Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System

E-learning systems are getting growing interest due to their wide applicability in distance education. A huge amount of data is shared among students, teachers, examiners that should be exchanged in a confidential manner. In literature, a number of related clustering-based schemes are explored that consider security but still there is a need for dependable secure schemes. This paper explores a Secure E-learning System (SES) for sharing examinations related materials by ensuring protection against various security attacks. Exam materials include tests, quizzes, question papers, answer sheets, and aptitude tests. In the first phase, we present a secure authentication mechanism for students and teachers with a trusted server or a fog server. Next, we present a Session Key Establishment Protocol (SKEP) to setup keys for a specified time period such as a class, seminar or exam. We have also maintained the level of trust and authentication level to regularly check the legitimacy of the students. A security analysis is performed to highlight the pros and cons of security schemes to ensure reliable security for e-learning systems. We have setup a testbed using web-services in ASP.net and C# on windows Azure cloud for an e-learning scenario. Results demonstrate the effectiveness of the proposed SES in terms of reducing number of untrusted students, exams exposed, student interaction time, authentication level, reputation and trust levels for students.

[1]  Samina Kausar,et al.  Integration of Data Mining Clustering Approach in the Personalized E-Learning System , 2018, IEEE Access.

[2]  Md. Hedayetul Islam Shovon,et al.  An Approach of Improving Students Academic Performance by using k means clustering algorithm and Decision tree , 2012, ArXiv.

[3]  Preeti Singh,et al.  Symmetric Key Cryptography: Current Trends , 2014 .

[4]  C. Seldev Christopher,et al.  Secure cloud data storage approach in e-learning systems , 2019, Clust. Comput..

[5]  Leonard Barolli,et al.  Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves , 2018, 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[6]  Riccardo Pecori,et al.  A Virtual Learning Architecture Enhanced by Fog Computing and Big Data Streams , 2018, Future Internet.

[7]  Hosam Farouk El-Sofany,et al.  The Impact of Cloud Computing Technologies in E-learning , 2013, Int. J. Emerg. Technol. Learn..

[8]  Robert John Walters,et al.  Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..

[9]  Seungmin Rho,et al.  Context-Driven Mobile Learning Using Fog Computing , 2018, 2018 International Conference on Platform Technology and Service (PlatCon).

[10]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[11]  Wu Zhang,et al.  Student Engagement Predictions in an e-Learning System and Their Impact on Student Course Assessment Scores , 2018, Comput. Intell. Neurosci..

[12]  Samir Abou El-Seoud,et al.  Studying the Effect of Using E-Learning Through Secure Cloud Computing Systems , 2018 .

[13]  Karim Faez,et al.  A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs , 2018, Future Internet.

[14]  Hannan Xiao,et al.  Privacy and usability of image and text based challenge questions authentication in online examination , 2014, 2014 International Conference on Education Technologies and Computers (ICETC).

[15]  Mohammed A. Al-Sharafi,et al.  The Effectiveness of Cloud-Based E-Learning towards Quality of Academic Services: An Omanis’ Expert View , 2018 .

[16]  Shadab Alam,et al.  Cloud-Based E-Learning: Using Cloud Computing Platform for an Effective E-Learning , 2018, Smart Innovations in Communication and Computational Sciences.

[17]  Ramgopal Kashyap Biometric Authentication Techniques and E-Learning , 2019 .

[18]  Rashid Mehmood,et al.  Data Fusion and IoT for Smart Ubiquitous Environments: A Survey , 2017, IEEE Access.

[19]  Denise Whitelock,et al.  e-Authentication for online assessment: A mixed-method study , 2019, Br. J. Educ. Technol..

[20]  Huazhu Song,et al.  Private Cloud with e-Learning for Resources Sharing in University Environment , 2016, eLEOT.

[21]  M. Zheng,et al.  Evaluating outcomes of computer-based classroom testing: Student acceptance and impact on learning and exam performance , 2019, Medical teacher.

[22]  Harry Raymond Joseph Promoting education: A state of the art machine learning framework for feedback and monitoring E-Learning impact , 2014, 2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS).

[23]  Yassine Khlifi,et al.  A Novel Authentication Scheme for E-assessments Based on Student Behavior over E-learning Platform , 2017, Int. J. Emerg. Technol. Learn..

[24]  Meghna Bhatia,et al.  E-learning Platforms Security Issues and Vulnerability Analysis , 2018, 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES).

[25]  Andrea Bondavalli,et al.  Continuous Authentication and Non-repudiation for the Security of Critical Systems , 2016, SRDS 2016.

[26]  Theon L. Danet,et al.  An Empirical Study of Authentication Methods to Secure E-learning System Activities Against Impersonation Fraud , 2016 .

[27]  Siyang Wang,et al.  Clustering of online learning resources via minimum spanning tree , 2016 .

[28]  Rashid Mehmood,et al.  UbeHealth: A Personalized Ubiquitous Cloud and Edge-Enabled Networked Healthcare System for Smart Cities , 2018, IEEE Access.

[29]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[30]  Sunil Karforma,et al.  Risks and remedies in e-learning system , 2012, ArXiv.

[31]  Rashid Mehmood,et al.  UTiLearn: A Personalised Ubiquitous Teaching and Learning System for Smart Societies , 2017, IEEE Access.

[32]  Ismail M.A,et al.  Clustering Algorithms Applied in Educational Data Mining , 2015 .

[33]  David Argles,et al.  Transparent authentication in E-learning , 2011, International Conference on Information Society (i-Society 2011).

[34]  Analía Amandi,et al.  eTeacher: Providing personalized assistance to e-learning students , 2008, Comput. Educ..

[35]  Yuki Indrayadi,et al.  Developing E-Learning System to Support Teaching and Learning Activities Using DSDM Approach , 2015 .

[36]  Adekunle Isiaka Obasa,et al.  A COMPARATIVE STUDY OF SYNCHRONOUS AND ASYNCHRONOUSE-LEARNING RESOURCES , 2013 .

[37]  José Palazzo Moreira de Oliveira,et al.  AdaptWeb: an Adaptive Web-based Courseware , 2003 .

[38]  Wasim A. Al-Hamdani,et al.  Secure E-Learning and Cryptography , 2014 .

[39]  Defta Costinela Luminita Information security in E-learning Platforms , 2011 .

[40]  Leonard Barolli,et al.  Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean-Shift Clustering Approach Considering Gamma Type of Brain Waves , 2017, BWCCA.

[41]  Hanan Lutfiyya,et al.  E-Learning: Challenges and Research Opportunities Using Machine Learning & Data Analytics , 2018, IEEE Access.

[42]  Corina Savulescu,et al.  Security in e-learning systems , 2015, 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[43]  Peter Appiahene,et al.  Application of Wireless Ad-Hoc Networks Model to provide Education to rural Communities in Ghana , 2019 .

[44]  Analía Amandi,et al.  Improving User Profiling for a Richer Personalization: Modeling Context in E-Learning , 2012 .

[45]  Yong Tang,et al.  Exposing the hidden to the eyes: Analysis of SCHOLAT E-Learning data , 2016, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[46]  B. B. Gupta,et al.  Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network , 2020, Handbook of Computer Networks and Cyber Security.

[47]  Yong Chen,et al.  Security Risks and Protection in Online Learning: A Survey. , 2013 .

[48]  Rohit Rampal,et al.  Synchronous e-learning: Reflections and design considerations , 2014 .

[49]  Mostafa Azizi,et al.  El-Security: E-learning Systems Security Checker Plug-in , 2017, BDCA'17.

[50]  Tanupriya Choudhury,et al.  Internet of Things and its applications in E-learning , 2017, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).