A massive data processing approach for effective trustworthiness in online learning groups

This paper proposes a trustworthiness‐based approach for the design of secure learning activities in online learning groups. Although computer‐supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks that limit its potential. Among these limitations, we investigate on information security vulnerabilities in learning activities, which may be developed in online collaborative learning contexts. Although security advanced methodologies and technologies are deployed in learning management systems, many security vulnerabilities are still not satisfactorily solved. To overcome these deficiencies, we first propose the guidelines of a holistic security model in online collaborative learning through an effective trustworthiness approach. However, as learners' trustworthiness analysis involves large amount of data generated along learning activities, processing this information is computationally costly, especially if required in real time. As the main contribution of this paper, we eventually propose a parallel processing approach, which can considerably decrease the time of data processing, thus allowing for building relevant trustworthiness models to support learning activities even in real time. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Susan K. Ferencz,et al.  Privacy Issues in a Virtual Learning Environment. , 1998 .

[2]  Miroslaw Malek,et al.  Comprehensive logfiles for autonomic systems , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[3]  Fatos Xhafa,et al.  A Grid Approach to Efficiently Embed Information and Knowledge about Group Activity into Collaborative Learning Applications , 2008, The Learning Grid Handbook.

[4]  Georgios Kambourakis,et al.  A PKI approach for deploying modern secure distributed e-learning and m-learning environments , 2007, Comput. Educ..

[5]  Santi Caballé,et al.  Providing Security to Computer-Supported Collaborative Learning: An Overview , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[6]  Christian J. Eibl Privacy and Confidentiality in E-Learning Systems , 2009, 2009 Fourth International Conference on Internet and Web Applications and Services.

[7]  Santi Caballé,et al.  Information Security in Support for Mobile Collaborative Learning , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.

[8]  Timothy Koschmann,et al.  Cscl : Theory and Practice of An Emerging Paradigm , 1996 .

[9]  Zheng Wu,et al.  A Taxonomy of Network and Computer Attacks Based on Responses , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.

[10]  Elisa Bertino,et al.  An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.

[11]  Wolfgang Prinz,et al.  What groupware functionality do users really use?: A study of collaboration within digital ecosystems , 2013, 2013 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST).

[12]  Indrajit Ray,et al.  A Vector Model of Trust for Developing Trustworthy Systems , 2004, ESORICS.

[13]  Fatos Xhafa,et al.  A Grid-Aware Implementation for Providing Effective Feedback to On-Line Learning Groups , 2005, OTM Workshops.

[14]  S Hailes,et al.  Using Recommendations for Managing Trust in Distributed Systems , 1997 .

[15]  Edgar R. Weippl Security in e-learning , 2005, ELERN.

[16]  Hossein Bidgoli Key concepts, infrastructure, standards, and protocols , 2006 .

[17]  Fatos Xhafa,et al.  Distributed-based massive processing of activity logs for efficient user modeling in a Virtual Campus , 2013, Cluster Computing.

[18]  Fatos Xhafa,et al.  A parallel grid-based implementation for real-time processing of event log data of collaborative applications , 2010, Int. J. Web Grid Serv..

[19]  Andreas Pfitzmann,et al.  Privacy-Aware eLearning: Why and How , 2005 .

[20]  Victor Ciesielski,et al.  Data Mining of Web Access Logs From an Academic Web Site , 2003, HIS.

[21]  Timothy Koschmann,et al.  Paradigm Shift s and Instructional Technology , 1996 .

[22]  Sayalee Narkhede,et al.  HMR Log Analyzer: Analyze Web Application Logs Over Hadoop MapReduce , 2013 .

[23]  Christian J. Eibl Discussion of information security in e-learning , 2010 .

[24]  Wolfgang Appelt What groupware functionality do users really use? Analysis of the usage of the BSCW system , 2001, Proceedings Ninth Euromicro Workshop on Parallel and Distributed Processing.

[25]  Bamshad Mobasher,et al.  Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .

[26]  Santi Caballé,et al.  Providing Information Security to MOOC: Towards Effective Student Authentication , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[27]  P. Dillenbourg What do you mean by collaborative learning , 1999 .

[28]  Bruce Schneier,et al.  The psychology of security , 2007, CACM.