Skip to main content
Erschienen in: Mobile Networks and Applications 2/2023

18.01.2020

Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System

verfasst von: Samina Kausar, Xu Huahu, Ata Ullah, Zhu Wenhao, Muhammad Yasir Shabir

Erschienen in: Mobile Networks and Applications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

E-learning systems are getting growing interest due to their wide applicability in distance education. A huge amount of data is shared among students, teachers, examiners that should be exchanged in a confidential manner. In literature, a number of related clustering-based schemes are explored that consider security but still there is a need for dependable secure schemes. This paper explores a Secure E-learning System (SES) for sharing examinations related materials by ensuring protection against various security attacks. Exam materials include tests, quizzes, question papers, answer sheets, and aptitude tests. In the first phase, we present a secure authentication mechanism for students and teachers with a trusted server or a fog server. Next, we present a Session Key Establishment Protocol (SKEP) to setup keys for a specified time period such as a class, seminar or exam. We have also maintained the level of trust and authentication level to regularly check the legitimacy of the students. A security analysis is performed to highlight the pros and cons of security schemes to ensure reliable security for e-learning systems. We have setup a testbed using web-services in ASP.​net and C# on windows Azure cloud for an e-learning scenario. Results demonstrate the effectiveness of the proposed SES in terms of reducing number of untrusted students, exams exposed, student interaction time, authentication level, reputation and trust levels for students.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Mehmood R, Alam F, Albogami N, Katib I, Albeshri A, Altowaijri S (2017) UTiLearn: a personalised ubiquitous teaching and learning system for smart societies. IEEE Access 5:2615–2635CrossRef Mehmood R, Alam F, Albogami N, Katib I, Albeshri A, Altowaijri S (2017) UTiLearn: a personalised ubiquitous teaching and learning system for smart societies. IEEE Access 5:2615–2635CrossRef
2.
Zurück zum Zitat Mehmood R, See S, Katib I, Chlamtac I (2019) Smart infrastructure and applications: foundations for smarter cities and societies. Springer, Cham, Switzerland Mehmood R, See S, Katib I, Chlamtac I (2019) Smart infrastructure and applications: foundations for smarter cities and societies. Springer, Cham, Switzerland
3.
Zurück zum Zitat Mehmood R, Bhaduri B, Katib I, Chlamtac I (2018) Smart societies infrastructure technologies and applications, vol 224. Springer, Cham, SwitzerlandCrossRef Mehmood R, Bhaduri B, Katib I, Chlamtac I (2018) Smart societies infrastructure technologies and applications, vol 224. Springer, Cham, SwitzerlandCrossRef
4.
Zurück zum Zitat Chen Y, He W (2013) Security risks and protection in online learning: a survey. Int Rev Res Open Dist Learn 14(5):108–127 Chen Y, He W (2013) Security risks and protection in online learning: a survey. Int Rev Res Open Dist Learn 14(5):108–127
5.
Zurück zum Zitat Alam F, Mehmood R, Katib I, Albogami N, Albeshri A (2017) Data fusion and IoT for smart ubiquitous environments: a survey. IEEE Access 5:9533–9554CrossRef Alam F, Mehmood R, Katib I, Albogami N, Albeshri A (2017) Data fusion and IoT for smart ubiquitous environments: a survey. IEEE Access 5:9533–9554CrossRef
6.
Zurück zum Zitat Stergiou C, Plageras A, Psannis KE, Gupta B (2019) Secure machine learning scenario from big data in cloud computing via internet of things network. Springer, Handbook of Computer Networks and Cyber Security: Principles and Paradigms, Multimedia Systems and Applications Stergiou C, Plageras A, Psannis KE, Gupta B (2019) Secure machine learning scenario from big data in cloud computing via internet of things network. Springer, Handbook of Computer Networks and Cyber Security: Principles and Paradigms, Multimedia Systems and Applications
7.
Zurück zum Zitat Farouk E-SH, Al TA, Alghatani K, El-Seoud AS (2013) The impact of cloud computing technologies in E-learning. International Journal of Emerging Technologies in Learning (iJET) 8:37–43CrossRef Farouk E-SH, Al TA, Alghatani K, El-Seoud AS (2013) The impact of cloud computing technologies in E-learning. International Journal of Emerging Technologies in Learning (iJET) 8:37–43CrossRef
8.
Zurück zum Zitat Muhammed T, Mehmood R, Albeshri A, Katib I (2018) UbeHealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6:32258–32285CrossRef Muhammed T, Mehmood R, Albeshri A, Katib I (2018) UbeHealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6:32258–32285CrossRef
9.
Zurück zum Zitat Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864CrossRef Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864CrossRef
10.
Zurück zum Zitat Atlam H, Walters R, Wills G (2018) Fog computing and the internet of things: a review. Big Data Cognit Comput 2(2):1–18CrossRef Atlam H, Walters R, Wills G (2018) Fog computing and the internet of things: a review. Big Data Cognit Comput 2(2):1–18CrossRef
11.
Zurück zum Zitat Ullah A, Xiao H, Lilley M, Barker T (2014) Privacy and usability of image and text based challenge questions authentication in online examination. International Conference on Education Technologies and Computers (ICETC): 24–29, Lodz, Poland Ullah A, Xiao H, Lilley M, Barker T (2014) Privacy and usability of image and text based challenge questions authentication in online examination. International Conference on Education Technologies and Computers (ICETC): 24–29, Lodz, Poland
12.
Zurück zum Zitat Zheng M, Bender D (2019) Evaluating outcomes of computer-based classroom testing: student acceptance and impact on learning and exam performance. Med Teacher 41(1):75–82CrossRef Zheng M, Bender D (2019) Evaluating outcomes of computer-based classroom testing: student acceptance and impact on learning and exam performance. Med Teacher 41(1):75–82CrossRef
13.
Zurück zum Zitat Moubayed A, Injadat M, Ali BN, Hanan L, Shami A (2018) E-learning: challenges and research opportunities using machine learning & data analytics. IEEE Access 6:39117–39138CrossRef Moubayed A, Injadat M, Ali BN, Hanan L, Shami A (2018) E-learning: challenges and research opportunities using machine learning & data analytics. IEEE Access 6:39117–39138CrossRef
14.
Zurück zum Zitat Kausar S, Huahu X, Hussain I, Wenhao Z, Zahid M (2018) Integration of data mining clustering approach in the personalized E-learning system. Special Sect AI-Driven Big Data Process: Theory, Method Applic 6:72724–72734 Kausar S, Huahu X, Hussain I, Wenhao Z, Zahid M (2018) Integration of data mining clustering approach in the personalized E-learning system. Special Sect AI-Driven Big Data Process: Theory, Method Applic 6:72724–72734
15.
Zurück zum Zitat Alhamdani W (2013) Secure e-learning and cryptography. IGI Global, USA p. 369 Alhamdani W (2013) Secure e-learning and cryptography. IGI Global, USA p. 369
16.
Zurück zum Zitat Ghafoor AS, Rajper S (2016) E-learners’ behavioral analysis using clustering technique. Int J Comput Sci Inform Sec (IJCSIS) 14(10):377–381 Ghafoor AS, Rajper S (2016) E-learners’ behavioral analysis using clustering technique. Int J Comput Sci Inform Sec (IJCSIS) 14(10):377–381
17.
Zurück zum Zitat Wu Q, Zhan C (2016) Clustering of online learning resources via minimum spanning tree. Asian Assoc Open Univ J 11(2):197–215CrossRef Wu Q, Zhan C (2016) Clustering of online learning resources via minimum spanning tree. Asian Assoc Open Univ J 11(2):197–215CrossRef
18.
Zurück zum Zitat M. Hussain, W. Zhu, W. Zhang and R. A. S. Muhammad, "Student Engagement Predictions in an e-Learning System and Their Impact on Student Course Assessment Scores," Hindawi Computational Intelligence and Neuroscience: 1–22, 2 Octobar 2018 M. Hussain, W. Zhu, W. Zhang and R. A. S. Muhammad, "Student Engagement Predictions in an e-Learning System and Their Impact on Student Course Assessment Scores," Hindawi Computational Intelligence and Neuroscience: 1–22, 2 Octobar 2018
19.
Zurück zum Zitat Shovon IHM, Haque M (2012) An approach of improving Student’s academic performance by using K-means clustering algorithm and decision tree. Int J Adv Comput Sci Appl 3(8):146–149 Shovon IHM, Haque M (2012) An approach of improving Student’s academic performance by using K-means clustering algorithm and decision tree. Int J Adv Comput Sci Appl 3(8):146–149
20.
Zurück zum Zitat Pecori R (2018) Virtual learning architecture enhanced by fog computing and big data streams. Future Internet 10(4):1–18 Pecori R (2018) Virtual learning architecture enhanced by fog computing and big data streams. Future Internet 10(4):1–18
21.
Zurück zum Zitat Ahmad PK, Tanika DS, Indrayadi Y (2015) Developing E-learning system to support teaching and learning activities using DSDM approach. performa 14(1):41–52 Ahmad PK, Tanika DS, Indrayadi Y (2015) Developing E-learning system to support teaching and learning activities using DSDM approach. performa 14(1):41–52
22.
Zurück zum Zitat AjazMoharkan Z, Choudhury T, Chand GSRG (2017) Internet of Things and its applications in E-learning. 3rd IEEE International Conference on Computational Intelligence and Communication Technology: 1–5, Ghaziabad, India AjazMoharkan Z, Choudhury T, Chand GSRG (2017) Internet of Things and its applications in E-learning. 3rd IEEE International Conference on Computational Intelligence and Communication Technology: 1–5, Ghaziabad, India
23.
Zurück zum Zitat Pinjari H, Paul A, Jeon G, Rho S (2018) Context-Driven Mobile Learning Using Fog Computing,," in International Conference on Platform Technology and Service (PlatCon), Jeju: 1–6 Pinjari H, Paul A, Jeon G, Rho S (2018) Context-Driven Mobile Learning Using Fog Computing,," in International Conference on Platform Technology and Service (PlatCon), Jeju: 1–6
24.
Zurück zum Zitat Yamada M, Cuka M, Liu Y, da Matsuo TK, Barolli L (2017) Performance evaluation of an IoT-Based E-Learning Testbed Using Mean-shift Clustering Approach Considering Delta Type of Brain Waves. 31st International Conference on Advanced Information Networking and Applications Workshops: 265–270, Taipei Yamada M, Cuka M, Liu Y, da Matsuo TK, Barolli L (2017) Performance evaluation of an IoT-Based E-Learning Testbed Using Mean-shift Clustering Approach Considering Delta Type of Brain Waves. 31st International Conference on Advanced Information Networking and Applications Workshops: 265–270, Taipei
25.
Zurück zum Zitat Matsuo K, Yamada M, Bylykbashi K, Cuka M, Liu Y, Barolli L (2018) Implementation of an IoT-Based E-learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of Brain Waves. 32nd International Conference on Advanced Information Networking and Applications Workshops: 203–209, Krakow, Poland Matsuo K, Yamada M, Bylykbashi K, Cuka M, Liu Y, Barolli L (2018) Implementation of an IoT-Based E-learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of Brain Waves. 32nd International Conference on Advanced Information Networking and Applications Workshops: 203–209, Krakow, Poland
26.
Zurück zum Zitat Aissaoui K, Azizi M (2017) El-Security: E-learning Systems Security Checker Plug-in. Proceedings of the 2nd international Conference on Big Data, Cloud and Applications: 1–6, Tetouan, Morocco Aissaoui K, Azizi M (2017) El-Security: E-learning Systems Security Checker Plug-in. Proceedings of the 2nd international Conference on Big Data, Cloud and Applications: 1–6, Tetouan, Morocco
27.
Zurück zum Zitat Luminita CD (2011) Information security in E-learning platforms. Procedia - Social Behav Sci 15:2689–2693CrossRef Luminita CD (2011) Information security in E-learning platforms. Procedia - Social Behav Sci 15:2689–2693CrossRef
28.
Zurück zum Zitat Najwa HAM, Fan I-S (2010) E-learning and information security management. Int J Digit Soc 1(2):148–156CrossRef Najwa HAM, Fan I-S (2010) E-learning and information security management. Int J Digit Soc 1(2):148–156CrossRef
29.
Zurück zum Zitat Barik N, Karforma S (2012) Risks and remedies in E-learning system. Int J Netw Sec Applic 4(1):51–59 Barik N, Karforma S (2012) Risks and remedies in E-learning system. Int J Netw Sec Applic 4(1):51–59
30.
Zurück zum Zitat Savulescu C, Polkowski Z, Cosmin D, Elena B (2015) Security in e-learning systems. 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI): 19–24, Bucharest, Romania Savulescu C, Polkowski Z, Cosmin D, Elena B (2015) Security in e-learning systems. 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI): 19–24, Bucharest, Romania
31.
Zurück zum Zitat Singh P, Shende P (2014) Symmetric key cryptography: current trends. Int J Comput Sci Mob Comput 3(12):410–412 Singh P, Shende P (2014) Symmetric key cryptography: current trends. Int J Comput Sci Mob Comput 3(12):410–412
32.
Zurück zum Zitat Thakur J, Kumar N (2011) DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int J Emerg Technol Adv Eng 1(2):6–12 Thakur J, Kumar N (2011) DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int J Emerg Technol Adv Eng 1(2):6–12
33.
Zurück zum Zitat Dutt A, Aghabozrgi S, Maizatul AIB, Mahroeian H (2015) Clustering algorithms applied in educational data mining. Int J Inform Electron Eng 5(2):112–116 Dutt A, Aghabozrgi S, Maizatul AIB, Mahroeian H (2015) Clustering algorithms applied in educational data mining. Int J Inform Electron Eng 5(2):112–116
34.
Zurück zum Zitat Raymond JH (2014) Promoting Education: A State of the Art Machine Learning Framework for Feedback and Monitoring E-Learning Impact. IEEE Global Humanitarian Technology Conference - South Asia Satellite: 251–254, Trivandrum, India Raymond JH (2014) Promoting Education: A State of the Art Machine Learning Framework for Feedback and Monitoring E-Learning Impact. IEEE Global Humanitarian Technology Conference - South Asia Satellite: 251–254, Trivandrum, India
35.
Zurück zum Zitat Moreira D-OPJ, Silva ML, Freitas VD, Marçal VP, Gasparini I, Amaral MA (2002) AdaptWeb: an adaptive web-based courseware. Porto Alegre, Brazil Moreira D-OPJ, Silva ML, Freitas VD, Marçal VP, Gasparini I, Amaral MA (2002) AdaptWeb: an adaptive web-based courseware. Porto Alegre, Brazil
36.
Zurück zum Zitat Schiaffino S, Garcia P, Amandi A (2008) eTeacher: providing personalized assistance to e-learning students. Comput Educ 51(4):1744–1754CrossRef Schiaffino S, Garcia P, Amandi A (2008) eTeacher: providing personalized assistance to e-learning students. Comput Educ 51(4):1744–1754CrossRef
37.
Zurück zum Zitat Gasparini I, Pimenta M, Eyharabide V, Amandi A (2012) Improving user profiling for a richer personalization: modeling context in e-learning. Intelligent and Adaptive Learning Systems: Technology Enhanced Support for Learners and Teachers, IGI Global: 182–197 Gasparini I, Pimenta M, Eyharabide V, Amandi A (2012) Improving user profiling for a richer personalization: modeling context in e-learning. Intelligent and Adaptive Learning Systems: Technology Enhanced Support for Learners and Teachers, IGI Global: 182–197
38.
Zurück zum Zitat Obasa AI, Eludire AA, Ajao TA (2013) A comparative study of synchronous and asynchronous E-learning resources. Int J Innov Res Sci Eng Technol 2(11):5938–5946 Obasa AI, Eludire AA, Ajao TA (2013) A comparative study of synchronous and asynchronous E-learning resources. Int J Innov Res Sci Eng Technol 2(11):5938–5946
39.
Zurück zum Zitat Tabak F, Rampal R (2014) Synchronous e-learning: reflections and design considerations. Int J Educ Dev Using Inf Commun Technol 10(4):80–92 Tabak F, Rampal R (2014) Synchronous e-learning: reflections and design considerations. Int J Educ Dev Using Inf Commun Technol 10(4):80–92
40.
Zurück zum Zitat Akram A, Fu C, Tang Y, Jiang Y, Lin X (2016) Exposing the hidden to the eyes: Analysis of SCHOLAT E-Learning data. IEEE 20th International Conference on Computer Supported Cooperative Work in Design: 693–698, Nanchang, China Akram A, Fu C, Tang Y, Jiang Y, Lin X (2016) Exposing the hidden to the eyes: Analysis of SCHOLAT E-Learning data. IEEE 20th International Conference on Computer Supported Cooperative Work in Design: 693–698, Nanchang, China
41.
Zurück zum Zitat Appiahene P, Serwah S, Mensah C, Bryce K-Y (2018) Application of Wireless Ad-Hoc Networks Model to provide Education to rural Communities in Ghana. International Coference on Applied Sciences and Technology, pp. 114–121, Kumasi-Ghana Appiahene P, Serwah S, Mensah C, Bryce K-Y (2018) Application of Wireless Ad-Hoc Networks Model to provide Education to rural Communities in Ghana. International Coference on Applied Sciences and Technology, pp. 114–121, Kumasi-Ghana
42.
Zurück zum Zitat Beaudin S, Levy Y, Parrish J, Danet T (2016) An empirical study of authentication methods to secure e-learning system activities against impersonation fraud. Online J Appl Knowl Manag: 42–61 Beaudin S, Levy Y, Parrish J, Danet T (2016) An empirical study of authentication methods to secure e-learning system activities against impersonation fraud. Online J Appl Knowl Manag: 42–61
43.
Zurück zum Zitat Alajmi QA, Kamaludin A, Abdullah AR, Al-Sharafi MA (2018) The effectiveness of cloud-based E-learning towards quality of academic services: an Omanis’ expert view. Int J Adv Comput Sci Appl 9(4):158–164 Alajmi QA, Kamaludin A, Abdullah AR, Al-Sharafi MA (2018) The effectiveness of cloud-based E-learning towards quality of academic services: an Omanis’ expert view. Int J Adv Comput Sci Appl 9(4):158–164
44.
Zurück zum Zitat Kashyap R (2019) Biometric authentication techniques and E-learning. Biometric Authentication in Online Learning Environments: 1–30 Kashyap R (2019) Biometric authentication techniques and E-learning. Biometric Authentication in Online Learning Environments: 1–30
45.
Zurück zum Zitat Khlifi Y, El-Sabagh H (2017) A novel authentication scheme for E-assessments based on student behavior over E-learning platform. iJET 12(4):62–89 Khlifi Y, El-Sabagh H (2017) A novel authentication scheme for E-assessments based on student behavior over E-learning platform. iJET 12(4):62–89
46.
Zurück zum Zitat Fadhel N, Wills G, Argles D (2011) Transparent authentication in E-learning. International Conference on Information Society: 336–342, London, UK Fadhel N, Wills G, Argles D (2011) Transparent authentication in E-learning. International Conference on Information Society: 336–342, London, UK
47.
Zurück zum Zitat Okada A, Whitelock D, Holmes W, Edwards C (2019) E-authentication for online assessment: a mixed-method study. Br J Educ Technol 50(2):861–875CrossRef Okada A, Whitelock D, Holmes W, Edwards C (2019) E-authentication for online assessment: a mixed-method study. Br J Educ Technol 50(2):861–875CrossRef
48.
Zurück zum Zitat Schneier B (1996) Applied cryptography, John Wiley & Sons Schneier B (1996) Applied cryptography, John Wiley & Sons
49.
Zurück zum Zitat Jayasena K, Song H (2017) Private cloud with E-learning for resources sharing in university environment. In: Vincenti G, Bucciero A, Helfert M, Glowatz M (eds) E-learning, E-Education, and Online Training. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, Cham, pp 169–180CrossRef Jayasena K, Song H (2017) Private cloud with E-learning for resources sharing in university environment. In: Vincenti G, Bucciero A, Helfert M, Glowatz M (eds) E-learning, E-Education, and Online Training. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, Cham, pp 169–180CrossRef
50.
Zurück zum Zitat El-Sofany H, El-Seoud S, Farouk R (2019) Studying the effect of using E-learning through secure cloud computing systems. In: Auer M, Tsiatsos T (eds) The challenges of the digital transformation in education. ICL 2018. Advances in Intelligent Systems and Computing. Springer, Cham El-Sofany H, El-Seoud S, Farouk R (2019) Studying the effect of using E-learning through secure cloud computing systems. In: Auer M, Tsiatsos T (eds) The challenges of the digital transformation in education. ICL 2018. Advances in Intelligent Systems and Computing. Springer, Cham
51.
Zurück zum Zitat Schiavone E, Ceccarelli A, Bondavalli A (2016) Continuous authentication and non-repudiation for the security of critical systems. IEEE 35th Symposium on Reliable Distributed Systems, Budapest, Hungary Schiavone E, Ceccarelli A, Bondavalli A (2016) Continuous authentication and non-repudiation for the security of critical systems. IEEE 35th Symposium on Reliable Distributed Systems, Budapest, Hungary
52.
Zurück zum Zitat Suciu G, Anwar M, Istrate C (2019) Mobile application and Wi-Fi network security for e-learning platforms. The International Scientific Conference eLearning and Software for Education: 393–399, Bucharest Suciu G, Anwar M, Istrate C (2019) Mobile application and Wi-Fi network security for e-learning platforms. The International Scientific Conference eLearning and Software for Education: 393–399, Bucharest
53.
Zurück zum Zitat Bhatia M, Maitra JK (2018) E-learning Platforms Security Issues and Vulnerability Analysis. 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES): 276–285, Lucknow, India Bhatia M, Maitra JK (2018) E-learning Platforms Security Issues and Vulnerability Analysis. 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES): 276–285, Lucknow, India
54.
Zurück zum Zitat Sahaya SJG, Seldev CC (2018) Secure cloud data storage approach in e-learning systems. Clust Comput: 1–6 Sahaya SJG, Seldev CC (2018) Secure cloud data storage approach in e-learning systems. Clust Comput: 1–6
55.
Zurück zum Zitat Siddiqui S, Alam S, Zam K, Gupta A (2019) Cloud-based E-learning: using cloud computing platform for an effective E-learning. In: Tiwari S, Trivedi M, Mishra K, Misra A, Kumar K (eds) Smart Innovations in Communication and Computational ScieSciences. Advances in Intelligent Syst & Computing. Springer, Singapore, pp 335–346 Siddiqui S, Alam S, Zam K, Gupta A (2019) Cloud-based E-learning: using cloud computing platform for an effective E-learning. In: Tiwari S, Trivedi M, Mishra K, Misra A, Kumar K (eds) Smart Innovations in Communication and Computational ScieSciences. Advances in Intelligent Syst & Computing. Springer, Singapore, pp 335–346
Metadaten
Titel
Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System
verfasst von
Samina Kausar
Xu Huahu
Ata Ullah
Zhu Wenhao
Muhammad Yasir Shabir
Publikationsdatum
18.01.2020
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 2/2023
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01429-x

Weitere Artikel der Ausgabe 2/2023

Mobile Networks and Applications 2/2023 Zur Ausgabe

Neuer Inhalt