Enhancing the Security of Information Systems Using Iot Technology

  • Methaq Talib Gaata Department of Computer Science, College of Science, Mustansiriyah University, Baghdad, Iraq
  • Yasmin Makki Mohialden Department of Computer Science, College of Science, Mustansiriyah University, Baghdad, Iraq
  • Nadia Mahmood Hussien Department of Computer Science, College of Science, Mustansiriyah University, Baghdad, Iraq
Keywords: System Software, Information Security, Password Authentication, Internet of Things, Mentcare Information System

Abstract

Psychiatric patient information system that is used in most mental health clinics is very important in dealing with patient records. However, the safety of such systems is a major issue since information being processed in such systems is often sensitive. This paper offers a new way of boosting the security of the Mentcare information system via the incorporation of IoT technology. The following figure demonstrates the components of the proposed security framework of the system which uses highly secure password generation algorithms that enable the system to generate passwords of different levels of complexities depending on the user’s preference. Such improvements guarantee exclusive safeguard mechanisms against illegitimate access since IoT provides a way of passing secure passwords to the right individuals in real-time. That has resulted in the overall decreases in hacking attempts by the unauthorized access and enhanced the encryptions that meet GDPR and HIPAA standards and practices fully integrated with IoT technology. Also, general enhancements have been made on Mentcare system with regard to the ease and speed in generating password, system response time and user satisfaction. In light of these findings, this study reaffirms the need to have IoT-advanced security protocols for medical information systems especially in mental health care where patients’ information needs to be well protected. The conclusions prove that in addition to increasing security, the proposed system optimizes the process of its functioning, which confirms that it is necessary to apply it to protect the health care information.

References

Abdellaoui, A., Khamlichi, Y. I., & Chaoui, H. (2016). A novel strong password generator for improving cloud authentication. Procedia Computer Science, 85, 293-300. https://doi.org/10.1016/j.procs.2016.05.236

Al Maqbali, F., & Mitchell, C. J. (2017, October). AutoPass: An automatic password generator. 2017 International Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE.

Althobaiti, M., Alrehaili, E., & Alzahrani, A. (2020). A novel approach for securing password-based authentication in cloud environments using multi-factor authentication. Computers & Security, 96, 101926. https://doi.org/10.1016/j.cose.2020.101926

Bhuyan, P., Deka, N., & Sarma, K. (2019). Cloud password security using biometric and dynamic password techniques. Journal of Computer Networks and Communications, 2019, 937453. https://doi.org/10.1155/2019/937453

Chen, Y., Guo, L., & Wang, H. (2020). Password policy enhancement using reinforcement learning in cloud environments. Journal of Cloud Computing, 9, 15. https://doi.org/10.1186/s13677-020-00164-8

Das, A., Bonneau, J., Caesar, M., Borisov, N., & Wang, X. (2014). The tangled web of password reuse. Network and Distributed System Security Symposium (NDSS), 14, 23-26. https://doi.org/10.14722/ndss.2014.23237

David, L., & Wool, A. (2021). An explainable online password strength estimator. In Computer Security–ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I 26 (pp. 285-304). Springer International Publishing.

Feng, H., Wang, H., & Zhang, Y. (2020). Security-oriented architecture for IoT password management. Security and Communication Networks, 2020, 2839146. https://doi.org/10.1155/2020/2839146

Glory, F. Z., Aftab, A. U., Tremblay-Savard, O., & Mohammed, N. (2019, October). Strong password generation based on user inputs. In 2019 IEEE 10th annual information technology, electronics and mobile communication conference (IEMCON) (pp. 0416-0423). IEEE. https://doi.org/10.1109/IEMCON.2019.8936178

Gokhale, P., Bhat, O., & Bhat, S. (2018). Introduction to IOT. International Advanced Research Journal in Science, Engineering and Technology, 5(1), 41-44.

Grechanik, M., McKinley, K. S., & Perry, D. E. (2007, September). Recovering and using use-case-diagram-to-source-code traceability links. In Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (pp. 95-104).

Hameed, S., & Khan, M. (2019). Enhancing password-based authentication systems using AI-driven algorithms in cloud computing. Future Internet, 11(8), 169. https://doi.org/10.3390/fi11080169

Hoang, T., & Rivas, P. (2021). Memorable Password Generation with AES in ECB Mode. In Advances in Security, Networks, and Internet of Things: Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (pp. 33-38). Springer International Publishing.

Islam, M. R., & Ramesh, K. (2020). Password generation strategies and multi-factor authentication for secure cloud computing. International Journal of Information Security, 19, 437–448. https://doi.org/10.1007/s10207-019-00470-5

Jain, N., & Agrawal, A. (2020). Multi-factor authentication methods to secure passwords in distributed environments. Journal of Information Security and Applications, 55, 102652. https://doi.org/10.1016/j.jisa.2020.102652

joo Fong, T., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). The coin passcode: A shoulder-surfing proof graphical password authentication model for mobile devices. International Journal of Advanced Computer Science and Applications, 10(1).

Joshi, R., & Kumar, R. (2019). A robust cloud security framework using a dynamic password generation model. Security and Privacy, 2(1), e52. https://doi.org/10.1002/spy2.52

Li, T., Wang, X., & Ni, Y. (2022). Aligning social concerns with information system security: A fundamental ontology for social engineering. Information Systems, 104, 101699.

Li, X., Zhao, X., & Jiang, Z. (2021). Cloud password security: An integrated framework based on deep learning and IoT. Future Internet, 13(1), 23. https://doi.org/10.3390/fi13010023

Murthy, B. N., & Reddy, V. V. (2020). Password strength improvement in cloud environments using AI-based encryption methods. Security and Communication Networks, 2020, 873563. https://doi.org/10.1155/2020/873563

Naik, P. G., & Naik, G. R. (2015). A Framework for Secure 3D Password Using Genetic Algorithm. International Journal of Advanced Research in Computer Science and Management Studies, 3(1).

Nanda, S., & Reddy, V. S. (2020). Efficient password encryption and protection mechanism in cloud environments. Journal of King Saud University-Computer and Information Sciences, 32(4), 437-446. https://doi.org/10.1016/j.jksuci.2019.01.005

Nikam, U. V., Misalkar, H. D., & Burange, A. W. (2018). Securing MQTT protocol in IoT by payload Encryption Technique and Digital Signature. https://doi.org/10.5120/ijca2018917391

Patel, D., & Prajapati, V. (2020). Enhancing password security in the cloud using advanced cryptographic methods. Journal of Cyber Security and Mobility, 9(1), 1-15. https://doi.org/10.13052/jcsm2245-1439.911

Pramanik, S., Singh, R. P., Ghosh, R., & Bandyopadhyay, S. K. (2020). A Unique Way to Generate Password at Random Basis and Sending it Using a New Steganography Technique. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 8(3), 525-531. https://doi.org/10.52549/ijeei.v8i3.831

Sharma, K., & Saini, N. (2019). Improved cloud password authentication based on quantum cryptography. Quantum Information Processing, 18(9), 1-16. https://doi.org/10.1007/s11128-019-2382-2

Singh, P., (2020). Password management in cloud environments using adaptive and cognitive algorithms. Wireless Personal Communications, 113(1), 453-470. https://doi.org/10.1007/s11277-020-07236-w

Sommerville, I. (2011). Software engineering 9th Edition. ISBN-10, 137035152, 18.

Tao, R., & Zhang, X. (2020). Password generation algorithms and security enhancements in IoT-based cloud systems. Journal of Network and Computer Applications, 164, 102688. https://doi.org/10.1016/j.jnca.2020.102688

Trafton, J. A., Greenberg, G., Harris, A. H., Tavakoli, S., Kearney, L., McCarthy, J., ... & Schohn, M. (2013). VHA mental health information system: applying health information technology to monitor and facilitate implementation of VHA Uniform Mental Health Services Handbook requirements. Medical Care, 51, S29-S36. https://doi.org/10.1097/MLR.0b013e31827da836

Wei, W., & Peng, Y. (2019). AI-based dynamic password management in cloud computing. Journal of Artificial Intelligence Research, 65, 135-148. https://doi.org/10.1613/jair.1.11602

Wu, H., & Wang, C. (2020). Reinforcement learning approaches to improve password security in cloud environments. IEEE Access, 8, 78715-78728. https://doi.org/10.1109/ACCESS.2020.2990804

Yang, S., Ji, S., & Beyah, R. (2017). DPPG: A dynamic password policy generation system. IEEE Transactions on Information Forensics and Security, 13(3), 545-558. https://doi.org/10.1109/TIFS.2017.2737971

Zafar, K., & Khan, Z. (2019). Advanced password generation systems using blockchain in cloud computing environments. Computers & Security, 85, 76-86. https://doi.org/10.1016/j.cose.2019.04.005

Zhou, Y., Li, Y., & Zhang, X. (2021). Password authentication techniques in cloud computing using quantum-resistant cryptographic algorithms. IEEE Transactions on Cloud Computing, 9(3), 734-748. https://doi.org/10.1109/TCC.2020.2989394

Published
2024-08-05
How to Cite
Gaata, M. T., Mohialden, Y. M., & Mahmood Hussien , N. (2024). Enhancing the Security of Information Systems Using Iot Technology. Journal La Multiapp, 5(4), 322-335. https://doi.org/10.37899/journallamultiapp.v5i4.1308