sis 18: e37

Research Article

DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative

Download62 downloads
  • @ARTICLE{10.4108/eai.13-1-2022.172816,
        author={Md Tarique Jamal Ansari and Alka Agrawal and Raees Ahmad Khan},
        title={DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative},
        journal={EAI Endorsed Transactions on Scalable Information Systems: Online First},
        volume={},
        number={},
        publisher={EAI},
        journal_a={SIS},
        year={2022},
        month={1},
        keywords={Durable Security, Web-Applications, Cyber-security, Security risk, fuzzy TOPSIS},
        doi={10.4108/eai.13-1-2022.172816}
    }
    
  • Md Tarique Jamal Ansari
    Alka Agrawal
    Raees Ahmad Khan
    Year: 2022
    DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative
    SIS
    EAI
    DOI: 10.4108/eai.13-1-2022.172816
Md Tarique Jamal Ansari1,*, Alka Agrawal1, Raees Ahmad Khan1
  • 1: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, Uttar Pradesh, India
*Contact email: tjtjansari@gmail.com

Abstract

Adversaries always eager to take advantage of flaws in emerging healthcare digital solutions. Very few authors discussed durable application security. Therefore there is a need for a durable security mechanism that must be adequately efficient, is reliable, and defend critical data in an emergency situation. It ensures that the application can be serviced and meet the needs of users over an extended period of time. This paper presents the fuzzy TOPSIS based method to evaluate the behavioural impact for durable security in the context of the Digital India initiative. This paper also presents novel DURASec blueprints for trustworthy and quality healthcare application development.. Even though the advantages of such technologies may outweigh the dangers, hospitals, drugstores, clinics, practitioners, the drug industry as well as medical device manufacturers, should be prepared to identify and minimize security threats in order to protect sensitive healthcare data.