Abstract

e-Learning has transposed the perception of teaching and learning considering knowledge delivery and knowledge acquirement. Today, e-learning participants access and upload their materials at any time and at any place since e-learning technologies are typically hosted on the cloud. Cloud computing has embellished the base platform for the future of e-learning, however, security and privacy remains a major concern. Cloud-hosted e-learning technologies as they are accessed over the internet suffer from the same risks to information security aspects namely availability, confidentiality, and integrity. In such a context, data authenticity, privacy, access rights and digital footprints are vulnerable in the cloud. Research in this domain focuses on specific components of cloud and e-learning without covering a holistic view of applied cryptographic techniques and practical implementation. Hence, aiming at the various security aspects and impacts of cloud-based e-learning technologies, this paper puts forward reviewing the various cryptographic techniques used to secure data across the whole end-to-end cloud-based e-learning service spectrum using systematic review and exploratory method. The results obtained define several sets of criteria to evaluate the requirements of cryptographic techniques and propose an implementation framework across an end-to-end cloud-based e-learning architecture using multi-agent software.

Highlights

  • In a world where the internet is the most potent communications enabler, humanity has transcended orthodox teaching and learning ways and made them global with elearning where information, communication and digital technologies are utilized to ease the learning process

  • This study aims to conceptualize how e-learning services are provided by cloud technologies, discover the various cyber security issues that impact cloud-based e-learning technologies, study the state of art cryptographic techniques used to address the issues in several aspects of cloud-based e-learning technologies, find discrepancies in application and implementation of such cryptographic techniques and propose solutions to those problems

  • Following the study of the state of art in cryptographic techniques applied to cloud-based e-learning systems, the following observations have been made: 1) The entire end-to-end high-level architecture of the cloud-based e-learning service that includes the end-user, the administrators, the internetwork, and the cloud service including servers and storage must be considered when analyzing the cyber security threats faced and the cryptographic techniques used to protect the various aspects of information

Read more

Summary

Introduction

In a world where the internet is the most potent communications enabler, humanity has transcended orthodox teaching and learning ways and made them global with elearning where information, communication and digital technologies are utilized to ease the learning process. The elearning concept has offered an effective educational tool that is accessible from anywhere to anyone encompassing professionals, scholars, teachers, and students by combining the virtues of the internet and the wisdom of knowledge. To be fully transformative, e-learning should be integrated formally into curriculum creation and teacher training and informally into the habits of students [1]. Cloud computing platforms have diversified the conceptualisation of delivering education using modern e-learning methods. This base platform for the future of e-learning is vulnerable to security threats and privacy issues

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.