2018vs2017ashealthdatasecuritychallengesworsen, https://www.experian.com/blogs/askexperian/hereshowmuchyourpersonalinformationissellingforonthedarkweb/, https://healthitsecurity.com/news/the10biggesthealthcaredatabreachesof2019sofar, https://www.sciencedirect.com/science/article/pii/S1361372320300427, https://www.modernhealthcare.com/cybersecurity/healthcaredatabreachesreachrecordhighapril, https://www.sciencedirect.com/science/article/pii/S1361372319300594, www.varonis.com/blog/theworldindatabreaches/, https://www.sciencedirect.com/science/article/pii/S1319157818306876.