Abstract

Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web. Therefore, security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks. The aim of this work is to provide efficient and effective healthcare web application security assessment. The study has worked with the hybrid computational model of Multi-Criteria Decision Making (MCDM) based on Analytical Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS) under the Hesitant Fuzzy (HF) environment. Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision. The proposed research endeavor will support designers and developers in identifying, selecting and prioritizing the best security attributes for web applications’ development. The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption, Authentication, Limit Access, Revoke Access, Data Validation, and Maintain Audit Trail. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security. The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications.

Highlights

  • The present day healthcare industry is one of the leading industries to adapt to the revolution of digitization

  • We presented Analytical Hierarchy Process (AHP) method based on hesitant fuzzy sets to assess the importance of security features in web-based applications, and we later estimated their analysis and influence on choices for related features using the Hesitant Fuzzy (HF)-TOPSIS approach

  • AHP-TOPSIS method based on hesitant fuzzy sets, is approached to make this work more corroborative and efficient

Read more

Summary

Introduction

The present day healthcare industry is one of the leading industries to adapt to the revolution of digitization. Switching from old paper-based system to digital data has made the health services accessible to everyone with the help of smart devices, internet connectivity and webbased applications. It is considered that e-health applications will reduce the healthcare service costs and minimize the extraneous consumptions [1]. The healthcare web applications provide provides efficient and usable services to its customers. There are various Electronic Health Record (EHR) web based systems available at present. These are owned by different service providers in different countries. The security of these web applications is a serious concern, mostly for the customers who share their sensitive and valuable data with the healthcare service providers by using these web-based applications

Objectives
Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.