• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications

    2021-12-16 06:39:08FahadAlzahrani
    Computers Materials&Continua 2021年3期

    Fahad A.Alzahrani

    Computer Engineering Department, Umm Al-Qura University, Mecca,24381, Saudi Arabia

    Abstract:Usability and security are often considered contradictory in nature.One has a negative impact on the other.In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished.Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications.In the same league,the present research endeavour is premised on the usable-security of healthcare web applications.For a compatible blend of usability and security that would fulfill the users’ requirments,this research proposes an integration of the Fuzzy AHP-TOPSIS method for assessing usable-security of healthcare web applications.Since the estimation of security-usability accrately is also a decision making problem, the study employs Multiple Criteria Decision Analysis(MCDA)for selecting the most decisive attributes of usability as well as security.Furthermore, this study also pinpoints the highest priority attributes that can strengthen the usable-security of the healthcare web applications.The effectiveness of the suggested method has been tested on the healthcare web applications of local hospitals in Mecca,Saudi Arabia.The results corroborate that Fuzzy AHP-TOPSIS is indeed a reliable technique that will help the developers to design a healthcare web applications that delivers optimum usable-security.

    Keywords: Decision making; healthcare web application; usable-security; fuzzy ahp;fuzzy topsis

    1 Introduction

    Usability and security have become two significant priorities in the present scenario for developing web applications for healthcare sector because the end users want to invest their resources only in those healthcare web applications that afford them utmost security while retaining the ease of use [1].However, the integration of usability and security has various contradictory factors [2].Security is inconvenient and this inconvenience has a negative impact on the usability of the healthcare web applications [2].Researchers have been concerned over the past five years about usable-security of healthcare web applications [1-6].In addition, some experts in technological research and development claim that human-factor in not a reliable aspect while securing the healthcare web applications in the design phase.In 2011,Carrión et al.noted that 80-90%of security related issues are caused by vulnerabilities related to human factors[4].Since its foundation,healthcare web applications and end-user’s data integrity have been at high risk.Therefore,users with different points of view are considered for both usability and security.It is the user who verifies the usability in perspective of usability of healthcare web applications.However, at times, the customers themselves are the causes for the vulnerabilities in security perspective of healthcare web applications.

    Growing use of healthcare web applications in the present day lifestyles has forced individuals to be online and save their medical information on it.Passwords, authentication and data integrity are the focal points for usable-security of healthcare web applications [5,6].The architecture also affects the capability of users to safely execute their responsibilities.For instance, a difficult CAPTCHA can affect usability,but it authenticates the consumer for security purposes [7,8].Researchers have worked on its various characteristics for ensuring security of healthcare web applications with longer usability.Similar efforts to improve usability are also underway.But insufficient mathematical or empirical efforts have been made to confirm the usable-security of healthcare web applications [4-6].Though, the usability and security characteristics are contradictory, the security and usability characteristics selected in this work will have only a positive effect on the overall usable-security of healthcare web applications[9,10].

    Multiple Criteria Decision Analysis(MCDA)area offers multiple procedures,approaches and tools to resolve the conflict between altered characteristics of an issue in question [11].As per the results of the evaluation procedure, the decision-makers can make appropriate decisions.In order to make the most responsive choice, the decision-makers should not only know the characteristics which contribute to usable-security of healthcare web applications, but should also be able to point the highest useful characteristic.Given this backdrop, usable-security assessment framework is proposed in this work.To ensure the feasibility of this approach, the research team has evaluated the suggested technique on local hospitals of Mecca,Saudi Arabia.

    The estimation of usable-security characteristics of healthcare web applications with an appropriate methodology plays a noteworthy role in enhancing the quality of the services.Furthermore, the selection and evaluation of usable-security of healthcare web applications is a decision-making problem [11,12].In this contribution, the authors have opted for the fuzzy-based integrated approach of the Analytic Hierarchy Process (AHP) and Technique for Preference Order by Similarity to Ideal Solution (TOPSIS)procedures [12].This integrated approach provides optimum results and would be highly accurate for evaluating the impact of usable-security characteristics.

    Many practitioners have been successful in assessing the constant outcomes by using the Fuzzy-TOPSIS method[13,14].Unfortunately,specific guidelines have not yet been given for assigning quantitative from qualitative weights of characteristics.Fuzzy-AHP method supports the practitioners’attempts by analytically weighting the characteristics, thereby removing any ambiguity and vagueness in decision.Furthermore by using the pair-wise comparisons and fuzzy numbers, the consistent characteristic weights can be obtained.But the Fuzzy-AHP method is inefficient due to the repetitive calculations and a vast number of pair-wise comparisons for a maximum number of alternatives.Hence, the authors suggest that this integrated approach should be used without complicated calculations to determine the effect of alternatives in a fair amount of time and that too with slight effort.

    This empirical contribution is divided into five segments:Remaining first part is devoted to the research work performed so far in the field of usable-security of healthcare web applications.The second section concerns usable-security and the associated characteristics and methodology.Its execution has been defined in Section 3.Section 4 includes a summary of the findings.Conclusion has been covered in Section 5.

    2 Previous Work

    Various studies have already been done on the usable-security assessment by using different approaches and techniques.Alongside fuzzy AHP,TOPSIS and fuzzy AHP with TOPSIS techniques have also been used in various research areas to solve the Multi Criteria Decision Making (MCDM) problems.Following are some of the latest and pertinent studies:

    Rajeev Kumar et al.[11]—This research study evaluated the usable-security using multi-level fuzzy AHP technique.In this study, the authors have integrated five security criteria and four usability criteria and have applied fuzzy AHP hybrid technique to evaluate usable security.The utmost significant element found between the nine usable-security elements is the user-error protection.The study concludes that the fuzzy AHP provides more efficient results than AHP.A.Mardani et al.[12]—This study applied hybrid approach of Delphi-AHP and fuzzy TOPSIS for the selection of renewable-energy resources.Four main factors with 20 sub-factors have been considered to estimate five renewable-energy resources for electricity generation.Authors applied Delphi method to determine and choose the best relevant factors to select renewable energy resources.Thereafter, AHP is applied to get the weights of factors and the subfactors of the decision-model.For final assessment, the fuzzy TOPSIS technique is applied to find the optimal renewable energy resource from the given five renewable energy alternatives.

    Ismailova[13]—This study uses fuzzy ANP and TOPSIS procedures for the most appropriate software selection.With four alternatives Soft1, Soft2, Soft3 and Soft4, Security, reliability, user friendly, and maintenance are taken as identified criteria for software selection assessment.Fuzzy-ANP is used to evaluate characteristic weights and also to assess the quality of interdependence among them.After that,the weights of characteristics are provided as inputs to the TOPSIS model to determine the final alternative ranking.Toll et al.[14]—This research study identified the most suitable technique of authentication for smart phone banking service by using ANP procedure.Authors of this paper considered three criteria (security, convenience and cost) with eleven sub-elements, three sub-networks and four alternatives to create the whole network.The outcome of the research indicated that biometric is the most suitable in the security dimension, OTP is the most suitable in the convenience aspect, and public key certificate is most appropriate in the coastal aspect.OTP has been discovered to be the optimal authentication technique in overall performance in safety,convenience and cost.

    Lyon et al.[15] devised a model to estimate usable-security by using F-AHP to overcome the gap between software security and software usability.Three attributes of security (confidentiality, integrity and availability) and three attributes of usability (effectiveness, efficiency and satisfaction) are collectively considered for usable security evaluation.After deriving weights and priority by using fuzzy-AHP technique, Satisfaction of the user gets the highest priority among all these attributes.To validate the accuracy of results, AHP method is used as a comparative technique with fuzzy-AHP.W.Bai et al.[16]—In this research study, the authors use neutrosophic aggregation operator to sum up all the opinions of experts and Euclidean-distance has been applied to calculate the distances of every alternative from positive-ideal solution and from negative-ideal solution.Four alternatives and six criteria are taken in this study for evaluation.Finally authors of this study find that for multi attribute decision making problems,TOPSIS method with neutrosophic set information has very high chances of success.

    Dutta et al.[17]proposed a hybrid model for estimating carbon performance of suppliers by integrating F-ANP and F-TOPSIS methods for carbon-management of a green-supplier selection system.Thirteen criteria are identified for evaluating the carbon-performance of suppliers.Among these 13 criteria,carbon-governance, carbon-policy and carbon-reduction targets are considered most important criteria.The study also found that the devised hybrid model helped in determining the best supplier in carbon management.Gordieiev et al.[18]—This study is on APIs usability for ensuring security of software.Authors of this work identified 11 definite usability factors to examine the APIs security and proposed an extensive model to address the current space of API usability.Besides, for future applications, the authors proposed the mechanism to design APIs security to ensure more usable-security.

    Thigpen [19], by using fuzzy ANP method, calculated the weights and interdependence of eight important criteria to evaluate specific web sites of E-commerce.Authors of this study found that satisfaction (weight = 0.238) and security (weight = 0.228) criteria are important factors for E-commerce evaluation.Al-Zubaidie et al.[20]—In this study, AHP is applied to assess the web sites of Indian E-commerce.Later fuzzy-TOPSIS is applied for alternative ranking.This study’s results found that Amazon has got the highest rank followed by Flipkart and Ebay.Ronquillo et al.[21]devised a model by using Analytic Hierarchy Process and fuzzy-TOPSIS methods for cloud-service selection.Four cost criteria and six benefit criteria are considered for the selection of cloud service with six alternatives.From the final results, it was found that Softlayer is the most feasible cloud service provider followed by Amazon web services and Digital Ocean.

    After reviewing these related works,the contributors established that interactions between usability and security and their characteristics are integral and yet there isn’t a standardized procedure to produce a secure and usable healthcare web applications.Maintaining usability and security is also a challenge in decisionmaking problem for the user’s sake and medical data responsiveness.Hence, the present study attempts at filling this gap in the analysis.This study suggests using Fuzzy based AHP-TOPSIS integrated method to solve all the problems of decision-making in order to achieve optimum outcomes.Estimated findings from this approach will be useful for security experts who can enlist the usable-security recommendations during development process.

    3 Usable-Security of Healthcare Web Applications

    Most of the healthcare web applications have frequently failed because of the lack of the end user’s responsiveness and their limited knowledge.A National Research Council Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure cites that about 60% of small corporations were heedless of the malicious attacks and generally overlooked the small attacks that are often the originators of larger and serious attacks [22].That’s why the customers in this chain are considered to be the fragile link.Healthcare web application usable-security is a crucial component for the overall system security,but is still overlooked during development.

    Zaidan et al.noted that usability and security are opposite to one another [23].While the security of healthcare web applications is intended to make uninvited actions, the purpose of usability of healthcare web applications is to make it easier for the user to do the necessary actions.It is unfortunate that security and usability are observed as each other’s opponents.Thus, completing both at the same time in any stage of healthcare web applications development poses a challenge.Security as well as usability has different characteristics that in some cases influence each other.Therefore, in the case study for healthcare web applications, contributors of this research work have measured the vital characteristics of security and usability in a single structure to test the usable-security.In this row, in their recently published work [1], the contributors proposed a hierarchy of usable-security characteristics which is shown in Fig.1.

    The characteristics that feature in Fig.1 are significant for improving usable-security of healthcare web applications.The explanation given for each characteristic is as follows:

    ●Usable-Security: As stated above, users of healthcare web applications are seen as the fragile connection.Presently, security controls fixed in the device use the customer’s incapacity to comprehend the security as a shattered wall [24,25].Therefore, planning usable-security is an imperative aspect of developing secure healthcare web applications.Usable-security designs a secure healthcare web application, thus making it easy for the end user to access it.

    ●Security(A1):Security of healthcare web applications is the awareness to build web applications in such a way that it protects itself from the malicious attacks[26,27].Designing security of healthcare web applications is a complex procedure at early stage of development.Malicious intruders can hack systems through defects of website,therefore the detection and repair of these defects of website can only warranty highest security.Various methodologies, mechanisms, metrics, etc., have been proposed and implemented to prevent malicious attacks.Omer Tripp et al.estimated the security through automated tools in their study, and concluded that they decreased usability of healthcare web applications[27].In 2019,Ouissem Ben Fredj announced the SPHERES:The system security for a single web server for hospital management system which is essential and crucial [28].There are several benefits to it over other systems.Though such structures and practices secure the healthcare web applications, they decrease usability.Therefore, confirming usability with growing security of healthcare web applications is at the core of examination because the end user is the individual for whom the services need to be user centric.

    ●Usability(A2):Usability of healthcare web applications is the ease of use and understanding.In one of her studies, a usability specialist, A.Agrawal states that, “Security topographies that have human interaction in their use should be informal to use to improve usability topographies” [29].Because of the increased complexity of the security architecture, usability decreases.Thus, the developers must prioritize both security and usability.

    ●Confidentiality (A11): Confidentiality of healthcare web applications is haphazardly similar to medical data privacy.It is a difficult procedure to avoid uninvited individuals from breaching the confidentiality [30].Numerous stages and methods have been undertaken previously to enhance security, while making the features more applicable for the users.But sometimes security of medical data can harm usability of healthcare web applications or it can even increase usability.Therefore this characteristic is measured significantly for usability as well as security.Education for confidentiality in research is to enhance security while retaining optimum device usability.

    ●Integrity(A12):Maintaining integrity and security includes ensuring the regularity and functionality of the healthcare web applications throughout their entire life.Sensitive medical data should not be modified, and care must be taken to ensure that the medical data enters the recipient as it was when it was sent [31].In addition, the stages taken to guarantee usability are increasing the sophistication of end user’s healthcare web applications [11].Therefore, to ensure the usablesecurity of healthcare web applications,integrity must be taken into account in this regard.

    ●Accountability (A13): Accountability is a vital aspect of a security design of healthcare web applications during the development process [32,33].The accountability means that each individual who works with the hospital data should have clear accountabilities for ensuring the security of the hospital data; the individual should also be accountable for the information created or distributed.

    ●Sustainability(A14):Sustainability is described as a quantity of how constant a design is to secure a web application to recommended accountabilities[34].In addition,web application sustainability can be distinct as the capability of constructing a web application in a sustainable way[35].Additionally,sustainability displays a vital character for high security design.

    ●Durability (A15): Durability of secure healthcare web applications is comparatively a novel theory which has only gained prominence during the 21st century [36,37].Security-durability can be described as the life-span of healthcare web applications for a particular life-span.Securitydurability is influenced by usable-security, as the safety time limit has a huge consequence on the overall usable-security of healthcare web applications.

    ●Appropriateness Recognizability (A21): Recognizability of appropriateness is the characteristic by which customers can determine whether or not the security offered fits their needs [38,39].It is the end user who decides if security of healthcare web applications is acceptable.This also affects security although it is a mere principle of usability.

    ●Operability (A22): Operability is a characteristic which determines the ease of healthcare web applications operations.Security methodologies and mechanisms on healthcare web applications pose challenges in system operability [40,41].Thus, it is essential to consider operability as an important characteristic of usable-security when evaluating security and usability of healthcare web applications together.

    ●User Error Protection (A23): Protection or the prevention of user errors is the characteristic that guarantees that the healthcare web application itself secures the program from the errors [42].Preventing the user from creating mistakes additionally enhances the security of the healthcare web applications.This circumstance highlights the necessity to recognize user error protection as a characteristic in usable-security estimation.

    ●User Interface Aesthetics (A24): User Interface Aesthetics (UIA) is the characteristic that confirms user interface and allows the user interaction to be pleasing and satisfying [43].Increasing the security with sophistication can have a serious effect on UIA.This is the reason why the authors have selected the UIA is in the characteristics hierarchy of usable-security characteristics for calculating healthcare web application usable-security.

    ●Accessibility (A25): Accessibility is the characteristic that enlists that customers with the broadest range of topographies can use the healthcare web applications [44].The security and their sophistication affect usability.Usable-security evaluation cannot be done without the significant contribution of usability of healthcare web applications.

    ●Identification(A111):Identification occurs when a user name is asserted by an individual,program or method[45].In all the other words,it is a representation of one’s individuality where the user or any other person is unaware of it.

    ●Authentication(A112):It is called the method of identifying a customer whose individuality is based on the password and name as an authentication[46].Authentication agrees whether the individual is honest and is indeed the person he/she claims to be.It is a mere security principle,but usability of the framework depends on the use of the password as well as identity.This could affect the complete healthcare web application usable-security; this is why it should be taken into account when determining the usable-security.

    ●Authorization (A113): Authorization is the procedure through which privileges are granted for accessing the resources of the device.It determines the resource control domain of a user, based on their authentication [47].

    ●Encryption(A114):Encryption is a process of converting plaintext into ciphertext to ensure that the digital data is secured and confidential [48].

    ●Data Disposal(A115):Unnecessary Data Disposal means that if the data is no longer used,it must be destroyed or deleted properly so that the data removed cannot be recovered and misappropriated[48].

    ●Validation (A121): Data validation or confirmation ensures that the data is transmitted to relevant applications, programs or services in a clear, accurate and consistent manner [47].It can be measured as a proportion of valid data within the range of the available data.

    ●Completeness(A122):The completeness of the information is a measure of the thoroughness of the accessible data[41]and ensures that there is really no lack of any important or necessary data item related to the full description of the state of the action or individual under consideration [42].

    ●Energy Consumption(A141):Sustainable-security energy consumption is the amount of power used by a web application when conducting its security functions fulfills the security needs[43].

    ●Perdurability (A142): Perdurability is the concept of generating long-lasting, adaptable and recyclable, sustainable application security, i.e., going to increase those factors which make the web application last long, with the ability to adapt to change without losing its quality-related functionality[44].

    ●Web-based resource Optimization (A143): Web-based resource management is the collection of theories and practices used to align the available resources, such as human resources, equipment,and finance, with the organization’s security criteria to achieve the well-known sustainability and safety goals.Optimizing resources is achieving the required outcomes within the specified time and budget with minimum resource usage [45].

    The authors have named hierarchy characteristics and sub-characteristics as A1 and A2 for security and usability,respectively.In addition,A11,A12,A13,A14 and A15 are used as second level characteristics in security perspective.A21, A22, A23, A24, and A25 are used as second level characteristics in usability perspective.Further, A111, A112, A113, A114, A115, A121, A122, A141, A142, and A143 are used as third level characteristics in confidentiality,integrity and sustainability perspective,respectively.

    In addition, its characteristics should be defined and set up in a classified way to solve it by using the MCDA approach to address the issue of usable-security assessment [1,11].In this contribution, the Fuzzy AHP-TOPSIS methodology is adopted for usable-security estimation of healthcare web applications.The next segment outlines the approach to follow.

    4 Methodology

    Most of the practitioners have tried to tackle the gap between usability and security with its estimation.Among these efforts,usability,security and integration of both for healthcare web applications is the locus for present and future research investigations in healthcare perspective [11].Furthermore, multiple criteria decision-making topics repeatedly occur in real time scenarios of security and usability [11,13].From the point of literature review,it is clear that there are multiple methods available to tackle such situations in real life [16,19].But because of its hierarchical nature of dependencies of attributes, for usable-security estimation, AHP seems to be a very appropriate technique than the other MCDM approaches [21,22].To reduce the ambiguity and imprecision among the decisions, the authors analyzed that AHP alone is not efficient and that AHP should be combined with some other method to improve its efficiency [11].Moreover, AHP contains an ambivalent decision scale which lessens its efficiency and Fuzzy logic has its own disadvantages [16].Combining both the methods gives precise results but in big size of data situations this Fuzzy-AHP method is insufficient.Hence, a unified AHP, TOPSIS and Fuzzy technique is an extraordinary procedure that might aid in proficient alternative consideration.Methodology of Fuzzy AHP integrated with TOPSIS procedure is shown in following section:

    Fuzzy AHP:Fuzzy AHP methodology is used to choose the best option in selection problems where the decision is hard to formulate.Fuzzy logic with AHP is a valued procedure and in this method every characteristic can be observed by using hierarchy.Methodology of Fuzzy-AHP transforms the goals into a tree shape.Fig.1 provides the tree shape.This hierarchy structure is diagramed by specialists’observations [16].After the creation of hierarchy of characteristics, the next segment of this study defines the membership function such as Triangular Fuzzy Number (TFN).Through the help of the individual characteristic’s influence on diverse characteristic, the pair-wise comparison of each set of categorized aspiration acts as a vital agent in evaluation.The opinions retrieved from practitioners were in linguistic format.Hence, the next phase involved transforming these language based values into corresponding numeric information and membership function.There are numerous kinds of membership functions which include Generalized Bell, Gaussian, triangular, Trapezoidal fuzzy numbers, and many more.For this work, the authors chose to opt for triangular membership functions (Range: 0 to 1) [19,23-25].This paper uses TFNs because of its simplicity to handle data uncertainty [26-28].In addition, the subjective scores are classified as Similarly important, uncertainly important, intensely important, etc., and their corresponding numerical values are classified as 1, 2, ………..9, correspondingly.Eqs.(1) and (2) show a fuzzy number called T on Fz which is Triangular Fuzzy Number:

    Limits of Lower, middle, and higher are defined as lw, md, and hg.Fig.2 also applies to triangular membership features.

    Figure 2: Triangular fuzzy numbers

    Triangular Fuzzy Numbers,i.e.,TFN(lw,md,hg).Practitioners and experts’decisions linguistically are done by the scale provided in Tab.1[29,30].The Eqs.(3)-(6) are used to change the linguistic values from numeric values to corresponding TFN[31-34] which are further identified as (lwij, mdij, hgij) where, lwij is lower, mdij is middle, and hgij is higher.

    Table 1: TFN scale

    Jijk in the above Eqs.(3)-(6), demonstrates the proportional meaning of two characteristics for each other (i and j shows specialist or decision maker Ex).Geometric Mean (GM) is used to calculate mean of the specialist’s decision for a particular conclusion.From the above calculation, the TFN standards are obtained and matrix comparison for a fuzzy pair-wise is now accumulated using Eq.(7) in the n×n matrix method.

    where (kij^k) represents the primary choice of the ith characteristic by the decisions expert over the jth attribute.In case of more than one expert,Eq.(8)is used to calculate the result.

    Comparison matrixes for overall characteristics are evaluated from Eq.(9).

    To calculate each characteristic’s fuzzy GM(Geometric Mean)and fuzzy weights,Eq.(10)is used by the contributors as given follows:

    Use Eq.(11) to calculate the fuzzy weight of the characteristic.

    Eqs.(12) and (13)are used to calculate the average and uniform weight requirements.

    In addition,the Center of Area(COA)method is used with Eq.(14)to estimate the BNP value of each characteristic’s fuzzy weights.

    Fuzzy TOPSIS: TOPSIS is a multi-standard collection problem-making with P alternatives as a geometric structure of P points within the n-dimensional target area.The approach used in this research work is based on the idea that a substitution alternative has the shortest and longest distance to the Positive-Ideal Solution (PIS) and the Negative-Ideal Solution (NIS), respectively, for optimal and less ideal solutions [22,23,35-38].Specialists typically experience problems while associating a specific rank with a given characteristic [24].TOPSIS assigns precedence for the relative strengths of the trait to accurate numbers for consistency with significant-world fuzzy environment.Furthermore, a fuzzy-based approach to AHP-TOPSIS is especially suited for real issue-solving group decision-making in flowing environments.The very main stage is to determine weights for performance indicators.Using Eqs.(1)-(12), this work uses Fuzzy AHP to achieve weights.Subsequent step is to produce the fuzzy decision matrix and select the ideal linguistic variables as characteristic from Eq.(15) and Tab.2.

    Table 2: Rating scale

    Using the Eq.(17)can then achieve the normal form.

    Alternatively, we should set the finest anticipated level= 1, 2,.N is 1; else the poorest is 0.The normalizedremains TFNs.TFN-like normalization technique can be done.The weighted standardized decision matrix (Q) is enumerated using Eq.(18).

    Distance of every individual alternative is calculated from FPIS and FNIS,using the area compensation technique given in Eqs.(21) and(22).

    Further,the subsequent step is to calculate the closeness coefficients(Cand advance the alternatives to meet each characteristic’s objective amounts.Distance to the optimal solution was calculated after measuringof each alternative.Eq.(23)is used in this phase to solve distances to an ideal solution.

    5 Numerical Analysis

    Subjective assessment is usually sufficient to determine the usable-security of healthcare web applications.Numerically, it is complicated to perform usable-security estimation of healthcare web applications.In the proposed study, the contradictory facets of security and usability are pooled together to determine the overall usable-security of healthcare web applications.Lately, with great effort and success, developers and researchers have adopted the security and usability strategies [25,26,39-41].Organizations are also looking for high accessibility of healthcare web applications with preventable security.In fact, the regulation of usable-security requirements performs a considerable portion of usablesecurity [27,28,42-45].This research work therefore offers usable-security assessment by using a fuzzy based decision making AHP-TOPSIS methodology.

    From their previous work mentioned in Section 3 of the paper,contributors have followed the usablesecurity classified characteristics.A close grouping structure of usable-security characteristics is shown in Fig.1, from the discussion in previous sections.For the purpose of gathering the data, this article has taken opinions from seventy specialists via questionnaires (including questions related to various usablesecurity characteristics) from academia, hospitals and various companies [46-49].The results are obtained by using the Eqs.(1)-(23)and Tabs.1 and 2.Usable-security estimation was calculated as follows:

    From Eqs.(1)-(9) and Tab.1, contributors translated the language based scores into corresponding numerical scores and aggregated TFNs.TFNs scores are determined as:

    The matrix for pair-wise comparison of the characteristics of level 1 is determined by using Eq.(10)and Tabs.3-8 show the same process.

    Table 3: Fuzzy based combined matrix for pair-wise comparison at level 1 for usable-security

    Table 4: Fuzzy based combined matrix for pair-wise comparison at level 2 for security

    Table 5: Fuzzy based combined matrix for pair-wise comparison at level 2 for usability

    ?

    Table 6: Fuzzy based combined matrix for pair-wise comparison at level 3 for confidentiality

    ?

    Table 7: Fuzzy based combined matrix for pair-wise comparison at level 2 for integrity

    Table 8: Fuzzy based combined matrix for pair-wise comparison at level 2 for sustainability

    Eqs.(11)-(13)are used to estimate the weights in fuzzified form of characteristics;the assessment of the weight technique is shown as follows:

    =[(1.000000×0.305000)1/2,(1.000000×0.389000)1/2,(1.000000× 0.561000)1/2]

    =(0.305000)1/2,(0.389000)1/2, (0.561000)1/2=(0.552270,0.623700,0.749000)

    Likewise, we can get the other:as:= (0.891250,1.285000,1.639000)

    One can consider the weight of each characteristic using the Eqs.(14)-(16):

    Equally,we obtained the remaining:= (0.617415210,0.673233570,0.686348600).

    In addition,the Best Non-Fuzzy Performance Value(BNP)of each characteristic is determined with the aid of Eq.(14), as follows:

    Tab.9 shows the other characteristics weights which are calculated and which show the independent and dependent weight of characteristics throughout the hierarchy.Tab.9 presents the dependent weights of each characteristic of usable-security in relation to healthcare web applications.

    Table 9: Overall weights through the hierarchy

    Table 9 (continued).First level characteristic Local weights of first level Second level characteristic Local weights of second level Final weights of second level Third level characteristic Local weights of third level Overall weights of third level BNP Final ranks A2 0.617420 0.673230 0.686350 A21 0.021960 0.021960 0.022210 0.013560 0.014790 0.015240-- 0.013560 0.014790 0.015240 0.022040 10 A22 0.204950 0.227680 0.282510 0.126540 0.153280 0.193910-- 0.126540 0.153280 0.193910 0.038380 7 A23 0.027050 0.033170 0.041470 0.016700 0.022330 0.028470-- 0.016700 0.022330 0.028470 0.033900 8 A24 0.153860 0.179000 0.241900 0.095000 0.120510 0.166030-- 0.095000 0.120510 0.166030 0.091590 3 A25 0.489720 0.514380 0.538190 0.302360 0.346300 0.369390-- 0.302360 0.346300 0.369390 0.014100 15

    The findings from the result review Tab.9 indicate that A121, the Validation, is the top priority.The second feature of the precedent is Encryption of healthcare web applications and so on.Thereafter, we determined the characteristic-related impacts of usable-security in alternative.Ten successive projects of healthcare web applications developed for local hospitals of Mecca, Saudi Arabia, were used to test the usable-security.HS 1, HS 2, HS 3, HS 4, HS 5, HS 6, HS 7, HS 8, HS 9 and HS 10 denote the ten healthcare web applications of different projects.All projects require exceptional usable-security of healthcare web applications due to very sensitive hospital information [50-53].Tab.2 was used by specialists to take the linguistic data of the ten alternatives.Authors aggregated opinions in TFN with the aid of Eqs.(1)-(6), as given in Tab.10 and assessed regularized matrix for fuzzy decision with the help of Eqs.(18)-(20) as delivered in Tab.11.Authors evaluated the weighted decision matrix for normalized fuzzy with the help of Eq.(21) as given in Tab.12.Additionally, authors estimated the fuzzy satisfaction degree and fuzzy gap degree with the help of Eqs.(22) and (23)as given in Tab.13 and Fig.3.

    Table 10: Subjective comprehension tests of linguistic evaluators

    Table 10 (continued).Usable-Security Characteristics/Alternatives HS 1 HS 2 HS 3 HS 4 HS 5 HS 6 HS 7 HS 8 HS 10 HS 10 A114 4.270000,6.270000,8.140000 2.820000,4.820000,6.820000 3.180000,5.180000,7.100000 A115 5.360000,7.360000,9.120000 3.730000,5.730000,7.550000 2.450000,4.450000,6.450000 A121 4.640000,6.640000,8.550000 3.000000,5.000000,7.140000 2.180000,4.090000,6.140000 A122 3.120000,5.000000,7.140000 2.450000,4.450000,6.450000 3.550000,5.550000,7.450000 A13 2.820000,4.640000,6.640000 1.910000,3.730000,5.730000 1.180000,2.820000,4.820000 A141 3.000000,5.000000,7.140000 2.180000,4.090000,6.140000 0.820000,2.270000,4.270000 A142 3.550000,5.550000,7.450000 1.820000,3.730000,5.730000 2.450000,4.270000,6.270000 A143 5.120000,7.140000,8.720000 3.150000,5.150000,6.910000 2.820000,4.640000,6.640000 A15 4.280000,6.370000,8.370000 2.450000,4.450000,6.450000 2.910000,4.640000,6.550000 A21 4.270000,6.270000,8.140000 2.820000,4.820000,6.820000 3.180000,5.180000,7.100000 A22 5.360000,7.360000,9.120000 3.730000,5.730000,7.550000 2.450000,4.450000,6.450000 A23 4.640000,6.640000,8.550000 3.000000,5.000000,7.140000 2.180000,4.090000,6.140000 A24 3.120000,5.000000,7.140000 2.450000,4.450000,6.450000 3.550000,5.550000,7.450000 1.450000,3.070000,4.910000 0.910000,2.450000,4.450000 2.820000,4.640000,6.640000 1.820000,3.730000,5.730000 4.280000,6.370000,8.370000 4.270000,6.270000,8.140000 5.360000,7.360000,9.120000 1.550000,3.180000,5.180000 1.450000,3.000000,4.910000 1.450000,3.070000,4.910000 0.910000,2.450000,4.450000 2.820000,4.640000,6.640000 1.820000,3.730000,5.730000 0.820000,2.270000,4.270000 2.450000,4.270000,6.270000 1.910000,3.730000,5.730000 1.640000,3.550000,5.550000 1.450000,3.070000,4.910000 2.820000,4.640000,6.640000 3.000000,5.000000,7.140000 1.450000,3.180000,5.180000 1.180000,2.820000,4.820000 0.820000,2.270000,4.270000 2.450000,4.270000,6.270000 1.910000,3.730000,5.730000 1.640000,3.550000,5.550000 3.000000,4.820000,6.820000 3.910000,5.910000,7.820000 2.550000,4.450000,6.450000 3.910000,5.910000,7.910000 0.820000,2.270000,4.270000 1.910000,3.730000,5.730000 2.180000,4.090000,6.140000 2.450000,4.270000,6.270000 2.090000,3.730000,5.730000 3.000000,4.820000,6.820000 3.910000,5.910000,7.820000 2.550000,4.450000,6.450000 3.910000,5.910000,7.910000 3.000000,5.000000,7.140000 3.550000,5.550000,7.450000 2.900000,4.800000,6.700000 2.820000,4.640000,6.640000 2.900000,4.800000,6.700000 2.820000,4.640000,6.640000 4.270000,6.270000,8.140000 1.450000,3.070000,4.910000 2.820000,4.640000,6.640000 3.000000,5.000000,7.140000 3.550000,5.550000,7.450000 2.900000,4.800000,6.700000 2.820000,4.640000,6.640000 2.180000,4.090000,6.140000 1.820000,3.730000,5.730000 2.820000,4.640000,6.640000 2.550000,4.450000,6.450000 3.150000,5.150000,6.910000 2.450000,4.450000,6.450000 2.820000,4.820000,6.820000 0.820000,2.270000,4.270000 1.910000,3.730000,5.730000 2.180000,4.090000,6.140000 1.820000,3.730000,5.730000 2.820000,4.640000,6.640000 2.550000,4.450000,6.450000 1.820000,3.730000,5.730000 2.820000,4.640000,6.640000 4.280000,6.370000,8.370000 4.270000,6.270000,8.140000 4.280000,6.370000,8.370000 4.270000,6.270000,8.140000 5.360000,7.360000,9.120000 0.910000,2.450000,4.450000 2.820000,4.640000,6.640000 1.820000,3.730000,5.730000 2.820000,4.640000,6.640000 4.280000,6.370000,8.370000 4.270000,6.270000,8.140000 1.640000,3.550000,5.550000 2.550000,4.450000,6.450000 1.450000,3.070000,4.910000 2.820000,4.640000,6.640000 2.450000,4.450000,6.450000 2.820000,4.820000,6.820000 3.730000,5.730000,7.550000 2.450000,4.270000,6.270000 1.910000,3.730000,5.730000 1.640000,3.550000,5.550000 2.550000,4.450000,6.450000 1.450000,3.070000,4.910000 2.820000,4.640000,6.640000 A25 4.280000,6.370000,8.370000 2.450000,4.450000,6.450000 2.910000,4.640000,6.550000 1.450000,3.000000,4.910000 1.180000,2.820000,4.820000 2.090000,3.730000,5.730000 2.820000,4.640000,6.640000 1.910000,3.730000,5.730000 2.820000,4.640000,6.640000 1.910000,3.730000,5.730000

    Table 11: Normalized fuzzy-decision matrix

    Table 12: Weighted normalized fuzzy-decision matrix

    Table 13: Closeness coefficients to the desired level between alternatives

    Figure 3: Graphical chart of satisfaction degree of the alternatives

    6 Sensitivity Analysis

    The sensitivity research is conducted to verify the authenticity of the results when changes are made to the variables [29,54-56].Since the measurements in this work are dependent, the sensitivity analysis is performed on the weights.In this analysis, there are seventeen characteristics in the last level throughout the hierarchy, and sensitivities are then tested through seventeen observations.The weights of all the characteristics vary, whereas the weights of other characteristics have been constant [57-59].The degree of satisfaction is calculated by using Fuzzy AHP-TOPSIS.Tab.14 and Fig.4 show the outcomes of the sensitivity analysis.

    Figure 4: Graphical chart of sensitivity analysis

    The original weights of this work are shown in the first row in Tab.14.HS-8 has elevated satisfaction degree according to the original results.Seventeen experiments are performed,from A111 to A25.Results obtained show that,in seventeen studies,HS-8 still has an elevated degree of satisfaction.The least amount of alternative weight in each study is also A21.Differing results suggest that the alternatives ratings are weight prone.

    Table 14: Sensitivity analysis

    7 Comparison through Various AHP-TOPSIS Approaches

    Analogous data gives conflicting outcomes when used with altered approaches[12,13].Researchers have used one or more approaches to verify that the outcomes obtained through the proposed approach are accurate[14].This study uses Simple and Classical AHP-TOPSIS[15],Fuzzy-AHP-SAM(Analytic Hierarchy Process-Simple Aggregation Method) [15], Delphi-AHP with integration to TOPSIS and Fuzzy-Delphi-AHP with integration to TOPSIS methods [16,17] to approximate the results using a different approach and to test the accuracy of the results.Fuzzy sets, in a short time, have attracted the attention of several researchers since ambiguous situations are very common in widely different world issues and this new strategy encourages the handling of unwillingness-caused uncertainty.A fuzzy set is known as a function that returns for each characteristic within the set of membership values.In fuzzy set, the degree of membership at any point has one possible value in [0,1].In addition, the data collection and estimation processes in classical AHPTOPSIS and Delphi-AHP-TOPSIS are the same without fluctuation as in Fuzzy based AHP-TOPSIS processing.Thus, data in its original numerical form is used to determine usable-security of healthcare web applications.Tab.15 and Fig.5 show the comparison of the tests.

    Table 15: Results from different AHP based methods

    Figure 5: Graphical chart of comparative results

    The alternatives are graded by using five hybrid methods based on AHP, according to Tab.15.The results produced by the methods are highly correlated with the methodology’s results.The Pearson correlation coefficient values between Fuzzy-AHP-TOPSIS and Classical-AHP-TOPSIS, Fuzzy-AHPSAM, Delphi-AHP-TOPSIS, Fuzzy-Delphi-AHP-TOPSIS are 0.99737, 0.986636, 0.985877 and 0.985877, respectively, using statistical evaluation.The results indicated that other approaches used are highly correlated with the adopted methodology.Furthermore, the grouping of Fuzzy-AHP and Fuzzy-TOPSIS reflects its benefits in linking experts amid priorities which are contrary to consensus.Systematic approach is beneficial as it helps to solve multifaceted, multi-person, and multi-criteria decision-making problems by analyzing ecological issues and connecting them with the corresponding alternative of the healthcare web applications.

    8 Discussion

    Each and every physical system is associated with the internet because of the growth of IoT.This has contributed to the perpetuation of numerous vulnerabilities in security of healthcare web applications.Khan et al.[48] point out that “Security developers began to talk about reuse of credentials by requiring that credentials be updated regularly so that if a password were stolen by any hacker it would only be accessible for a short period”.While this was good for security, it was not very functional for the end user.Usable-security assertion thus emerges as a solution to simultaneously make healthcare web applications secure and usable.In 2013, PhD thesis submitted published by Tripp, M., gave four recommendations to ensure usable-security as much as possible.One of the recommendations was to include the users in the early development phases to ensure usable-security [47].The author also criticized the fact that new methods are not presented to developers for better implementation.The article’s contributor deliberated on the difficulties developer faces while ensuring usable-security of healthcare web applications.

    This research investigation has provided a comprehensive overview that point out the significant and high prioritized usable-security characteristics of healthcare web applications.Additionally, high security is required to defend against the malicious attacks.The main outcomes of this analysis include:

    ●Usability-security is indeed a persistent issue of this period and requires effective remedial interventions.This evaluation cum priority setting will help the developers to understand usablesecurity design.

    ●As evaluation is the primary method of achieving usable-security, the article’s contribution combines both usability and security considerations and assesses the usable-security of healthcare web applications.

    ●Validation is the most important characteristic according to the outcomes achieved.This confirmation will further help to focus on the characteristics prioritized to achieve high usable-security of healthcare web applications.

    ●The findings of this research contribution will assist the practitioners in determining the useful and significant characteristics among the number of usable-security characteristics of healthcare web applications.

    ●Seventeen usable-security characteristics were assessed at the final level by the contributors in this research work.Usable-security considerations can be put into focus with the aid of the tests, thus integrating usable-security into the healthcare web applications.

    This paper selected ten alternatives of healthcare web applications and gathered the opinions of the experts on the degree and measure of significance of each alternative that contributed to security and usability characteristics.Records were obtained from the views of the experts with the aid of the Fuzzy AHP-TOPSIS process.The possible delimits in the entire investigation can be summated as:

    ●The data gathered during this analysis may be inadequate because of the available resources.This dataset may be extended.

    ●Other usable-security characteristics which could also affect usable-security profoundly might have not been opted for in this work.

    9 Conclusion

    Security-usability and the amalgamation of both during the development of healthcare web applications need clarification of current expectations of usability and interpretation of a current framework for evaluation of security.This article used fuzzy-based AHP integrated with TOPSIS framework for usability and security estimation as a milestone.The most prioritized characteristic discovered through the assessment was Validation.The second high-priority characteristic was Encryption.The results thus corroborate that practitioners ought to concentrate on Validation (high prioritized characteristic) and Encryption for achievement of the usable as well as secure healthcare web applications.The present state of usability and security is not yet at the standard it needs to be.Therefore, new experiments need to be recognized by the developers and researchers in order to achieve maximum security.In addition, the business still relies on few obsolete security principles that make the code more complicated and therefore less usable.Advance security strategies of healthcare web applications that also emphasize usability are the requirement of this era.In this analysis, the measurement of usable-security would help the developers to insource strategies for making healthcare web applications more secure and usable.

    Acknowledgement:The work is funded by grant number 12-INF2970-10 from the National Science,Technology and Innovation Plan (MAARIFAH), the King Abdul-Aziz City for Science and Technology(KACST), Kingdom of Saudi Arabia.We thank the Science and Technology Unit at Umm Al-Qura University for their continued logistics support.

    Funding Statement:King Abdul-Aziz City for Science and Technology(KACST), Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲人成网站在线播放欧美日韩| 国产精品一区二区三区四区免费观看 | 婷婷亚洲欧美| 国产精品99久久99久久久不卡| 亚洲最大成人中文| 精品少妇一区二区三区视频日本电影| 国产精品亚洲一级av第二区| 在线观看www视频免费| 日本免费一区二区三区高清不卡| 亚洲乱码一区二区免费版| avwww免费| 国产成年人精品一区二区| 亚洲国产欧洲综合997久久,| 久久久水蜜桃国产精品网| 舔av片在线| 亚洲一码二码三码区别大吗| 久久久久九九精品影院| 国产精品美女特级片免费视频播放器 | 亚洲五月天丁香| 午夜精品在线福利| bbb黄色大片| 特大巨黑吊av在线直播| 伦理电影免费视频| 国产av麻豆久久久久久久| 亚洲专区字幕在线| 国产黄片美女视频| 国产精品亚洲一级av第二区| 波多野结衣高清无吗| 亚洲欧美日韩无卡精品| 在线永久观看黄色视频| 亚洲精品粉嫩美女一区| 一个人免费在线观看电影 | 在线观看免费午夜福利视频| e午夜精品久久久久久久| 成熟少妇高潮喷水视频| 亚洲在线自拍视频| 国产午夜精品论理片| 亚洲欧美精品综合一区二区三区| 日韩欧美 国产精品| 亚洲国产精品sss在线观看| 亚洲激情在线av| videosex国产| 国产精品久久久久久人妻精品电影| 成人手机av| e午夜精品久久久久久久| 亚洲天堂国产精品一区在线| 波多野结衣巨乳人妻| 国产精品一区二区三区四区免费观看 | 99精品欧美一区二区三区四区| 亚洲人成77777在线视频| 欧美黑人巨大hd| 热99re8久久精品国产| 99热这里只有精品一区 | 亚洲精品国产一区二区精华液| 亚洲欧美日韩高清在线视频| 香蕉久久夜色| 午夜两性在线视频| 精品人妻1区二区| 久久99热这里只有精品18| 亚洲中文av在线| 国产精品久久久久久人妻精品电影| av福利片在线| 熟女少妇亚洲综合色aaa.| 国产探花在线观看一区二区| 在线十欧美十亚洲十日本专区| 在线观看www视频免费| 在线视频色国产色| 国产高清视频在线观看网站| 一个人免费在线观看电影 | 亚洲免费av在线视频| 日韩欧美国产在线观看| netflix在线观看网站| 小说图片视频综合网站| 午夜免费成人在线视频| 一进一出好大好爽视频| 国产一区二区三区在线臀色熟女| 麻豆av在线久日| 美女 人体艺术 gogo| www.精华液| 久久精品国产综合久久久| 日本成人三级电影网站| 亚洲真实伦在线观看| 久久精品国产清高在天天线| 黄色视频,在线免费观看| 青草久久国产| 久久草成人影院| 怎么达到女性高潮| 色老头精品视频在线观看| 欧美一区二区精品小视频在线| 国产一区在线观看成人免费| 黄色视频不卡| 亚洲精华国产精华精| 精品一区二区三区四区五区乱码| 级片在线观看| 无限看片的www在线观看| 国产一级毛片七仙女欲春2| 亚洲成人中文字幕在线播放| 亚洲精品粉嫩美女一区| 久久精品成人免费网站| 国产69精品久久久久777片 | 一本大道久久a久久精品| 国产午夜福利久久久久久| 亚洲成人中文字幕在线播放| 色综合站精品国产| 丝袜人妻中文字幕| 欧美极品一区二区三区四区| 一级毛片精品| 变态另类成人亚洲欧美熟女| 2021天堂中文幕一二区在线观| 中文字幕人妻丝袜一区二区| 国产成人精品久久二区二区91| 日韩有码中文字幕| 午夜久久久久精精品| 在线十欧美十亚洲十日本专区| 亚洲全国av大片| 久久中文看片网| 亚洲欧美一区二区三区黑人| 久99久视频精品免费| 正在播放国产对白刺激| 搞女人的毛片| 成熟少妇高潮喷水视频| 99热6这里只有精品| 欧美久久黑人一区二区| 欧美激情久久久久久爽电影| 日韩欧美国产一区二区入口| 久久午夜亚洲精品久久| 日本三级黄在线观看| 欧美日韩国产亚洲二区| 99久久久亚洲精品蜜臀av| 国产免费av片在线观看野外av| 性色av乱码一区二区三区2| av福利片在线| xxx96com| 亚洲欧美精品综合一区二区三区| 搡老岳熟女国产| 成在线人永久免费视频| 最近在线观看免费完整版| 日本在线视频免费播放| 熟妇人妻久久中文字幕3abv| 精品电影一区二区在线| 丰满人妻一区二区三区视频av | 国产成人啪精品午夜网站| 91九色精品人成在线观看| 每晚都被弄得嗷嗷叫到高潮| 国产精品久久久久久精品电影| 精品免费久久久久久久清纯| 欧美色欧美亚洲另类二区| 国产精品电影一区二区三区| 亚洲精品在线美女| 国产欧美日韩一区二区三| 亚洲黑人精品在线| 欧美丝袜亚洲另类 | 女警被强在线播放| 日韩欧美国产在线观看| 欧美日韩瑟瑟在线播放| 国产三级中文精品| 国产av一区二区精品久久| 亚洲激情在线av| 国产高清有码在线观看视频 | 精品日产1卡2卡| 91在线观看av| 999久久久国产精品视频| 国产成年人精品一区二区| 99riav亚洲国产免费| 美女扒开内裤让男人捅视频| 一本大道久久a久久精品| 午夜免费成人在线视频| 久久久国产精品麻豆| 国产熟女午夜一区二区三区| 91大片在线观看| 欧美精品亚洲一区二区| 一区福利在线观看| 亚洲欧美一区二区三区黑人| 女人被狂操c到高潮| 在线观看舔阴道视频| 亚洲专区中文字幕在线| 亚洲熟妇中文字幕五十中出| 给我免费播放毛片高清在线观看| 久久久久精品国产欧美久久久| 色老头精品视频在线观看| 国产精品久久久av美女十八| av在线天堂中文字幕| 午夜老司机福利片| 免费一级毛片在线播放高清视频| 色哟哟哟哟哟哟| 日韩欧美三级三区| 丝袜人妻中文字幕| 级片在线观看| 亚洲人成网站在线播放欧美日韩| 国产精品久久久人人做人人爽| 日韩av在线大香蕉| 色综合欧美亚洲国产小说| 一本大道久久a久久精品| 亚洲成人精品中文字幕电影| 中文字幕熟女人妻在线| 黄色片一级片一级黄色片| 啦啦啦韩国在线观看视频| 两个人的视频大全免费| 波多野结衣高清作品| 嫁个100分男人电影在线观看| 制服人妻中文乱码| 日本成人三级电影网站| 91麻豆精品激情在线观看国产| 亚洲国产欧美一区二区综合| 国产精品 欧美亚洲| 亚洲色图av天堂| avwww免费| 亚洲国产欧美一区二区综合| 国产精品 欧美亚洲| 亚洲专区国产一区二区| 午夜免费观看网址| 91国产中文字幕| 亚洲欧美日韩高清在线视频| 99久久久亚洲精品蜜臀av| 床上黄色一级片| 岛国在线免费视频观看| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲国产中文字幕在线视频| 脱女人内裤的视频| 日韩欧美 国产精品| 亚洲精品国产精品久久久不卡| 久9热在线精品视频| 丁香六月欧美| 大型黄色视频在线免费观看| 久久久久久久午夜电影| 18禁黄网站禁片午夜丰满| 天堂av国产一区二区熟女人妻 | 黄色视频,在线免费观看| 欧美3d第一页| 天天一区二区日本电影三级| 午夜a级毛片| 一级片免费观看大全| 国产精品永久免费网站| 一级黄色大片毛片| 亚洲男人天堂网一区| 亚洲成av人片免费观看| 精品国产乱子伦一区二区三区| 久久婷婷成人综合色麻豆| АⅤ资源中文在线天堂| 别揉我奶头~嗯~啊~动态视频| 国产激情欧美一区二区| 97碰自拍视频| 亚洲性夜色夜夜综合| 亚洲一区高清亚洲精品| 亚洲欧美日韩东京热| 国产精品香港三级国产av潘金莲| 久久天躁狠狠躁夜夜2o2o| xxx96com| 国内少妇人妻偷人精品xxx网站 | 母亲3免费完整高清在线观看| 精品久久久久久久久久久久久| 亚洲专区国产一区二区| 亚洲精品色激情综合| 午夜精品久久久久久毛片777| 黄色毛片三级朝国网站| 欧美又色又爽又黄视频| 久久人妻福利社区极品人妻图片| 狂野欧美激情性xxxx| 亚洲午夜精品一区,二区,三区| 欧美午夜高清在线| 毛片女人毛片| 亚洲精品av麻豆狂野| 亚洲精品一区av在线观看| 国产亚洲精品久久久久5区| 亚洲第一欧美日韩一区二区三区| 国产精品国产高清国产av| 久久婷婷人人爽人人干人人爱| 18禁裸乳无遮挡免费网站照片| 亚洲在线自拍视频| 国产三级中文精品| 亚洲精品中文字幕一二三四区| 亚洲国产精品久久男人天堂| 熟女电影av网| 天堂√8在线中文| 精品无人区乱码1区二区| 亚洲欧美日韩东京热| 精品国产美女av久久久久小说| 久久九九热精品免费| 成人一区二区视频在线观看| 日韩欧美国产一区二区入口| 久久精品国产亚洲av高清一级| 午夜成年电影在线免费观看| 999久久久精品免费观看国产| 国产一区二区激情短视频| 久久久久性生活片| 成人高潮视频无遮挡免费网站| 国产精品久久久人人做人人爽| 久久久国产成人免费| 欧美日韩国产亚洲二区| 草草在线视频免费看| 青草久久国产| 9191精品国产免费久久| 巨乳人妻的诱惑在线观看| 午夜福利在线观看吧| 精品国产乱子伦一区二区三区| 日本五十路高清| 成人午夜高清在线视频| 国产人伦9x9x在线观看| 午夜视频精品福利| 久久人妻福利社区极品人妻图片| 色尼玛亚洲综合影院| 色哟哟哟哟哟哟| 丝袜美腿诱惑在线| 亚洲国产精品久久男人天堂| 悠悠久久av| 香蕉丝袜av| www.熟女人妻精品国产| 一区二区三区高清视频在线| 欧美日韩亚洲综合一区二区三区_| 久久伊人香网站| 国产精品综合久久久久久久免费| 一个人免费在线观看电影 | 成人精品一区二区免费| 亚洲国产看品久久| 久久性视频一级片| 国产午夜精品论理片| 精品国产美女av久久久久小说| 日本一区二区免费在线视频| 欧美日韩瑟瑟在线播放| 波多野结衣高清作品| 国产成人欧美在线观看| 黑人巨大精品欧美一区二区mp4| 国产精品日韩av在线免费观看| 色av中文字幕| 欧美日韩黄片免| 俄罗斯特黄特色一大片| 日本在线视频免费播放| av免费在线观看网站| 亚洲精品粉嫩美女一区| 色综合欧美亚洲国产小说| 国产一区二区三区视频了| 国产精品爽爽va在线观看网站| 成年女人毛片免费观看观看9| 国产精品久久久久久久电影 | 色哟哟哟哟哟哟| 午夜亚洲福利在线播放| 观看免费一级毛片| 欧美又色又爽又黄视频| 久久精品成人免费网站| 91在线观看av| 免费电影在线观看免费观看| e午夜精品久久久久久久| 午夜两性在线视频| 久久中文字幕一级| 国产又黄又爽又无遮挡在线| 精品人妻1区二区| 日韩大码丰满熟妇| 真人做人爱边吃奶动态| 亚洲成人中文字幕在线播放| 国产熟女午夜一区二区三区| 又黄又爽又免费观看的视频| 19禁男女啪啪无遮挡网站| 99热这里只有精品一区 | 欧美不卡视频在线免费观看 | 午夜激情av网站| 床上黄色一级片| 欧美另类亚洲清纯唯美| 大型黄色视频在线免费观看| 日本 欧美在线| 99久久99久久久精品蜜桃| 91麻豆精品激情在线观看国产| xxxwww97欧美| 成年版毛片免费区| 久久久久久国产a免费观看| 日本三级黄在线观看| 欧美又色又爽又黄视频| 男人的好看免费观看在线视频 | 制服丝袜大香蕉在线| 制服人妻中文乱码| 亚洲欧美日韩无卡精品| 国产熟女午夜一区二区三区| 搞女人的毛片| 十八禁网站免费在线| 99久久精品国产亚洲精品| 亚洲 欧美 日韩 在线 免费| 久久中文字幕一级| 99热这里只有是精品50| 午夜福利欧美成人| 成人手机av| 天天一区二区日本电影三级| 国产欧美日韩精品亚洲av| 欧美中文日本在线观看视频| 日本黄大片高清| 一个人观看的视频www高清免费观看 | 国产精品自产拍在线观看55亚洲| 久久人妻av系列| 男女午夜视频在线观看| 后天国语完整版免费观看| 岛国在线观看网站| av有码第一页| 色尼玛亚洲综合影院| 亚洲自拍偷在线| 可以在线观看的亚洲视频| 婷婷精品国产亚洲av| 丝袜美腿诱惑在线| 亚洲精品av麻豆狂野| 欧美午夜高清在线| 久久久久国产一级毛片高清牌| 免费在线观看影片大全网站| 国产精品久久视频播放| 中文资源天堂在线| 中文字幕人妻丝袜一区二区| www.精华液| 日韩成人在线观看一区二区三区| 欧美日韩一级在线毛片| 变态另类成人亚洲欧美熟女| 91av网站免费观看| 亚洲 欧美一区二区三区| 国产精品久久久久久精品电影| 可以免费在线观看a视频的电影网站| 午夜福利高清视频| 嫁个100分男人电影在线观看| www日本在线高清视频| 久久精品综合一区二区三区| 欧美中文综合在线视频| 日韩欧美精品v在线| 午夜精品久久久久久毛片777| 在线观看免费视频日本深夜| 精品免费久久久久久久清纯| 国产成人精品久久二区二区免费| 美女黄网站色视频| 欧美日韩亚洲国产一区二区在线观看| 女人高潮潮喷娇喘18禁视频| 精品熟女少妇八av免费久了| 一边摸一边做爽爽视频免费| 亚洲aⅴ乱码一区二区在线播放 | 国内毛片毛片毛片毛片毛片| 精品国内亚洲2022精品成人| 国产免费av片在线观看野外av| 久久草成人影院| 国产男靠女视频免费网站| 黄片小视频在线播放| 国产日本99.免费观看| 每晚都被弄得嗷嗷叫到高潮| a在线观看视频网站| www日本在线高清视频| 久久精品综合一区二区三区| 久久久精品大字幕| 久久婷婷人人爽人人干人人爱| 国产v大片淫在线免费观看| 亚洲真实伦在线观看| 可以在线观看的亚洲视频| 亚洲中文字幕一区二区三区有码在线看 | 精品乱码久久久久久99久播| 欧美极品一区二区三区四区| 亚洲成人精品中文字幕电影| 中文字幕精品亚洲无线码一区| 亚洲成人免费电影在线观看| av超薄肉色丝袜交足视频| 国内精品一区二区在线观看| 丝袜美腿诱惑在线| 亚洲国产欧美网| 天堂√8在线中文| 亚洲在线自拍视频| 美女黄网站色视频| 国产高清videossex| 午夜a级毛片| 精品午夜福利视频在线观看一区| 久久久国产欧美日韩av| 免费在线观看黄色视频的| 久久精品91蜜桃| 十八禁人妻一区二区| 三级男女做爰猛烈吃奶摸视频| 日日干狠狠操夜夜爽| 搞女人的毛片| 国内毛片毛片毛片毛片毛片| 久久精品国产综合久久久| 亚洲成人国产一区在线观看| 欧洲精品卡2卡3卡4卡5卡区| 午夜影院日韩av| 97超级碰碰碰精品色视频在线观看| 97碰自拍视频| 国产麻豆成人av免费视频| 我的老师免费观看完整版| 桃红色精品国产亚洲av| 欧美成人午夜精品| 久久精品91无色码中文字幕| 激情在线观看视频在线高清| 欧美zozozo另类| 国内精品一区二区在线观看| 日本a在线网址| 欧美 亚洲 国产 日韩一| 成在线人永久免费视频| 黑人操中国人逼视频| 国产精品日韩av在线免费观看| 日日爽夜夜爽网站| 一二三四社区在线视频社区8| 精品久久久久久久久久免费视频| 国产高清激情床上av| 香蕉国产在线看| 全区人妻精品视频| 性色av乱码一区二区三区2| 搡老熟女国产l中国老女人| 露出奶头的视频| 波多野结衣巨乳人妻| 91成年电影在线观看| 欧美高清成人免费视频www| 91成年电影在线观看| 9191精品国产免费久久| 国产精品精品国产色婷婷| 欧美日本视频| 舔av片在线| 香蕉久久夜色| 男女之事视频高清在线观看| 亚洲va日本ⅴa欧美va伊人久久| 精品国产乱码久久久久久男人| 国产免费男女视频| 国产伦人伦偷精品视频| 国产成+人综合+亚洲专区| 两人在一起打扑克的视频| 97碰自拍视频| 国产视频内射| 亚洲国产精品sss在线观看| 中出人妻视频一区二区| 在线视频色国产色| 成年女人毛片免费观看观看9| 美女免费视频网站| 熟女少妇亚洲综合色aaa.| 国产主播在线观看一区二区| 亚洲第一电影网av| 久久中文看片网| 亚洲欧美日韩高清在线视频| 亚洲熟妇熟女久久| 亚洲中文日韩欧美视频| 嫩草影院精品99| 欧美乱码精品一区二区三区| 久久中文字幕人妻熟女| 两性午夜刺激爽爽歪歪视频在线观看 | 国产69精品久久久久777片 | 88av欧美| 精品国产乱子伦一区二区三区| АⅤ资源中文在线天堂| 天堂av国产一区二区熟女人妻 | 精品久久蜜臀av无| 午夜a级毛片| 国产高清videossex| 亚洲精品色激情综合| 成人一区二区视频在线观看| 视频区欧美日本亚洲| 人人妻人人看人人澡| 日韩欧美免费精品| 少妇熟女aⅴ在线视频| 免费人成视频x8x8入口观看| 国语自产精品视频在线第100页| a级毛片在线看网站| 亚洲 欧美 日韩 在线 免费| 一级作爱视频免费观看| 日本免费一区二区三区高清不卡| 黄色片一级片一级黄色片| 最好的美女福利视频网| 中出人妻视频一区二区| 婷婷六月久久综合丁香| 男女那种视频在线观看| 女生性感内裤真人,穿戴方法视频| 亚洲中文日韩欧美视频| 我要搜黄色片| 777久久人妻少妇嫩草av网站| 一本久久中文字幕| 午夜视频精品福利| 成年免费大片在线观看| 美女大奶头视频| 色尼玛亚洲综合影院| 国产高清视频在线观看网站| 波多野结衣巨乳人妻| 制服丝袜大香蕉在线| 777久久人妻少妇嫩草av网站| 国产亚洲av嫩草精品影院| ponron亚洲| 女人被狂操c到高潮| 婷婷六月久久综合丁香| 亚洲在线自拍视频| or卡值多少钱| 不卡av一区二区三区| 国产精品 国内视频| 夜夜看夜夜爽夜夜摸| 久9热在线精品视频| 亚洲精品一区av在线观看| 欧美日韩亚洲国产一区二区在线观看| 亚洲激情在线av| 国产1区2区3区精品| 国产黄色小视频在线观看| 变态另类成人亚洲欧美熟女| 最近在线观看免费完整版| 亚洲真实伦在线观看| 国产精品久久电影中文字幕| 亚洲成人国产一区在线观看| 国产激情偷乱视频一区二区| 久久中文字幕一级| 国产精品免费视频内射| 最近在线观看免费完整版| 最好的美女福利视频网| 国产成人啪精品午夜网站| 亚洲国产欧洲综合997久久,| 亚洲成av人片在线播放无| а√天堂www在线а√下载| 婷婷精品国产亚洲av| 亚洲色图 男人天堂 中文字幕| 国产av在哪里看| 国产久久久一区二区三区| 哪里可以看免费的av片| 欧美日本视频| 麻豆av在线久日| 日本免费一区二区三区高清不卡| 久久草成人影院| 亚洲成人国产一区在线观看| 精品高清国产在线一区| 日韩av在线大香蕉| 三级国产精品欧美在线观看 | 制服人妻中文乱码| 久久久久久久午夜电影| 岛国在线观看网站| 国产av又大| 精品久久久久久,| 欧美大码av| 国产精品自产拍在线观看55亚洲|