Cloud Computing for E-Learning with More Emphasis on Security Issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Cloud Computing for E-Learning with More Emphasis on Security Issues

Authors: Sajjad Hashemi, Seyyed Yasser Hashemi

Abstract:

In today's world, success of most systems depend on the use of new technologies and information technology (IT) which aimed to increase efficiency and satisfaction of users. One of the most important systems that use information technology to deliver services is the education system. But for educational services in the form of E-learning systems, hardware and software equipment should be containing high quality, which requires substantial investment. Because the vast majority of educational establishments can not invest in this area so the best way for them is reducing the costs and providing the E-learning services by using cloud computing. But according to the novelty of the cloud technology, it can create challenges and concerns that the most noted among them are security issues. Security concerns about cloud-based E-learning products are critical and security measures essential to protect valuable data of users from security vulnerabilities in products. Thus, the success of these products happened if customers meet security requirements then can overcome security threats. In this paper tried to explore cloud computing and its positive impact on E- learning and put main focus to identify security issues that related to cloud-based E-learning efforts which have been improve security and provide solutions in management challenges.

Keywords: Cloud computing, E-Learning, Security.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1088868

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3222

References:


[1] Y. Kadam, “Security Issues in Cloud Computing A Transparent View”, International Journal of Computer Science & Emerging Technologies, Vol. 2, No. 5, 2011, pp. 316-322.
[2] M. Al Morsy, J. Grundy and I. Müller, “An Analysis of The Cloud Computing Security Problem”, In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 Nov 2010.
[3] H. Takabi, J. B. D. Joshi, G.Ahn., “Security and Privacy Challenges in Cloud Computing Environments”, IEEE Security Privacy Magazine, Vol. 8, IEEE Computer Society, 2010, pp.24-31.
[4] M. Monsef, N. Gidado, “Trust and privacy concern in the Cloud”, 2011 European Cup, IT Security for the Next Generation, 2011, pp.1-15.
[5] M. Firdhous, O. Ghazali, and S. Hassan, Trust and Trust Management in Cloud Computing – A Survey, Inter Networks Research Group, University Utara Malaysia, Technical Report UUM/CAS/ InterNetWorks/TR2011-01, 2011.
[6] F. S. Gharehchopogh, S. Hashemi, “Security Challenges in Cloud computing with More Emphasis on Trust and Privacy”, International Journal of Scientific & Technology Research, Vol. 1, ISSUE 6, 2012. pp. 49-54.
[7] J. Che, Y. Duan, T. Zhang, J. Fan, “Study on the security models and strategies of cloud computing”, Procedia Engineering, Vol. 23, Elsevier, 2011, pp. 586-593.
[8] D. Jamil, H. Zaki, “Security Issues in Cloud Computing and Countermeasures”, International Journal of Engineering Science and Technology, Vol. 3 No. 4, 2011, pp. 2672-2676.
[9] S. Qaisar, K. F. Khawaja, “Cloud Computing: Network/Security Threats and Countermeasures”, Interdisciplinary journal of contemporary research in business, Vol.3, No. 9, 2012, pp. 1323-1329.
[10] Vic (J. R.) Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics, Technical Editor Bill Meine, Elsevier Publishing, 2011.
[11] G. Kumar, A. Chelikani, Analysis of Security Issues in Cloud Based E-Learning, Master’s thesis, University of BORAS , Sweden, 2011.
[12] Kumar, A., Pakala, R., Ragade, R. & Wong, J., The virtual learning environment system. IEEE, vol. 2., 1998, pp. 711-716.
[13] V. Harmelen, M. Year. Personal learning environments. Sixth IEEE International Conference on Advanced Learning Technologies ICALT06 (2006), Volume: 16, Issue: 1, Publisher: Ieee, 2006, pp.815-816.
[14] P. Pocatilu, “Cloud Computing Benefits for E-learning Solutions”, Oeconomics of Knowledge, Vol. 2, Issue 1, 2010.
[15] S. Hameetha Begum, T. Sheeba, S. N. Nisha Rani, “Security in Cloud based E-Learning”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, Issue 1, 2013, pp.1-6.
[16] Pocatilu, P., Alecu, F. & Vetrici, M., “Using cloud computing for E-learning systems”, World Scientific and Engineering Academy and Society (WSEAS), 2009, pp. 54-59.
[17] Al-Jumeily, D., Williams, D., Hussain, A. & Griffiths, P., Can We Truly Learn from A Cloud Or Is It Just A Lot of Thunder? Developments in E-systems Engineering (DESE), 2010 pp. 131-139.
[18] RAO, N. M., Sasidhar, C. & Kumar, V. S, Cloud Computing Through Mobile-Learning,
[Accessed Feb 2012] http://arxiv.org/ftp/arxiv/ papers/1204/1204.1594.pdf
[19] G. Srinivas Reddy, Security Issues and Threats in Educational Clouds of E-Learning: A review on Security Measures, Int.J.Computer Technology & Applications, Vol 4 (2), 2013, pp.312-316
[20] Jamil, D. & Zaki, H., Cloud Computing Security, International Journal of Engineering Science and Technology (IJEST), Vol. 3, No. 4 pp: 3478- 3483, April 2011.
[21] Jensen, M., Schwenk, J., Gruschka, N. & Iacono, L. L, On technical security issues in cloud computing, Cloud Computing, 2009. CLOUD '09. IEEE International Conference, Bangalore, 2009, pp.109 – 116.
[22] Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R. & Molina, J., Controlling data in the cloud: outsourcing computation without outsourcing control. , Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009); Chicago, 2009, pp. 85-90.
[23] Ahmed, S., Buragga, K. & Ramani, A. K. “Security issues concern for E-Learning by Saudi universities”, Advanced Communication Technology (ICACT), 2011 13th International Conference, IEEE, Seoul-korea, 2011, pp. 1579-1582.