A Framework for a Multi-Layered Security of an Automated Programming Code Assessment Tool

In a learning environment, a low student-lecturer ratio is considered a practical solution by many educational institutions. However, the number of students in information technology is increasing every year. This could lead to a significant increase in the workload of lecturers, who need to evaluate assignments, quizzes and projects. Hence, it is desirable that an automated assessment tool is used to lessen their workload. In the era where mobile devices are getting popularity, the high demand to execute suitable quality code is there and the cost is on the processing power of the CPU which has a direct implication on the power source or the battery used. With various implementations of cryptography algorithms available, many of them could satisfy different level of needs. In this research, we introduce the architecture for a multi-layered security of automated assessment of programming code. First, we review the existing research studies in the area. We describe the features of the tool, as part of a complex e-learning environment. We also discuss the implementation of security, to protect data transmission and storage used by the tool. Challenges the system might face and the potential solutions, are also described.

[1]  B. Bloom The 2 Sigma Problem: The Search for Methods of Group Instruction as Effective as One-to-One Tutoring , 1984 .

[2]  Kassandra: the automatic grading system , 1994, SCOU.

[3]  David Jackson,et al.  Grading student programs using ASSYST , 1997, SIGCSE '97.

[4]  Rebecca B. Worley,et al.  Teaching Software , 1999 .

[5]  Michael Luck,et al.  Networked Submission and Assessment , 2000 .

[6]  Athanasios Tsintsifas,et al.  The CourseMaster Automated Assessment System – a next generation Ceilidh , 2001 .

[7]  Nathan Griffiths,et al.  The BOSS Online Submission System , 2001 .

[8]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[9]  Tarek Hegazy,et al.  The CourseMarker CBA System: Improvements over Ceilidh , 2004, Education and Information Technologies.

[10]  Hong Jiang,et al.  Agent-based cooperative learning: a proof-of-concept experiment , 2004, SIGCSE '04.

[11]  Nathan Griffiths,et al.  The boss online submission and assessment system , 2005, JERC.

[12]  Stephen Downes E-learning 2.0 , 2005, ELERN.

[13]  Christopher Douce,et al.  Automatic test-based assessment of programming: A review , 2005, JERC.

[14]  Athanasios Tsintsifas,et al.  Automated assessment and experiences of teaching programming , 2005, JERC.

[15]  Agostino Poggi,et al.  Multiagent Systems , 2006, Intelligenza Artificiale.

[16]  Fabio Bellifemine,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[17]  K. Amant,et al.  Handbook of Research on Open Source Software: Technological, Economic, and Social Perspectives , 2007 .

[18]  Janne Lindqvist,et al.  VERKKOKE: learning routing and network programming online , 2007, ITiCSE '07.

[19]  David Cornforth,et al.  An overview of recent advances in intrusion detection , 2008, 2008 8th IEEE International Conference on Computer and Information Technology.

[20]  Stephen H. Edwards,et al.  Web-CAT: automatically grading programming assignments , 2008, SIGCSE 2008.

[21]  Jacques Philippe Sauvé,et al.  Teaching software development with ATDD and easyaccept , 2008, SIGCSE '08.

[22]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[23]  S. Masrom,et al.  Computer assisted assessment for computer programming course with agent based architecture , 2009, IEEE ICT 2009.

[24]  Petri Ihantola,et al.  Review of recent systems for automatic assessment of programming assignments , 2010, Koli Calling.

[25]  Wanli Ma,et al.  A New Security Model using Multilayer Approach for E-Health Services , 2011 .

[26]  Mohd Fadzli Marhusin Improving the Effectiveness of Behaviour-based Malware Detection , 2012 .