Skip to main content
Top
Published in: Wireless Personal Communications 2/2023

18-03-2023

Enhancing Data Security of Cloud Based LMS

Authors: Paramita Chatterjee, Rajesh Bose, Subhasish Banerjee, Sandip Roy

Published in: Wireless Personal Communications | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Around the world, the educational system is evolving. The new trend can be found in traditional classroom systems as well as digitalization systems. Cloud-based Learning Management Systems (LMS) will accelerate the educational industry forward in the next years because they can provide end—user with a versatile, convenient, secure, and cost-effective learning process. The cloud-based LMS approach is the most effective and proper learning model in the worldwide educational sector, particularly if the organization is in a state of depression owing to a global pandemic. It can be utilized over the internet with several users on the same platform. As a result, the initial requirement is important to enable to the LMS model. Despite its many advantages, LMS confronts challenges such as confidentiality, user acceptance, and traffic. In a pandemic like Covid 19, the entire planet depends on a safe LMS platform to establish student and instructor trust. Therefore, with this work, the attempt has been made to explain one LMS model that may provide its users with optimal security, a user-friendly environment, and quick access. This paper discusses the use of the cloud attack, and also cryptographic and steganographic security models and techniques to address these issues. There’s also information on what kinds of security vulnerabilities or operations on cloud data are feasible, and also how to deal with them using various algorithms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Maitri, P.V., & Verma, A. (2016). Secure file storage in cloud computing using hybrid cryptography algorithm. In Proceedings of the IEEE WiSPNET 2016 conference (pp.1635–1638). IEEE. Maitri, P.V., & Verma, A. (2016). Secure file storage in cloud computing using hybrid cryptography algorithm. In Proceedings of the IEEE WiSPNET 2016 conference (pp.1635–1638). IEEE.
2.
go back to reference Dharmakeerthi, T. (2020). A study on secure file storage in cloud computing using cryptography. Sri Lanka Institute of Information Technology. 1–4. Dharmakeerthi, T. (2020). A study on secure file storage in cloud computing using cryptography. Sri Lanka Institute of Information Technology. 1–4.
3.
go back to reference Vurukonda, N., Thirumala Rao, B. (2016) A study on data storage security issues in cloud computing. In Proceedings of the 2nd international conference on intelligent computing, communication & convergence (ICCC-2016). Procedia Computer Science, ScienceDirect. (Vol. 92, pp.128–135). Elsevier. Vurukonda, N., Thirumala Rao, B. (2016) A study on data storage security issues in cloud computing. In Proceedings of the 2nd international conference on intelligent computing, communication & convergence (ICCC-2016). Procedia Computer Science, ScienceDirect. (Vol. 92, pp.128–135). Elsevier.
4.
go back to reference Chatterjee, P., Bose, R., Banerjee, S., & Roy, S. (2021). Enhancing the usability of cloud based LMS architecture in Covid pandemic. NVEO-Natural Volatiles & Essential Oils Journal, 8(4), 7490–7511. Chatterjee, P., Bose, R., Banerjee, S., & Roy, S. (2021). Enhancing the usability of cloud based LMS architecture in Covid pandemic. NVEO-Natural Volatiles & Essential Oils Journal, 8(4), 7490–7511.
5.
go back to reference Metcheka, L. M., & Ndoundam, R. (2020). Distributed data hiding in multi-cloudstorage environment. Journal of Cloud Computing: Advances, Systems and Applications, 9, 68.CrossRef Metcheka, L. M., & Ndoundam, R. (2020). Distributed data hiding in multi-cloudstorage environment. Journal of Cloud Computing: Advances, Systems and Applications, 9, 68.CrossRef
6.
go back to reference Thabit, F., Alhomdy, S., Al-Ahdal, A. H., & Jagtap, S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings., 2, 91–99.CrossRef Thabit, F., Alhomdy, S., Al-Ahdal, A. H., & Jagtap, S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings., 2, 91–99.CrossRef
7.
go back to reference Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protectionfor cloud storage: a survey. IEEE Access, 8, 131723–131740. special section on emerging approaches to cyber security.CrossRef Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protectionfor cloud storage: a survey. IEEE Access, 8, 131723–131740. special section on emerging approaches to cyber security.CrossRef
8.
go back to reference Akeel, W., & Hashim, A. (2017). Using steganography for secure data storage in cloud computing. International Research Journal of Engineering and Technology (IRJET), 4(4), 3668–3672. Akeel, W., & Hashim, A. (2017). Using steganography for secure data storage in cloud computing. International Research Journal of Engineering and Technology (IRJET), 4(4), 3668–3672.
9.
go back to reference D’Souza, R. B., & Ruby, D. (2021). Secure file storage on cloud using enhanced hybrid cryptography. International Research Journal of Engineering and Technology (IRJET), 8(3), 294–298. D’Souza, R. B., & Ruby, D. (2021). Secure file storage on cloud using enhanced hybrid cryptography. International Research Journal of Engineering and Technology (IRJET), 8(3), 294–298.
10.
go back to reference Kanatt, S., Jadhav, A., & Talwar, P. (2020). Review of secure file storage on cloud using hybrid cryptography. International Journal of Engineering Research & Technology (IJERT), 9(2), 16–20. Kanatt, S., Jadhav, A., & Talwar, P. (2020). Review of secure file storage on cloud using hybrid cryptography. International Journal of Engineering Research & Technology (IJERT), 9(2), 16–20.
11.
go back to reference Poduval, V., Koul, A., Rebello, D., Bhat, K., & Wahul, R. M. (2020). Cloud based secure storage of files using hybrid cryptography and image steganography. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 665–667.CrossRef Poduval, V., Koul, A., Rebello, D., Bhat, K., & Wahul, R. M. (2020). Cloud based secure storage of files using hybrid cryptography and image steganography. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 665–667.CrossRef
12.
go back to reference Ibrahim, D. S. (2019). Enhancing cloud computing security using cryptography & steganography. Iraqi Journal of Information Technology, 9(3), 191–224. Ibrahim, D. S. (2019). Enhancing cloud computing security using cryptography & steganography. Iraqi Journal of Information Technology, 9(3), 191–224.
13.
go back to reference Fateh, M., Rezvani, M., & Irani, Y. (2021). A new method of coding for steganography based on lsb matching revisited. Hindawi Security and Communication Networks, 2021(6610678), 1–15. Fateh, M., Rezvani, M., & Irani, Y. (2021). A new method of coding for steganography based on lsb matching revisited. Hindawi Security and Communication Networks, 2021(6610678), 1–15.
14.
go back to reference Amarendra, K., Mandhala, V. N., Chetan Gupta, B., Sudheshna, G. G., & Anusha, V. V. (2019). Image steganography using LSB. International Journal of Scientific & Technology Research, 8(12), 906–909. Amarendra, K., Mandhala, V. N., Chetan Gupta, B., Sudheshna, G. G., & Anusha, V. V. (2019). Image steganography using LSB. International Journal of Scientific & Technology Research, 8(12), 906–909.
15.
go back to reference Albalawi, A., & Hamza, N. (2020). A survey on cloud data security using image steganography. International Journal of Advanced Computer Science and Applications, 11(1), 645–649.CrossRef Albalawi, A., & Hamza, N. (2020). A survey on cloud data security using image steganography. International Journal of Advanced Computer Science and Applications, 11(1), 645–649.CrossRef
16.
go back to reference Kumar, U., & Prakash, J. (2020). Secure file storage on cloud using hybrid cryptography algorithm. International Journal of Creative Research Thoughts, 8(7), 334–340. Kumar, U., & Prakash, J. (2020). Secure file storage on cloud using hybrid cryptography algorithm. International Journal of Creative Research Thoughts, 8(7), 334–340.
17.
go back to reference Cataltas, O., & Tutuncu, K. (2017). Improvement of LSB based image steganography. In Proceedings of research world international conference, Rome (pp. 36–40). Cataltas, O., & Tutuncu, K. (2017). Improvement of LSB based image steganography. In Proceedings of research world international conference, Rome (pp. 36–40).
18.
go back to reference Gabriel, A.J., Adetunmbi, A.O., & Obaila, P. (2020). A two-layer image-steganography systemfor covert communication over enterprise network. Proceedings of ICCSA 2020, LNCS 12254 (pp. 459–470), Springer Nature. Gabriel, A.J., Adetunmbi, A.O., & Obaila, P. (2020). A two-layer image-steganography systemfor covert communication over enterprise network. Proceedings of ICCSA 2020, LNCS 12254 (pp. 459–470), Springer Nature.
19.
go back to reference Verma, D. C., Mohapatra, A. K., & Usmani, K. (2012). Light weight encryption technique for group communication in cloud computing environment. International Journal of Computer Applications, 49(8), 36–41.CrossRef Verma, D. C., Mohapatra, A. K., & Usmani, K. (2012). Light weight encryption technique for group communication in cloud computing environment. International Journal of Computer Applications, 49(8), 36–41.CrossRef
20.
go back to reference Gulhane, K. V., & Dalvi, G. D. (2016). Low Latency for file encryption and decryption using BRA algorithm for secure transmission of data. International Journal of Science and Research, 5(12), 1531–1535. Gulhane, K. V., & Dalvi, G. D. (2016). Low Latency for file encryption and decryption using BRA algorithm for secure transmission of data. International Journal of Science and Research, 5(12), 1531–1535.
21.
go back to reference Ismail, M., & Yusuf, B. (2016). Ensuring data storage security in cloud computing with advanced encryption standard (AES) and authentication scheme (AS). International Journal of Information System and Engineering, 4(1), 18–39. Ismail, M., & Yusuf, B. (2016). Ensuring data storage security in cloud computing with advanced encryption standard (AES) and authentication scheme (AS). International Journal of Information System and Engineering, 4(1), 18–39.
22.
go back to reference Anjali, D. V., & Chandrashekara, S. N. (2016). Design and implementation of secure cloud storage system using hybrid cryptography algorithms with role based access control model. International Journal of Engineering and Technical Research, 5(1), 104–107. Anjali, D. V., & Chandrashekara, S. N. (2016). Design and implementation of secure cloud storage system using hybrid cryptography algorithms with role based access control model. International Journal of Engineering and Technical Research, 5(1), 104–107.
23.
go back to reference Jebaseeli, K. K., & Rani, V. G. (2019). Security incursion and cryptography quick fix for data accumulated in cloud storage. Journal of Emerging Technologies and Innovative Research, 6(3), 345–350. Jebaseeli, K. K., & Rani, V. G. (2019). Security incursion and cryptography quick fix for data accumulated in cloud storage. Journal of Emerging Technologies and Innovative Research, 6(3), 345–350.
24.
go back to reference Zheng, Q., Wang, X., Khan, M. K., Zhang, W., Gupta, B. B., & Guo, W. (2018). A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access, 6, 711–722. Special section on recent advances in computational intelligence paradigmsfor security and privacy for fog and mobile edge computing.CrossRef Zheng, Q., Wang, X., Khan, M. K., Zhang, W., Gupta, B. B., & Guo, W. (2018). A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access, 6, 711–722. Special section on recent advances in computational intelligence paradigmsfor security and privacy for fog and mobile edge computing.CrossRef
25.
go back to reference Sivan, R., & Zukerman, Z. A. (2021). Security and privacy in cloud-based E-health system. Symmetry, 13, 742.CrossRef Sivan, R., & Zukerman, Z. A. (2021). Security and privacy in cloud-based E-health system. Symmetry, 13, 742.CrossRef
26.
go back to reference Shen, J., Deng, X., & Xu, Z. (2019). Multi-security-level cloud storagesystem based on improved proxyre-encryption. EURASIP Journal on Wireless Communications and Networking. 1–12. Shen, J., Deng, X., & Xu, Z. (2019). Multi-security-level cloud storagesystem based on improved proxyre-encryption. EURASIP Journal on Wireless Communications and Networking. 1–12.
27.
go back to reference Tarekegn, G. B., Abadi Maru, G., & Liyew, H. Z. (2016). Privacy and security issues in cloud computing. International Journal of Current Research, 8(07), 34894–34898. Tarekegn, G. B., Abadi Maru, G., & Liyew, H. Z. (2016). Privacy and security issues in cloud computing. International Journal of Current Research, 8(07), 34894–34898.
28.
go back to reference Wang, R. (2017). Research on data security technology based on cloud storage. In Proceedings of the 13th global congress on manufacturing and management, GCMM 2016, Procedia Engineering (Vol. 174, pp. 1340–1355). Elsevier. Wang, R. (2017). Research on data security technology based on cloud storage. In Proceedings of the 13th global congress on manufacturing and management, GCMM 2016, Procedia Engineering (Vol. 174, pp. 1340–1355). Elsevier.
29.
go back to reference Sirohi, A. (2015). A secure and adaptable cloud data encryption system using cryptography: A review. International Journal for Research in Applied Science & Engineering Technology, 3(III), 1–8. Sirohi, A. (2015). A secure and adaptable cloud data encryption system using cryptography: A review. International Journal for Research in Applied Science & Engineering Technology, 3(III), 1–8.
30.
go back to reference Malviya, S., & Dave, S. (2018). Secure Data sharing scheme using cryptographic algorithm for cloud storage. International Journal of Applied Engineering Research, 13(20), 14799–14805. Malviya, S., & Dave, S. (2018). Secure Data sharing scheme using cryptographic algorithm for cloud storage. International Journal of Applied Engineering Research, 13(20), 14799–14805.
31.
go back to reference Reddy, P. M. (2019). Hybrid crypto system for cloud storage security using MECC and Native bayes classifer A review. International Journal of Computer Sciences and Engineering, 7(6), 87–90.MathSciNet Reddy, P. M. (2019). Hybrid crypto system for cloud storage security using MECC and Native bayes classifer A review. International Journal of Computer Sciences and Engineering, 7(6), 87–90.MathSciNet
32.
go back to reference Tawalbeh, L., Darwazeh, N. S., Al-Qassas, R. S., & AlDosari, F. (2015). A secure cloud computing model based on data classification. In Proceedings of the first international workshop on mobile cloud computing systems, management, and security (MCSMS-2015) (Vol. 52, pp.1153–1158). Elsevier. Tawalbeh, L., Darwazeh, N. S., Al-Qassas, R. S., & AlDosari, F. (2015). A secure cloud computing model based on data classification. In Proceedings of the first international workshop on mobile cloud computing systems, management, and security (MCSMS-2015) (Vol. 52, pp.1153–1158). Elsevier.
33.
go back to reference Handa, K., & Singh, U. (2015). Data security in cloud computing using encryption and steganography. International Journal of Computer Science and Mobile Computing, 4(5), 786–791. Handa, K., & Singh, U. (2015). Data security in cloud computing using encryption and steganography. International Journal of Computer Science and Mobile Computing, 4(5), 786–791.
34.
go back to reference Kasapbasi, M. C., & Elmasry, W. (2018). New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check. Indian Academy of Sciences, 1–14. Kasapbasi, M. C., & Elmasry, W. (2018). New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check. Indian Academy of Sciences, 1–14.
35.
go back to reference Akeel, W., & Hashim, A. (2017). Using steganography for secure data storage in cloud computing. International Research Journal of Engineering and Technology, 4(4), 3668–3672. Akeel, W., & Hashim, A. (2017). Using steganography for secure data storage in cloud computing. International Research Journal of Engineering and Technology, 4(4), 3668–3672.
36.
go back to reference Singh, A. K., Singh, J., & Singh, H. V. (2015). Steganography in images using LSB technique. International Journal of Latest Trends in Engineering and Technology, 5(1), 426–430.MathSciNet Singh, A. K., Singh, J., & Singh, H. V. (2015). Steganography in images using LSB technique. International Journal of Latest Trends in Engineering and Technology, 5(1), 426–430.MathSciNet
37.
go back to reference Karuna Jyothi, K., & Indira Reddy, B. (2018). Study on virtual private network (VPN), VPN’s protocols and security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3(5), 919–932. Karuna Jyothi, K., & Indira Reddy, B. (2018). Study on virtual private network (VPN), VPN’s protocols and security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3(5), 919–932.
38.
go back to reference Zhang, Z., Chandel, S., Sun, J., Yan, S., Yu, Y., & Zang, J. (2018). VPN: a boon or trap? A comparative study of MPLs, IPSec, and SSL virtual private networks. In Proceedings of the 2018 2nd international conference on computing methodologies and communication (ICCMC), (IEEE), Erode, India (pp. 510–515). Zhang, Z., Chandel, S., Sun, J., Yan, S., Yu, Y., & Zang, J. (2018). VPN: a boon or trap? A comparative study of MPLs, IPSec, and SSL virtual private networks. In Proceedings of the 2018 2nd international conference on computing methodologies and communication (ICCMC), (IEEE), Erode, India (pp. 510–515).
39.
go back to reference Ikram, M., Vallina-Rodriguez, N., Seneviratne, S., Kaafar, M. A., & Paxson, V. (2016). An analysis of the privacy and security risks of android VPN permission-enabled apps. In Proceedings of the 2016 internet measurement conference, Santa Monica, CA, USA, (ACM) (pp. 349–364). Ikram, M., Vallina-Rodriguez, N., Seneviratne, S., Kaafar, M. A., & Paxson, V. (2016). An analysis of the privacy and security risks of android VPN permission-enabled apps. In Proceedings of the 2016 internet measurement conference, Santa Monica, CA, USA, (ACM) (pp. 349–364).
40.
go back to reference Mukhopadhyay, B., Bose, R., & Roy, S. (2020). A novel approach to load balancing and cloud computing security using SSL in IaaS environment. International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 2362–2370.CrossRef Mukhopadhyay, B., Bose, R., & Roy, S. (2020). A novel approach to load balancing and cloud computing security using SSL in IaaS environment. International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 2362–2370.CrossRef
Metadata
Title
Enhancing Data Security of Cloud Based LMS
Authors
Paramita Chatterjee
Rajesh Bose
Subhasish Banerjee
Sandip Roy
Publication date
18-03-2023
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10323-5

Other articles of this Issue 2/2023

Wireless Personal Communications 2/2023 Go to the issue