Security concerns and remedy in a Cloud Based E-learning System

Md. Masud, MD Rafiqul Islam, Jemal Abawajy

Research output: Book chapter/Published conference paperChapter (peer-reviewed)

3 Citations (Scopus)

Abstract

Cloud computing is an emerging technology and it utilizes the cloud power to many technical solutions. The e-learning solution is one of those technologies where it implements the cloud power in its existing system to enhance the functionality providing to e-learners. Cloud technology has numerous advantages over the existing traditional e-learning systems. However security is a major concern in cloud based e-learning. Therefore security measures are unavoidable to prevent the loss of users' valuable data from the security vulnerabilities. This paper investigates various security issues involved in cloud based e-learning technology with an aim to suggest remedial in the form of security measures and security management standards. These will help to overcome the security threats in cloud based e-learning technology. Solving the key problems will also encourage the widespread adoption of cloud computing in educational institutes.
Original languageEnglish
Title of host publicationSecurity and privacy in communication networks
Subtitle of host publicationLecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
EditorsTanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao
Place of PublicationUnited States
PublisherSpringer
Pages356-366
Number of pages11
Volume127
ISBN (Electronic)9783319042831
ISBN (Print)9783319042824
DOIs
Publication statusPublished - 2013

Fingerprint Dive into the research topics of 'Security concerns and remedy in a Cloud Based E-learning System'. Together they form a unique fingerprint.

  • Cite this

    Masud, M., Islam, MD. R., & Abawajy, J. (2013). Security concerns and remedy in a Cloud Based E-learning System. In T. Zia, A. Zomaya, V. Varadharajan, & M. Mao (Eds.), Security and privacy in communication networks: Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 127, pp. 356-366). Springer. https://doi.org/10.1007/978-3-319-04283-1_22