Abstract

There has been a phenomenal increase in the use of web applications in every facet of human endeavor. From education, healthcare, banking, business to governance and so much more now depends on secure web applications. This accelerated growth in the use of web applications has led to increase in the complexity of security and hence the present day developers have to contribute more significantly towards meeting the users' requirements. However, the high security of web application is not yet efficacious enough because the durability of web application is not as much as it should be. In this context, it is important to consider that ensuring sustainability of security at the early stage of web application development process may reduce costs and rework entailed during the development of secure and durable web applications. Hence, there is a need to focus on increasing the life-span of a secure web application. Quantitative estimation of security-durability plays a significant role for improving the life-span of a secure web application. Thus, to optimize the security assurance effort for a specific life-span, this paper is aimed at estimating the security-durability of web application. For estimating security-durability, this paper uses a hybrid approach of Hesitant Fuzzy (HF) sets, Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) techniques. The effectiveness of the combined approach of HF-AHP-TOPSIS is tested for its accuracy in a web application for an academic institution, Babasaheb Bhimrao Ambedkar University in India. To check the sensitivity of outcomes, authors of the paper have taken altered forms of the University's web application. The result established contains the security-durability assessment. This work seeks to be an important contribution in enhancing the security-durability and would be beneficial for experts who are working in this domain.

Highlights

  • The all-pervasive use of web applications in the present digital generation has made them more vulnerable to attacks

  • VOLUME 8, 2020 the contributors recommend a method of Hesitant Fuzzy (HF) analytic hierarchy process (AHP) in combination with Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) for assessing security-durability

  • This study proposes an integrated method hesitant fuzzy (HF) for crisp decisions consisting of Analytic Hierarchy Process (AHP) for weighing the decision criteria, and TOPSIS for selecting the most appropriate factor of security-durability of web application

Read more

Summary

INTRODUCTION

The all-pervasive use of web applications in the present digital generation has made them more vulnerable to attacks. Decision-makers must know the factors that help to make security durable, but must identify the most justifiable and usable factors for taking the most knowledgeable decision In this context, VOLUME 8, 2020 the contributors recommend a method of Hesitant Fuzzy (HF) analytic hierarchy process (AHP) in combination with Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) for assessing security-durability. The assessment of security-durability attributes with effective techniques is important to improve the quality of web application and its services [8]. To measure the impacts of the security-durability through the hybrid methodology of hesitant fuzzy based AHPTOPSIS, web applications of BBA University have been taken.

RELATED WORK
VIII. DISCUSSION
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.