Managing Shared Technology Vulnerabilities: Effective Approach to Building Trust in Cloud-Based E-Learning System
Author(s):
Uchechukwu P. Emejeamara, Udochukwu J. Nwoduh, Catherine C. Asamonye PhD
Keywords:
E-learning, cloud computing, cloud encryption, Cloud service provider, Hardware Security Module, Key generation
Abstract
E-learning is a significant technological advancement that can help educational institutions foster a better learning environment for students as well as improved efficiency of education. For easier access in E-Learning, cloud computing is adopted which is comprised of a variety of computing resources from server and storage to other applications. However, the use of cloud computing is limited by security concerns brought by its multitenant nature, as well as the cloud service provider having remote control of its security and license issues. This research paper finds cloud encryption and key management crucial for addressing these shared technology vulnerabilities. The inherent trust issues associated with cloud-based e-learning system can be effectively resolved by choosing a reliable cloud service provider as well as adapting methods that can increase the security of the cloud such as providing Hardware Security Module service, external key generation for encryption use, and proper organization of files in the cloud.
Article Details
Unique Paper ID: 149912

Publication Volume & Issue: Volume 7, Issue 2

Page(s): 22 - 27
Article Preview & Download


Share This Article

Go To Issue



Call For Paper

Volume 7 Issue 1

Last Date 25 June 2020


About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:+91 820 061 5067
Email: editor@ijirt.org
Website: ijirt.org

Policies