Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art

Mobile learning is constantly evolving, following the shift of mobile technologies from laptops to handheld devices and smartphones. Indeed, the opportunities for innovation in this area are numerous and constantly under the focus of all the parties involved, ranging from traditional schools and universities to individual learners. However, mobile technology brings along increased threats to system and data security and privacy, given the fact that learners and educators are mobile, and in most cases, permitted to use their own mobile devices to access resources and services. After identifying the challenges, this paper provides a comprehensive review and classification of the state-of-the-art research on security and privacy in the m-learning realm and beyond. As far as we are aware of, this is the first time an exhaustive and detailed survey of this kind is attempted.

[1]  Gerhard Schwabe,et al.  Mobile Learning projects - a critical analysis of the state of the art , 2009, J. Comput. Assist. Learn..

[2]  Jianming Yong Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes , 2011, J. Univers. Comput. Sci..

[3]  Yang Wang,et al.  Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.

[4]  Norbert Pachler,et al.  Mobile Devices as Resources for Learning: Adoption Trends, Characteristics, Constraints and Challenges , 2010 .

[5]  Attila Pethö,et al.  A secure electronic exam system , 2010 .

[6]  Stefanos Gritzalis,et al.  Enhancing Web privacy and anonymity in the digital era , 2004, Inf. Manag. Comput. Secur..

[7]  Benjamin Hirsch,et al.  Education beyond the cloud: Anytime-anywhere learning in a smart campus environment , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[8]  Georgios Kambourakis,et al.  Design and implementation of a secure mobile wiki system , 2008 .

[9]  A Min Tjoa,et al.  Privacy in e-learning: anonymity, pseudonyms and authenticated usage , 2005, Interact. Technol. Smart Educ..

[10]  Zsolt Ugray Security and privacy issues in mobile learning , 2009, Int. J. Mob. Learn. Organisation.

[11]  Edgar R. Weippl Security in e-learning , 2005, ELERN.

[12]  Paul Pocatilu,et al.  Secure SMS communications for M-learning services , 2011 .

[13]  Defta Costinela Luminita Information security in E-learning Platforms , 2011 .

[14]  Rob Koper,et al.  Contextualised Media for Learning , 2008, J. Educ. Technol. Soc..

[15]  C. Chellappan,et al.  Authentication of e-learners using multimodal biometric technology , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[16]  Simon K. S. Cheung,et al.  A Review of Mobile Learning in the Mobile Age , 2010, ICHL.

[17]  Jianming Yong Security modelling for e-Learning , 2007, 2007 First IEEE International Symposium on Information Technologies and Applications in Education.

[18]  Seoksoo Kim,et al.  Study on Contents Protection in M-Learning Environment , 2006, ICCSA.

[19]  Sergiu Jecan,et al.  An arbitration web service for e-learning based on xml security standards , 2008 .

[20]  Hajar Mousannif,et al.  Collaborative learning in the clouds , 2013, Inf. Syst. Frontiers.

[21]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[22]  Edgar Weippl Security considerations in m-learning: threats and countermeasures , 2007 .

[23]  Graham Walton,et al.  Using mobile technologies to give health students access to learning resources in the UK community setting. , 2005, Health information and libraries journal.

[24]  Stewart Kowalski,et al.  Secure e-learning using a holistic and immune security framework , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[25]  Gwo-Jen Hwang,et al.  A key step to understanding paradigm shifts in e-learning: towards context-aware ubiquitous learning , 2010, Br. J. Educ. Technol..

[26]  Paulo Shakarian,et al.  Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security Services , 2011, ANT/MobiWIS.

[27]  P. R. Lakshmi Eswari A process framework for securing an e-Learning ecosystem , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[28]  David M. Eyers,et al.  An architecture for supporting vicarious learning in a distributed environment , 2004, SAC '04.

[29]  Francisco J. Suárez,et al.  Security Issues in a Synchronous e-Training Platform , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[30]  Khalil El-Khatib,et al.  Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..

[31]  Geuk Lee,et al.  Design of DRM-LMS Model in M-Learning Environment , 2006, KES.

[32]  Sérgio Donizetti Zorzo,et al.  Service for secure and protected applications in Collaborative Learning Environments , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.

[33]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[34]  Sebastián Ventura,et al.  Using mobile and web‐based computerized tests to evaluate university students , 2009, Comput. Appl. Eng. Educ..

[35]  Kazimierz Kowalski,et al.  Continuous Biometric User Authentication in Online Examinations , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[36]  Maria Papadaki,et al.  Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.

[37]  David Teneyuca Internet cloud security: The illusion of inclusion , 2011, Inf. Secur. Tech. Rep..

[38]  Gwo-Jen Hwang,et al.  Criteria, Strategies and Research Issues of Context-Aware Ubiquitous Learning , 2008, J. Educ. Technol. Soc..

[39]  Antonio Ruiz-Martínez,et al.  A survey on solutions and main free tools for privacy enhancing Web communications , 2012, J. Netw. Comput. Appl..

[40]  Frank Eliassen,et al.  A development framework and methodology for self-adapting applications in ubiquitous computing environments , 2012, J. Syst. Softw..

[41]  Jordi Herrera-Joancomartí,et al.  A secure e-exam management system , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[42]  Raphael Cohen-Almagor,et al.  Fighting Hate and Bigotry on the Internet , 2011 .

[43]  Qinghai Gao Online teaching: Do you know who is taking the final exam? , 2010 .

[44]  Hua Wang,et al.  Secure and Efficient Information Sharing in Multi-university E-Learning Environments , 2007, ICWL.

[45]  K. Titi,et al.  Protecting E-courses Copyright in M-learning Process , 2009, 2009 International Conference on Future Computer and Communication.

[46]  Sasan Adibi A remote interactive non-repudiation multimedia-based m-learning system , 2010, Telematics Informatics.

[47]  Georgios Kambourakis,et al.  A PKI approach for deploying modern secure distributed e-learning and m-learning environments , 2007, Comput. Educ..

[48]  Elke Franz,et al.  Collaborative E-Learning , 2011, Digital Privacy - PRIME.

[49]  Georgios Kambourakis,et al.  User privacy and modern mobile services: are they on the same path? , 2012, Personal and Ubiquitous Computing.

[50]  Yonghong Zhang,et al.  Mobile learning with Bluetooth-based e-learning system , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.

[51]  K. Rabuzin,et al.  E-learning: Biometrics as a Security Factor , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).

[52]  Yongping Zhang,et al.  An Optimized Scheme for Mobile Learning on IP-Based Network Using SIP , 2008, ICWL.

[53]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[54]  Yair Levy,et al.  A Theoretical Approach for Biometrics Authentication of e-Exams , 2007 .

[55]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[56]  Sarah Jane Delany,et al.  SMS spam filtering: Methods and data , 2012, Expert Syst. Appl..

[57]  Inmaculada Plaza,et al.  State of the art of frameworks and middleware for facilitating mobile and ubiquitous learning development , 2011, J. Syst. Softw..

[58]  Ellen D. Wagner,et al.  Realizing the promises of mobile learning , 2008, J. Comput. High. Educ..

[59]  Stefanos Gritzalis,et al.  How to protect security and privacy in the IoT: a policy-based RFID tag management protocol , 2014, Secur. Commun. Networks.

[60]  Tammy Schellens,et al.  Long-term study of safe Internet use of young children , 2011, Comput. Educ..

[61]  Danco Davcev,et al.  Mobile Cloud Computing Environment as a Support for Mobile Learning , 2012, CLOUD 2012.