scholarly journals Implementation of a Blockchain System Using Improved Elliptic Curve Cryptography Algorithm for the Performance Assessment of the Students in the E-Learning Platform

2021 ◽  
Vol 12 (1) ◽  
pp. 74
Author(s):  
Mohammad Y. Alshahrani

Blockchain technology allows for the decentralized creation of a propagated record of digital events, in which third parties do not control information and associated transactions. This methodology was initially developed for value transmission. Still, it now has a broad array of utilization in various industries, including health, banking, the internet of things, and several others. With its numerous added benefits, a blockchain-based learning management system is a commonly utilized methodology at academic institutes, and more specifically during and after the COVID-19 period. It also presents several potentials for decentralized, interoperable record management in the academic system in education. Integrity, authenticity, and peer-executed smart contracts (SC) are some of the qualities of a blockchain that could introduce a new degree of safety, trustworthiness, and openness to e-learning. This research proposes a unique encryption technique for implementing a blockchain system in an e-learning (EL) environment to promote transparency in assessment procedures. Our methodology may automate evaluations and provide credentials. We built it to be analytical and content-neutral in order to demonstrate the advantages of a blockchain back-end to end-users, including student and faculty members particularly during this COVID-19 era. This article explains the employment of blockchain and SC in e-learning. To improve the trust in the assessment, we propose a novel improved elliptic curve cryptography algorithm (IECCA) for data encryption and decryption. The performance of the suggested method is examined by comparing it with various existing algorithms of encryption. The evaluation of the behaviour of the presented method demonstrates that the technique shall enhance trust in online educational systems, assessment processes, educational history, and credentials.

2021 ◽  
Vol 11 (12) ◽  
pp. 5316
Author(s):  
Ghadah Aldabbagh ◽  
Daniyal M. Alghazzawi ◽  
Syed Hamid Hasan ◽  
Mohammed Alhaddad ◽  
Areej Malibari ◽  
...  

The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users. Uploading and storing specific data in the cloud is familiar and widespread, but securing the data is a complicated task. This paper proposes a cloud-based mobile learning system using a hybrid optimal elliptic curve cryptography (HOECC) algorithm comprising public and private keys for data encryption. The proposed approach utilizes an adaptive tunicate slime-mold (ATS) algorithm to generate optimal key value. Thus, the data uploaded in the cloud system are secured with high authentication, data integrity and confidentiality. The study investigation employed a survey consisting of 50 students and the questionnaire was sent to all fifty students. In addition to this, for obtaining secure data transmission in the cloud, various performance measures, namely the encryption time, decryption time and uploading/downloading time were evaluated. The results reveal that the time of both encryption and decryption is less in ATF approach when compared with other techniques.


Author(s):  
Slavko Rakic ◽  
Nemanja Tasic ◽  
Ugljesa Marjanovic ◽  
Selver Softic ◽  
Egon Lüftenegger ◽  
...  

E-learning is considered a leading application of digital technologies in educational systems. The aim of the paper is to explore the utilization and impact of digital technologies on an e-learning platform. For this purpose, research was conducted at the Moodle learning management system. Data from the e-learning platform were empirically evaluated in order to find key indicators of student performance in different courses. Student success with the e-learning system was evaluated using a mixed-method: Social Network Analysis, K-Means Clustering, and Multiple Linear Regression. The research was conducted at the University of Novi Sad, Faculty of Technical Sciences, Serbia. The results indicate a significant relationship between the performance of students and the use of digital educational resources from the e-learning platform.


2020 ◽  
Author(s):  
Rosheen Qazi ◽  
Imran A. Khan

Encryption helps in transmitting sensitive data over an insecure channel without any danger of data being lost or being manipulated by some unauthorized entity. Different Encryption schemes have been applied for Data security in a different environment. Many cryptosystems worked during different eras and evolved accordingly with time. This paper mainly focuses on asymmetric encryption which is also known as Public key encryption scheme or Holomorphic encryption. However, due to large key size asymmetric encryption is mostly used for Key exchange rather than data Encryption. Nowadays, Data security is the main issue in large data centers and Cloud computing. This paper uses Elliptic Curve Cryptography to encrypt data in the cloud environment because the size of the key used in Elliptic Curve Cryptography is very small. Due to the small key size of Elliptic Curve, computational power is reduced and this results into least energy consumption. This paper shows that elliptic curve cryptography is fast and more efficient for data protection in a cloud computing environment and reduces the computational power and also increases the efficiency.


2020 ◽  
Vol 55 (3) ◽  
Author(s):  
Mayes M. Hoobi

Cryptography is the operation of transferring a specific message to prevent an attacker from accessing the contents of a message. To increase the level of security in any communication, both parties must have a copy of the encryption key. The Data Encryption Standard algorithm is insufficient due to its weak key generation, so that the key must be reconfigured to make this algorithm more secure, effective, and stronger. The key for encryption enhances securities of the Data Encryption Standard algorithm. This research assumed a combination of two efficient encryption algorithms to achieve the goal of information security by adding a new level of security to the Data Encryption Standard algorithm using the elliptic curve cryptography algorithm. This aim was met by adding two new key functions; the first one is EncK(), and the second one is DecK() for an encryption and decryption key of the Data Encryption Standard algorithm to make this algorithm more secure against attackers. The results obtained from this research also demonstrate good resistance against a brute-force attack, which makes the system more effective by applying the elliptic curve cryptography algorithm to encrypt and decrypt keys using the Data Encryption Standard. In addition, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message more difficult for an attacker to crack.


Author(s):  
Kazuki NAGANUMA ◽  
Takashi SUZUKI ◽  
Hiroyuki TSUJI ◽  
Tomoaki KIMURA

Sign in / Sign up

Export Citation Format

Share Document