Enhancing Data Security of Cloud Based LMS

被引:4
|
作者
Chatterjee, Paramita [1 ]
Bose, Rajesh [1 ]
Banerjee, Subhasish [2 ]
Roy, Sandip [1 ]
机构
[1] Brainware Univ, Dept Computat Sci, Kolkata, India
[2] Natl Inst Technol, Papum Pare, Arunachal Prade, India
关键词
LMS; Cloud computing; Security; Integrity; Authentication; Cryptography; Virtual reality; Steganography; STORAGE;
D O I
10.1007/s11277-023-10323-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Around the world, the educational system is evolving. The new trend can be found in traditional classroom systems as well as digitalization systems. Cloud-based Learning Management Systems (LMS) will accelerate the educational industry forward in the next years because they can provide end-user with a versatile, convenient, secure, and cost-effective learning process. The cloud-based LMS approach is the most effective and proper learning model in the worldwide educational sector, particularly if the organization is in a state of depression owing to a global pandemic. It can be utilized over the internet with several users on the same platform. As a result, the initial requirement is important to enable to the LMS model. Despite its many advantages, LMS confronts challenges such as confidentiality, user acceptance, and traffic. In a pandemic like Covid 19, the entire planet depends on a safe LMS platform to establish student and instructor trust. Therefore, with this work, the attempt has been made to explain one LMS model that may provide its users with optimal security, a user-friendly environment, and quick access. This paper discusses the use of the cloud attack, and also cryptographic and steganographic security models and techniques to address these issues. There's also information on what kinds of security vulnerabilities or operations on cloud data are feasible, and also how to deal with them using various algorithms.
引用
收藏
页码:1123 / 1139
页数:17
相关论文
共 50 条
  • [21] Medical Systems Data Security and Biometric Authentication in Public Cloud Servers
    Santos, Nelson
    Ghita, Bogdan
    Masala, Giovanni Luca
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (02) : 572 - 582
  • [22] A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
    Adee, Rose
    Mouratidis, Haralambos
    SENSORS, 2022, 22 (03)
  • [23] Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach
    Kumar, Pawan
    Kumar Bhatt, Ashutosh
    IET COMMUNICATIONS, 2020, 14 (18) : 3212 - 3222
  • [24] Enhancing the Security of Data Stored in the Cloud using customized Data Visualization Patterns
    Archana, M.
    Murtugudde, Gururaj
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (06) : 604 - 610
  • [25] Data Recovery and Security in Cloud
    Surbiryala, Jayachander
    Rong, Chunming
    2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA), 2018, : 126 - 130
  • [26] A Framework for Cloud Data Security
    Grover, Ankit
    Kaur, Banpreet
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1199 - 1203
  • [27] Ensure Hierarchal Identity Based Data Security in Cloud Environment
    Kaushik, Shweta
    Gandhi, Charu
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (04) : 21 - 36
  • [28] Enhancing Mobile Device Security by Security Level Integration in a Cloud Proxy
    Ruebsamen, Thomas
    Reich, Christoph
    THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012), 2012, : 159 - 168
  • [29] A novel model to enhance the data security in cloud environment
    Verma, Garima
    Kanrar, Soumen
    MULTIAGENT AND GRID SYSTEMS, 2022, 18 (01) : 45 - 63
  • [30] Hybrid Model for Cloud Data Security using Steganography
    Ebrahim, Moshira A.
    El-Maddah, Islam A. M.
    Mohamed, Hoda K.
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 135 - 140