USING GENETIC ALGORITHMS TO OPTIMIZE CYBER SECURITY PROTOCOLS FOR HEALTHCARE DATA MANAGEMENT SYSTEMS
Keywords:
Genetic Algorithms, Cybersecurity, Healthcare Data, Optimization, Data Management, Encryption, Access Control, Security ProtocolsAbstract
With the exponential growth of healthcare data in the digital age, securing patient information has become a crucial concern. Traditional security protocols often struggle to keep pace with emerging cyber threats, particularly in healthcare environments where both data integrity and accessibility are paramount. Genetic Algorithms (GAs) offer a promising optimization tool for evolving more robust cybersecurity protocols. This paper explores the application of GAs to healthcare data management systems, aiming to enhance security while ensuring system efficiency. Through literature review and experimental analysis, we demonstrate how GAs can improve protocol resilience against attacks. Results from the study indicate a significant increase in the robustness of security protocols when optimized through GAs, with a particular focus on encryption and access control mechanisms.
References
Priyadarshini, R., Quadir Md, A., Rajendran, N. et al. An enhanced encryption-based security framework in the CPS Cloud. J Cloud Comp 11, 64 (2022). https://doi.org/10.1186/s13677-022-00336-z
Pang, X., Ge, YF., Wang, K. et al. Patient assignment optimization in cloud healthcare systems: a distributed genetic algorithm. Health Inf Sci Syst 11, 30 (2023). https://doi.org/10.1007/s13755-023-00230-1
Bayyapu, S. (2022). Optimizing IT sourcing in healthcare: Balancing control, cost, and innovation. International Journal of Computer Applications, 3(1), 14-20.
Kocyigit E, Korkmaz M, Sahingoz OK, Diri B. Enhanced Feature Selection Using Genetic Algorithm for Machine-Learning-Based Phishing URL Detection. Applied Sciences. 2024; 14(14):6081. https://doi.org/10.3390/app14146081
Kolluru, V., Mungara, S., & Chintakunta, A. N. (2018). Adaptive learning systems: Harnessing AI for customized educational experiences. International Journal of Computational Science and Information Technology (IJCSITY), 6(1/2/3), 13–26.
Sakalle, V., Phulare, S., & Chaturvadi, A. (2020). WSN energy optimization using intelligent water drop genetic algorithms. International Journal of Advanced Research in Engineering and Technology, 11(12), 2449–2462.
Bayyapu, S. (2021). Bridging the gap: Overcoming data, technological, and human roadblocks to AI-driven healthcare transformation. Journal of Management (JOM), 8(1), 7-14.
Sánchez Céspedes, J. M., Espinosa Romero, A. P., Rodríguez Miranda, J. P. (2020). Artificial intelligence applied in agriculture. International Journal of Agriculture Research and Development (IJARD), 2(1), 40–46.
Can, Ş., & Gerşil, M. (2017). A literature review on the use of genetic algorithms in data mining. International Journal of Computer Engineering & Technology, 8(6), 67–76.
Vaniya, S., Solanki, B., & Gupte, S. (2011). Multi robot path planning algorithms: A survey. International Journal of Computer Science and Engineering Research and Development (IJCSERD), 1(1), 38–49.
Kolluru, V., Mungara, S., & Chintakunta, A. N. (2019). Securing the IoT ecosystem: Challenges and innovations in smart device cybersecurity. International Journal on Cryptography and Information Security (IJCIS), 9(1/2), 37–51.
S. Mohammadi; M. Babagoli. "A Hybrid Modified Grasshopper Optimization Algorithm and Genetic Algorithm to Detect and Prevent DDoS Attacks", International Journal of Engineering, 34, 4, 2021, 811-824.
Padmini, K., Khursheed, R. V. R., Keerthiga, M., & Fazlinmina, Z. (2019). Security enhancement using genetic algorithms. Journal of Emerging Technologies and Innovative Research (JETIR), 6(9), 19–22.
Bayyapu, S. (2020). Blockchain healthcare: Redefining data ownership and trust in the medical ecosystem. International Journal of Advanced Research in Engineering and Technology (IJARET), 11(11), 2748-2755.
Lakhno, V., et al. (2022). Multi-criterial optimization composition of cybersecurity circuits based on genetic algorithm. Journal of Theoretical and Applied Information Technology, 100(7), 1996–2006.
Kolluru, V., Mungara, S., & Chintakunta, A.N. (2020). Combating misinformation with machine learning: Tools for trustworthy news consumption. Machine Learning and Applications: An International Journal (MLAIJ), 7(3/4), 28–39.
Bhaskar, N., & Revathy, N. (2015). Genetic algorithm based method for identification of cybercriminal networks from online social media. International Journal of Engineering Research & Technology (IJERT), 3(13).
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Anto Merline Das (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.