Managing Shared Technology Vulnerabilities: Effective Approach to Building Trust in Cloud-Based E-Learning System
Author(s):
Uchechukwu P. Emejeamara, Udochukwu J. Nwoduh, Catherine C. Asamonye PhD
Keywords:
E-learning, cloud computing, cloud encryption, Cloud service provider, Hardware Security Module, Key generation
Abstract
E-learning is a significant technological advancement that can help educational institutions foster a better learning environment for students as well as improved efficiency of education. For easier access in E-Learning, cloud computing is adopted which is comprised of a variety of computing resources from server and storage to other applications. However, the use of cloud computing is limited by security concerns brought by its multitenant nature, as well as the cloud service provider having remote control of its security and license issues. This research paper finds cloud encryption and key management crucial for addressing these shared technology vulnerabilities. The inherent trust issues associated with cloud-based e-learning system can be effectively resolved by choosing a reliable cloud service provider as well as adapting methods that can increase the security of the cloud such as providing Hardware Security Module service, external key generation for encryption use, and proper organization of files in the cloud.
Article Details
Unique Paper ID: 149912

Publication Volume & Issue: Volume 7, Issue 2

Page(s): 22 - 27
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews