Skip to main content
Erschienen in: Information Systems Frontiers 1/2021

25.02.2020

Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom

verfasst von: Davy Preuveneers, Giuseppe Garofalo, Wouter Joosen

Erschienen in: Information Systems Frontiers | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Learning management systems are service platforms that support the administration and delivery of training programs and educational courses. Prerecorded, real-time or interactive lectures can be offered in blended, flipped or fully online classrooms. A key challenge with such service platforms is the adequate monitoring of engagement, as it is an early indicator for a student’s learning achievements. Indeed, observing the behavior of the audience and keeping the participants engaged is not only a challenge in a face-to-face setting where students and teachers share the same physical learning environment, but definitely when students participate remotely. In this work, we present a hybrid cloud and edge-based service orchestration framework for multi-modal engagement analysis. We implemented and evaluated an edge-based browser solution for the analysis of different behavior modalities with cross-user aggregation through secure multiparty computation. Compared to contemporary online learning systems, the advantages of our hybrid cloud-edge based solution are twofold. It scales up with a growing number of students, and also mitigates privacy concerns in an era where the rise of analytics in online learning raises questions about the responsible use of data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard, M., Kudlur, M., Levenberg, J., Monga, R., Moore, S., Murray, D.G., Steiner, B., Tucker, P., Vasudevan, V., Warden, P., Wicke, M., Yu, Y., Zheng, X. (2016a) Tensorow: A system for large-scale machine learning. In: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation. pp. 265–283. Berkeley: OSDI'16, USENIX Association. http://dl.acm.org/citation.cfm?id=3026877.3026899 Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard, M., Kudlur, M., Levenberg, J., Monga, R., Moore, S., Murray, D.G., Steiner, B., Tucker, P., Vasudevan, V., Warden, P., Wicke, M., Yu, Y., Zheng, X. (2016a) Tensorow: A system for large-scale machine learning. In: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation. pp. 265–283. Berkeley: OSDI'16, USENIX Association. http://​dl.​acm.​org/​citation.​cfm?​id=​3026877.​3026899
Zurück zum Zitat Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., Zhang, L. (2016b) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. pp. 308–318. ACM. Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., Zhang, L. (2016b) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. pp. 308–318. ACM.
Zurück zum Zitat Abbas, N., Zhang, Y., Taherkordi, A., & Skeie, T. (2018). Mobile edge computing: A survey. IEEE Internet of Things Journal, 5(1), 450–465.CrossRef Abbas, N., Zhang, Y., Taherkordi, A., & Skeie, T. (2018). Mobile edge computing: A survey. IEEE Internet of Things Journal, 5(1), 450–465.CrossRef
Zurück zum Zitat de Assuncao, M. D., da Silva Veith, A., & Buyya, R. (2018). Distributed data stream processing and edge computing: A survey on resource elasticity and future directions. Journal of Network and Computer Applications, 103, 1–17.CrossRef de Assuncao, M. D., da Silva Veith, A., & Buyya, R. (2018). Distributed data stream processing and edge computing: A survey on resource elasticity and future directions. Journal of Network and Computer Applications, 103, 1–17.CrossRef
Zurück zum Zitat Baker, R.S. (2007) Modeling and understanding students off-task behavior in intelligent tutoring systems. In: Proceedings of the SIGCHI Conference on Hu- man Factors in Computing Systems. pp. 1059–1068. New York: CHI '07, ACM. https://doi.org/10.1145/1240624.1240785. Baker, R.S. (2007) Modeling and understanding students off-task behavior in intelligent tutoring systems. In: Proceedings of the SIGCHI Conference on Hu- man Factors in Computing Systems. pp. 1059–1068. New York: CHI '07, ACM. https://​doi.​org/​10.​1145/​1240624.​1240785.
Zurück zum Zitat Beimel, A. (2011) Secret-sharing schemes: a survey. In: International Conference on Coding and Cryptology. pp. 11–46. Springer. Beimel, A. (2011) Secret-sharing schemes: a survey. In: International Conference on Coding and Cryptology. pp. 11–46. Springer.
Zurück zum Zitat Bonomi, F., Milito, R., Natarajan, P., Zhu, J. (2014) Fog computing: A platform for internet of things and analytics. In: Big data and internet of things: A roadmap for smart environments, pp. 169–186. Springer. Bonomi, F., Milito, R., Natarajan, P., Zhu, J. (2014) Fog computing: A platform for internet of things and analytics. In: Big data and internet of things: A roadmap for smart environments, pp. 169–186. Springer.
Zurück zum Zitat Bonomi, F., Milito, R., Zhu, J., MAddepalliilito, S. (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. pp. 13–16. New York: MCC '12, ACM. https://doi.org/10.1145/2342509.2342513. Bonomi, F., Milito, R., Zhu, J., MAddepalliilito, S. (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. pp. 13–16. New York: MCC '12, ACM. https://​doi.​org/​10.​1145/​2342509.​2342513.
Zurück zum Zitat Cetintas, S., Si, L., Xin, Y.P., Hord, C., Zhang, D. (2009) Learning to identify students' off-task behavior in intelligent tutoring systems. In: Proceedings of the 2009 Conference on Artificial Intelligence in Education: Building Learning Systems That Care: From Knowledge Representation to Affective Modelling. pp. 701–703. Amsterdam: IOS Press, http://dl.acm.org/citation.cfm?id=1659450.1659578 Cetintas, S., Si, L., Xin, Y.P., Hord, C., Zhang, D. (2009) Learning to identify students' off-task behavior in intelligent tutoring systems. In: Proceedings of the 2009 Conference on Artificial Intelligence in Education: Building Learning Systems That Care: From Knowledge Representation to Affective Modelling. pp. 701–703. Amsterdam: IOS Press, http://​dl.​acm.​org/​citation.​cfm?​id=​1659450.​1659578
Zurück zum Zitat Cramer, R., Damgrd, I. B., & Nielsen, J. B. (2015). Secure Multiparty Computation and Secret Sharing (1st ed.). New York, NY, USA: Cambridge University Press.CrossRef Cramer, R., Damgrd, I. B., & Nielsen, J. B. (2015). Secure Multiparty Computation and Secret Sharing (1st ed.). New York, NY, USA: Cambridge University Press.CrossRef
Zurück zum Zitat Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J., Métayer, D.L., Tirtea, R., Schiffner, S. (2015) Privacy and data protection by design - from policy to engineering. CoRR abs/1501.03726, http://arxiv.org/abs/1501.03726 Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J., Métayer, D.L., Tirtea, R., Schiffner, S. (2015) Privacy and data protection by design - from policy to engineering. CoRR abs/1501.03726, http://​arxiv.​org/​abs/​1501.​03726
Zurück zum Zitat Daniel, B.K. (2016) Big data and learning analytics in higher education. Springer. Daniel, B.K. (2016) Big data and learning analytics in higher education. Springer.
Zurück zum Zitat van Dijk, M., Gentry, C., Halevi, S., & Vaikuntanathan, V. (2010). Fully homomorphic encryption over the integers. In H. Gilbert (Ed.), Advances in Cryptology – EUROCRYPT 2010 (pp. 24–43). Berlin Heidelberg, Berlin, Heidelberg: Springer.CrossRef van Dijk, M., Gentry, C., Halevi, S., & Vaikuntanathan, V. (2010). Fully homomorphic encryption over the integers. In H. Gilbert (Ed.), Advances in Cryptology – EUROCRYPT 2010 (pp. 24–43). Berlin Heidelberg, Berlin, Heidelberg: Springer.CrossRef
Zurück zum Zitat Dwork, C. (2011) Differential privacy. Encyclopedia of Cryptography and Security pp. 338–340. Dwork, C. (2011) Differential privacy. Encyclopedia of Cryptography and Security pp. 338–340.
Zurück zum Zitat El-Yahyaoui, A., El Kettani, M.D.E.C. (2017) Fully homomorphic encryption: Searching over encrypted cloud data. In: Proceedings of the 2Nd International Conference on Big Data, Cloud and Applications. pp. 10:1–10:5. New York: BDCA'17, ACM. https://doi.org/10.1145/3090354.3090364 El-Yahyaoui, A., El Kettani, M.D.E.C. (2017) Fully homomorphic encryption: Searching over encrypted cloud data. In: Proceedings of the 2Nd International Conference on Big Data, Cloud and Applications. pp. 10:1–10:5. New York: BDCA'17, ACM. https://​doi.​org/​10.​1145/​3090354.​3090364
Zurück zum Zitat Gong, L., Liu, Y., Zhao, W. (2018) Using learning analytics to promote student engagement and achievement in blended learning: An empirical study. In: Proceedings of the 2Nd International Conference on E-Education, E-Business and E-Technology. pp. 19–24. New York: ICEBT 2018, ACM. https://doi.org/10.1145/3241748.3241760. Gong, L., Liu, Y., Zhao, W. (2018) Using learning analytics to promote student engagement and achievement in blended learning: An empirical study. In: Proceedings of the 2Nd International Conference on E-Education, E-Business and E-Technology. pp. 19–24. New York: ICEBT 2018, ACM. https://​doi.​org/​10.​1145/​3241748.​3241760.
Zurück zum Zitat He, J., Wei, J., Chen, K., Tang, Z., Zhou, Y., & Zhang, Y. (2018). Multitier fog computing with large-scale iot data analytics for smart cities. IEEE Internet of Things Journal, 5(2), 677–686.CrossRef He, J., Wei, J., Chen, K., Tang, Z., Zhou, Y., & Zhang, Y. (2018). Multitier fog computing with large-scale iot data analytics for smart cities. IEEE Internet of Things Journal, 5(2), 677–686.CrossRef
Zurück zum Zitat Hukkelås, H., Mester, R., Lindseth, F.(2019) DeepPrivacy: A Generative Adversarial Network for Face Anonymization. arXiv e-prints arXiv:1909.04538. Hukkelås, H., Mester, R., Lindseth, F.(2019) DeepPrivacy: A Generative Adversarial Network for Face Anonymization. arXiv e-prints arXiv:1909.04538.
Zurück zum Zitat Kawamura, R., Toyoda, Y., Niinuma, K. (2019) Engagement estimation based on synchrony of head movements: Application to actual e-learning scenarios. In: Proceedings of the 24th International Conference on Intelligent User Interfaces: Companion. pp. 25–26. New York: IUI '19, ACM. https://doi.org/10.1145/3308557.3308660. Kawamura, R., Toyoda, Y., Niinuma, K. (2019) Engagement estimation based on synchrony of head movements: Application to actual e-learning scenarios. In: Proceedings of the 24th International Conference on Intelligent User Interfaces: Companion. pp. 25–26. New York: IUI '19, ACM. https://​doi.​org/​10.​1145/​3308557.​3308660.
Zurück zum Zitat Krawiecka, K., Kurnikov, A., Paverd, A., Mannan, M., Asokan, N. (2018) Safekeeper: Protecting web passwords using trusted execution environments. In: Proceedings of the 2018 World Wide Web Conference. pp. 349–358. WWW '18, International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland., https://doi.org/10.1145/3178876.3186101. Krawiecka, K., Kurnikov, A., Paverd, A., Mannan, M., Asokan, N. (2018) Safekeeper: Protecting web passwords using trusted execution environments. In: Proceedings of the 2018 World Wide Web Conference. pp. 349–358. WWW '18, International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland., https://​doi.​org/​10.​1145/​3178876.​3186101.
Zurück zum Zitat Li, N., Li, T., Venkatasubramanian, S. (2007) t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering. pp. 106–115. IEEE. Li, N., Li, T., Venkatasubramanian, S. (2007) t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering. pp. 106–115. IEEE.
Zurück zum Zitat Lorenz, B., Sousa, S., & Tomberg, V. (2013). Privacy awareness of students and its impact on online learning participation – a case study. In T. Ley, M. Ruohonen, M. Laanpere, & A. Tatnall (Eds.), Open and Social Technologies for Networked Learning. pp. 189–192. Berlin Heidelberg, Berlin, Heidelberg: Springer. Lorenz, B., Sousa, S., & Tomberg, V. (2013). Privacy awareness of students and its impact on online learning participation – a case study. In T. Ley, M. Ruohonen, M. Laanpere, & A. Tatnall (Eds.), Open and Social Technologies for Networked Learning. pp. 189–192. Berlin Heidelberg, Berlin, Heidelberg: Springer.
Zurück zum Zitat Ma, X., Zhang, F., Chen, X., & Shen, J. (2018). Privacy preserving multi-party computation delegation for deep learning in cloud computing. Information Sciences, 459, 103–116.CrossRef Ma, X., Zhang, F., Chen, X., & Shen, J. (2018). Privacy preserving multi-party computation delegation for deep learning in cloud computing. Information Sciences, 459, 103–116.CrossRef
Zurück zum Zitat Mohan, P., Thakurta, A., Shi, E., Song, D., Culler, D. (2012) Gupt: Privacy preserving data analysis made easy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. pp. 349–360. New York: SIGMOD '12, ACM https://doi.org/10.1145/2213836.2213876. Mohan, P., Thakurta, A., Shi, E., Song, D., Culler, D. (2012) Gupt: Privacy preserving data analysis made easy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. pp. 349–360. New York: SIGMOD '12, ACM https://​doi.​org/​10.​1145/​2213836.​2213876.
Zurück zum Zitat Prabhakaran, M., & Sahai, A. (2013). Secure Multi-Party Computation. Amsterdam, The Netherlands, The Netherlands: IOS Press. Prabhakaran, M., & Sahai, A. (2013). Secure Multi-Party Computation. Amsterdam, The Netherlands, The Netherlands: IOS Press.
Zurück zum Zitat Preuveneers, D., Joosen, W. (2019) Edge-based and privacy-preserving multi-modal monitoring of student engagement in online learning environments. In: Proceedings of the IEEE International Conference on Edge Computing (IEEE EDGE 2019). pp. 1–3. IEEE. Preuveneers, D., Joosen, W. (2019) Edge-based and privacy-preserving multi-modal monitoring of student engagement in online learning environments. In: Proceedings of the IEEE International Conference on Edge Computing (IEEE EDGE 2019). pp. 1–3. IEEE.
Zurück zum Zitat Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.CrossRef Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.CrossRef
Zurück zum Zitat Satyanarayanan, M. (2017). The emergence of edge computing. Computer, 50(1), 30–39.CrossRef Satyanarayanan, M. (2017). The emergence of edge computing. Computer, 50(1), 30–39.CrossRef
Zurück zum Zitat Shan, Z., Ren, K., Blanton, M., & Wang, C. (2018). Practical secure computation outsourcing: a survey. ACM Computing Surveys (CSUR), 51(2), 31.CrossRef Shan, Z., Ren, K., Blanton, M., & Wang, C. (2018). Practical secure computation outsourcing: a survey. ACM Computing Surveys (CSUR), 51(2), 31.CrossRef
Zurück zum Zitat Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and challenges. IEEE Internet of Things Journal, 3(5), 637–646.CrossRef Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and challenges. IEEE Internet of Things Journal, 3(5), 637–646.CrossRef
Zurück zum Zitat Thomas, C., Jayagopi, D.B. (2017) Predicting student engagement in classrooms using facial behavioral cues. In: Proceedings of the 1st ACM SIGCHI International Workshop on Multimodal Interaction for Education. pp. 33–40. New York: MIE 2017, ACM https://doi.org/10.1145/3139513.3139514. Thomas, C., Jayagopi, D.B. (2017) Predicting student engagement in classrooms using facial behavioral cues. In: Proceedings of the 1st ACM SIGCHI International Workshop on Multimodal Interaction for Education. pp. 33–40. New York: MIE 2017, ACM https://​doi.​org/​10.​1145/​3139513.​3139514.
Zurück zum Zitat Yang, B., Gu, F., Niu, X. (2006) Block mean value based image perceptual hashing. In: Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia. pp. 167–172.Washington: IIH-MSP '06, IEEE Computer Society. https://doi.org/10.1109/IIH-MSP.2006.66. Yang, B., Gu, F., Niu, X. (2006) Block mean value based image perceptual hashing. In: Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia. pp. 167–172.Washington: IIH-MSP '06, IEEE Computer Society. https://​doi.​org/​10.​1109/​IIH-MSP.​2006.​66.
Zurück zum Zitat Yi, S., Hao, Z., Qin, Z., Li, Q. (2015) Fog computing: Platform and applications. In: 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb). pp. 73–78. IEEE. Yi, S., Hao, Z., Qin, Z., Li, Q. (2015) Fog computing: Platform and applications. In: 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb). pp. 73–78. IEEE.
Metadaten
Titel
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom
verfasst von
Davy Preuveneers
Giuseppe Garofalo
Wouter Joosen
Publikationsdatum
25.02.2020
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 1/2021
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-020-09993-4

Weitere Artikel der Ausgabe 1/2021

Information Systems Frontiers 1/2021 Zur Ausgabe

Premium Partner