Total views : 316

Cloud based E-Learning, Security Threats and Security Measures

Affiliations

  • Faculty of Computing and Information Technology, University of Gujrat, Gujrat - 50700, Pakistan
  • Department of Chemical Engineering and Technology, University of Gujrat, Gujrat - 50700,, Pakistan

Abstract


Objective: The purpose of this paper is to rectify the aspects that leads the acceptance of cloud based E-learning services and why it is plagued by security issues despite its numerous advantages and find out the possible solutions to the problems. So this study highlights the security threats with cloud based e-learning and the precaution acquired recently on those problems. Method: This paper used both theoretical and empirical studies. Empirical study is done by the information congregated using numerous cloud based e-learning solution vendors websites. On the other hand, theoretical study is made by examining several research articles linked to our theme areas. Based on this analysis it identify different security threats in cloud service delivery model through the object to recommend a solution in the procedure of security measures related to the cloud based e-learning. Projected practice certifies data availability and offers solution to secure essential data from the invaders. Findings: The project edupshot of this study is to highlight the vital security threats and concerns occupied on when executing the cloud computing for e-learning systems. We do attempt to exploit the security concerns that e-learners and the end-users of cloud based e-learning solutions desire to acquire it from the cloud based e-learning solution vendors. This study finds diverse security issues in cloud service by an object to advocate a resolution in the form of security dealings linked to the cloud based e-learning. Traditional E-Learning approaches are merged with cloud computing technology to give enormous benefits to the academic users but it compromises on security facets. This study of E-Learning advocate’s users to acquire the data in the cloud via a secured layer using the internet. Cloud based E-Learning is a way to lessen cost and density of data retrieving, which are handled by third party services. Improvements: The study does not explore negative aspects that may deject acceptance of cloud-based services. However, we have just discussed cloud computing and its service and have presented ways by which the present security issues in cloud computing can be resolved.

Keywords

Cloud Service, Data Availability, Measures, Security Risk, Solution, Threats.

Full Text:

 |  (PDF views: 332)

References


  • Kadam Y. Security issues in cloud computing a transparent view. International Journal of Computer Science & Emerging Technologies. 2011; 2(5):316-22.
  • Lal P, Bharadwaj SS. Understanding the impact of cloudbased services adoption on organizational flexibility.Journal of Enterprise Information Management. 2016; 29(4):566-88.
  • Kadam Y. Security issues in cloud computing a transparent view. International Journal of Computer Science & Emerging Technologies. 2011; 2(5):316-22.
  • Morsy MA, Grundy J, Muller I. An analysis of the cloud computing security problem. Proceedings of APSEC Cloud Workshop; Sydney, Australia. 2010.
  • Che J, Duan Y, Zhang T, Fan J. Study on the security models and strategies of cloud computing. Procedia Engineering.2011; 23:586-93.
  • Gharehchopogh FS, Hashemi S. Security challenges in cloud computing with more emphasis on trust and privacy.International Journal of Scientific & Technology Research.2012; 1(6):49-54.
  • Jamil D, Zaki H. Security issues in cloud computing and counter measures. International Journal of Engineering Science and Technology. 2011; 3(4):2672-6.
  • Al-Fares M. A scalable, commodity data center network architecture. Proceedings of SIGCOMM; 2008.
  • Takabi H, Joshi JBD, Ahn G. Security and privacy challenges in cloud computing environments. IEEE Security Privacy Magazine. IEEE Computer Society. 2010; 8:24-31.
  • Monsef M, Gidado N. Trust and privacy concern in the Cloud European Cup. IT Security for the Next Generation; UK. 2011. p. 1-15.
  • Qaisar S, Khawaja KF. Cloud computing: Network/security threats and counter measures. Inter Disciplinary Journal of Contemporary Research in Business. 2012; 3(9):1323-9.
  • Vic JR, Winkler W. Securing the Cloud: Cloud Computer Security Techniques and Tactics. Elsevier Publishing; 2011.
  • Kumar G, Chelikani A. Analysis of security issues in cloud based e-learning [Master’s thesis]. Sweden: University of BORAS; 2011.
  • Harmelen VM. Personal learning environments. 6th IEEE International Conference on Advanced Learning Technologies ICALT; 2006. p. 815-6.
  • Pocatilu P. Cloud Computing Benefits for E-learning Solutions. O-Economics Of Knowledge. 2010; 2(1):1-6.
  • Hameetha Begum S, Sheeba T, Nisha Rani SN. Security in cloud based e-learning. International Journal of Advanced Research in Computer Science and Software Engineering.2013; 3(1):1- 6.
  • Begum SH, Sheeba TSN, Rani N. Security in cloud based e-Learning. International Journal of Advanced Research in Computer Science and Software Engineering. 2013; 3(1):16.
  • Al-Jumeily D, Williams D, Hussain A, Griffiths P. Can we truly learn from a cloud or is it just a lot of thunder.Developments in E-Systems Engineering (DESE); USA.2010. p. 131-9.
  • Rao NM, Sasidhar C, Kumar VS. Cloud Computing Through Mobile-Learning. India; 2011. p. 1-6.
  • Jamil D, Zaki H. Cloud computing security. IJEST. 2011; 3(4):3478-83.
  • Jensen M, Schwenk J, Gruschka N, Iacono LL. On technical security issues in cloud computing. IEEE International Conference on Cloud Computing, CLOUD ‘09; Bangalore.2009. p. 109–16.
  • Ahmed S, Buragga K, Ramani AK. Security issues concern for E-Learning by Saudi universities. IEEE 13th International Conference on Advanced Communication Technology (ICACT); Seoul-Korea. 2011. p. 1579-82.
  • Kambatla K. Towards optimizing Hadoop provisioning in the cloud. Proceedings of the Hot Cloud; 2009. p. 1-5.
  • Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J. Controlling data in the cloud: Outsourcing computation without outsourcing control. Proceedings of the ACM Workshop on Cloud Computing Security; Chicago.2009. p. 85-90.
  • Durairaj M, Manimaran A. A study on security issues in cloud based e-learning. Indian Journal of Science and Technology. 2015 Apr; 8(8):1-9.
  • Angel S, Rodrigues P. Estimating the size of e-learning system using learning object points method. Indian Journal of Science and Technology. 2016 Aug; 9(33):1-12.
  • Auxilia M, Raja K. Ontology centric access control mechanism for enabling data protection in cloud. Indian Journal of Science and Technology. 2016 Jun; 9(23):1-7.
  • Ryan MD. Cloud computing security: The scientific challenge and a survey of solutions. Journal of Systems and Software. 2013; 86(9):2263-8.
  • Batra M, Arora A. Cloud computing security: A review.International Journal of Advance Research in Computer Science and Management Studies. 2016 May; 4(5):1-6.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.