scholarly journals A Study on Security Issues in Cloud Based E-Learning

2015 ◽  
Vol 8 (8) ◽  
pp. 757 ◽  
Author(s):  
M. Durairaj ◽  
A. Manimaran
Keyword(s):  
Author(s):  
Saifallah Al Kati ◽  
Muhammad Asif Khan

During the recent Coronavirus (Covid-19) pandemic the traditional education system almost halted throughout the world. However, in order to continue with the education without wasting students time most of the countries transferred their teaching online. Although the online teaching is widely used but there are many challenges and security issues specially when the education is disseminated using education cloud. In this article we examine and review such challenges and security issues that may impact students and teachers in various educational institutions in Saudi Arabia. A review of hybrid cloud model is presented in order to benefit across institutions. The research also articulates different ways which can be adopted by educational institutions to provide smooth online teaching due to pandemic of covid-19. We also present some solutions that may help overcome challenges and secure a robust cloud infrastructure.


Author(s):  
Olorunjube James Falana ◽  
◽  
Ife Olalekan Ebo ◽  
Ifeanyi Shadrach Odom ◽  
◽  
...  

One of the research topics that focus on Information Communication Technology in Education is Learning Management System (LMS). LMS is a web-based software application developed to create, manage, and delivered e-learning courses. Many research works have been conducted on different learning options in LMS. However, the increased use of LMS has brought with it the security issues such as the denial of service attack, malware and privacy. In order to protect the different actors of LMS such as students, instructors and controlling authorities, this paper proposes a multi-factor authentication and identity management for securing LMS. Se-LMS is capable of dynamically authenticating users using different methods such as a seamless combination of Oauth2.0 and 2FA or Username/Password and 2FA as proposed. Also, the paper explains the situation and existing research relating to security in Learning Management Systems in smart school. The proposed framework has been applied to cloud-based LMS to show the ability to mitigate an attack.


Author(s):  
George Yee ◽  
Yuefei Xu ◽  
Larry Korba ◽  
Khalil El-Khatib

For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction online. While many advances have been made in the mechanics of providing online instruction, the needs for privacy and security have to-date been largely ignored. This chapter examines privacy and security issues associated with e-learning. It presents the basic principles behind privacy practices and legislation. It investigates the more popular e-learning standards to determine their provisions and limitations for privacy and security. Privacy requirements for e-learning systems are explored with respect to the “privacy principles.” The capabilities of a number of existing privacy enhancing technologies, including methods for network privacy, policy-based privacy/security management, and trust systems, are reviewed and assessed.


2020 ◽  
Vol 4 (2) ◽  
pp. 309
Author(s):  
Reza Pramudita ◽  
Syifaul Fuada ◽  
Nuur Wachid Abdul Majid

E-learning is an educational media that use ICT in the learning process. Nowadays, most of the higher education (universities) in Indonesia have integrated the learning process with e-learning systems. By using this system, learning can be done outside the classroom, anytime and anywhere. Based on the literature reviews, e-learning has many positive impacts on higher education components and its ecosystems, i.e., students, lecturers, higher education staff, and campus officials. Although it offers many advantages, similar to the information technology in general, e-learning systems are also vulnerable to security issues. Because, several security holes in the system can be penetrated easily by hackers, where the essential data contained in e-learning has high potential to be spoofed even modified by irresponsible parties. The security aspect of the e-learning system must be considered to minimize risks. Thus, the higher education can run their business as well. This paper aims to elaborate on the e-Learning system, opportunities, challenges, and several offered solutions on it. The research method used in this paper is literature studies from the latest references


2018 ◽  
Vol 10 (1) ◽  
pp. 9-14
Author(s):  
Miroslava Kovaříková

The following article deals with the problem of integrating security issues into the study programme of faculties training teachers in individual fields of education. It evaluates the current status of the development of the issues at the level of interdepartmental cooperation of selected state administration institutions. Based on exploratory research by the Czech School Inspectorate, the current status of the implementation of security issues into schools and educational establishments is described. The ongoing pilot verification of the e-learning module in security issues at the Faculty of Education of Charles University in Prague is also introduced. The article contains statistical data from the statutory research task, which was carried out in the form of a diagnostic survey involving the staff and students of the Charles University in Prague. The research was dedicated to the issues of educating the teaching staff of the Czech education system in the field of safety issues, with particular emphasis on the safety of students and educational institutions. The article also presents the level of knowledge and practical skills of primary school teachers in the field of responding to crisis situations that may occur in the school environment, e.g active shooter.


Author(s):  
Nader Abdel Karim ◽  
Ahmed Hussain Ali

During the coronavirus disease 2019 (COVID-19) pandemic outbreak, the lockdown of all activities including schools and universities became a normal habit, forcing educational institutes to find new ways to ensure the continuity of the learning process. E-learning is considered the best choice at this stage whereas using video conferencing or virtual meeting applications (VM) apps is the most common solution. In this research, security issues and possible cyber-attacks that may occur due to the use of the most popular VM apps used by educational institutes (i.e., Zoom, Microsoft Teams, and Google meet) are discussed. Moreover, the security features of these applications are briefly explained. Furthermore, a comprehensive comparison from a cybersecurity perspective between VM apps was made. The results show that Google Meet was the most secure against cyber-attacks, followed by the Microsoft Teams and finally the Zoom app.


2014 ◽  
Vol 4 (9) ◽  
pp. 1899-1906 ◽  
Author(s):  
Abouzar Arabsorkhi ◽  
Afshin Khodabandeh ◽  
Laleh Tashakori

Author(s):  
Yassine Khlifi

E-learning became attractive choices for academic institutions owing to their benefits, especially offering transparent and fast students' evaluation as well as innovative teaching methods. However, security issues related to e-learning have been raised by its stakeholders mainly faculty members, students, and administration. Authenticate examination takers during the electronic evaluation (e- evaluation), comprising assessment (E-assessment) and exam (E-exam), is a major challenge. In this paper, an advanced scheme is proposed to resolve this imperative challenge by introducing an efficient secure approach for supervising e-evaluation. The scheme collects information related to student and its behavior during the courses' activities and uses them for controlling unethical behavior during e-evaluation. The proposal doesn't need additional components and considered the continuous authentication using the random generation of a variable number of questions built from the collected information. The concerned student must respond to these questions which are generated periodically throughout the e-evaluation for guaranteeing his continuous authentication. Simulation experiments are conducted to validate our approach in which the obtained results show that student authentication is effectively guaranteed at a low cost whatever the student number and whatever the e-evaluation content.


Sign in / Sign up

Export Citation Format

Share Document