Transcript
  • 8/13/2019 101 Rad Unitech 2013konGROUNDS AND SECURITY ISSUES IN CLOUD BASED E-LEARNING OF THE ENGLISH LANGU

    1/6

    INTERNATIONAL SCIENTIFIC CONFERENCE

    22 23 November 2013, GABROVO

    GROUNDS AND SECURITY ISSUES IN CLOUD BASED E-LEARNING OF

    TE ENGLIS LANGUAGE

    D!"#$! %#&o'ev#(Technical College VTS, Ni, Serbia

    Bor#vo)e %#&o'ev#( %#&!" %#)!&*ov#(Technical College VTS, Ni, Serbia VISER, Beograd, Serbia

    Ab'+r!$+

    Cloud computing provides an efficient, scalable and costeffective !a" for organi#ations to provide business or

    consumer IT services over the Internet$ %ifferent models of cloud computing are available, providing a solid support

    for core business functions and fle&ibilit" to deliver ne! services$ 'o!ever, the fle&ibilit" and openness of the Cloud

    computing model has created a large number of securit" problems$ This paper !ill sho! that the problems of securit" in aCloud E(earning s"stem ma" occur in the application of learning English in schools$

    e.or/'keywords, keywords, keywords, keywords, keywords, keywords, keywords.

    INTRODUCTION

    Nowadays, many technologies which are

    making human life easier are introduced

    almost every day. Web-based technologies, for

    instance, [3] contribute greatly to the reduction

    of efforts that users have to make in order to

    obtain a required iece of information.!eanwhile, many institutions and universities

    are introducing new courses that rovide

    knowledge about these technologies, making it

    easier for users to coe with them. "owever,

    such institutions generally face a shortage of

    e#erienced teachers who are resonsible for

    holding technical courses. $o overcome this

    roblem, online education services are

    introduced for a range of different courses

    based on the %nternet latform. &loud

    comuting, as one of the internet latforms is ahighly fle#ible, cost-effective and ''user

    friendly'' latform, whose main task is to

    deliver and rovide business or consumer %$

    services over the internet. &loud resource

    systems are evolving very raidly, along with

    all the rocesses, alications, and services

    obtained '' on demand (, regardless of the

    user's location or device within a broadband

    %nternet network. $hey reresent a large ool

    of easily usable and accessible virtuali)edresources *such as hardware, develoment

    latforms and + or services. $hese resources

    can be dynamically refigured to adat to the

    varying scale load, which also enables the

    otimal utili)ation of resources. &loud

    comuting customers can use one or more

    &loud comuting services based on their

    business needs. artner and orrester offered

    the following definition of &loud comuting

    which can be seen as/() st"le of computing !here scalable and

    elastic ITenabled capabilities are delivered

    as a service to e&ternal customers using

    Internet technologies$,( or/

    (Standardi#ed, highl" scalable and

    controlled computer infrastructure over the

    Internet host applications, intended for end

    users, !ho are charged for services based on

    the actual usage$(

    $his aer discusses the alication of a

    new technology in &loud comuting system ofelectronic learning and its security. 0sers can,

    by virtue of the authori)ation system and 1!2

    *1earning !anagement 2ystem access -

    learning alications from any comuter.

    $oday, it is quite common that these systems

    are installed on web servers located in schools,

    colleges, universities, or any other tye of

    organi)ation. $hese alications offer the

    ossibility to create -learning courses, which

    thus become the sites for osting and sharing

    teaching ublications and materials,

    erforming online discussions and lectures,

    *+-./012-/0 /0.3/0 42/5+1+/678 9:;? @AD F0G12H2

  • 8/13/2019 101 Rad Unitech 2013konGROUNDS AND SECURITY ISSUES IN CLOUD BASED E-LEARNING OF THE ENGLISH LANGU

    2/6

    holding teacher seminars and resenting final

    and other aers, etc.

    "ardware devices such as 456s, mobile

    hones, standard comuters, ortable

    comuters, and software alications such as

    Web browsers or &loud comuting, have

    become the most oular latforms in allbusiness sectors today thanks to their caacity

    to reduce the full costs of using software

    alications and hardware.

    E - LEARNING CLOUD

    $he nglish language - learning based on

    &loud technology is a subset of &loud

    &omuting alied to the field of education.

    $he future for the develoment of

    technology and -learning infrastructure is

    bright. - learning based on &loud has all thenecessary resources, such as hardware and

    software, as well as the management system of

    reort to enhance traditional learning

    infrastructure , ig. 7.

    Figure 1.odel of integrated learning managements"stem

    2ince educational material for the nglish

    language -learning systems is reresented in

    virtual &loud servers, this material is available

    for students and other educational institutions

    and businesses to use. $he rocess begins withlearners or users sending a request to the web

    ortal. $hen, the request travels through the

    system8s management which is resonsible for

    the decision on the aroriate kind of

    resources. 1earners who use this service

    receive the information uon their request after

    which the required resources are delivered to

    them. $he last art is evaluation.

    %t is imortant to distinguish between two

    &loud environments that offer students and

    other users a wide range of services [3] for-learning/

    V(E JVirtual (earning EnvironmentK is an

    electronic latform that can be used to track

    and rovide e-learning courses and enhance

    face-to-face instruction with online

    comonents. 4rimarily it automates the

    administration of learning by facilitating and

    then recording learner8s activity.$he second service is L(E JLersonal

    (earning EnvironmentK, which aeared in the

    last few years as a new wave of web

    technologies such as blogs, wikis, and social

    software, known as Web 9.:. L(Ehas become

    a ma;or technology that suorts content

    ublishing over the %nternet. or instance, Web

    9.: allows eole to create, ublish, e#change,

    share, and cooerate on information in a new

    way of communication and collaboration.

    6lying Web 9.: technologies to e-learningcan enhance interactive communication and

    collaboration among articiants and learners

    who either ossess related learning resources,

    or can hel each other discover and obtain the

    resources, or are willing to e#change and share

    the resources with others in the Web-based

    learning. %n Web 9.:, learners can read and

    write to the Web, in which learners become

    both the consumers and roducers of learning

    resources. $hus, Web 9.: rovides a learning

    environment which has the otential to

    fundamentally change the nature of learning

    and teaching, through the creation of learner

    -controlled web.

    5eveloing of -learning is more e#ensive

    than rearing classroom materials and

    training the teachers, esecially if multimedia

    or highly interactive methods are used, ig. 9.

    Figure 2$ %eveloping an Elearning model

    $here are at least two entities involved in an

    -learning system/ students * who take online

    courses and e#ams, send feedback, homework

    and ro;ects

  • 8/13/2019 101 Rad Unitech 2013konGROUNDS AND SECURITY ISSUES IN CLOUD BASED E-LEARNING OF THE ENGLISH LANGU

    3/6

    set homework assignments and send feedback

    to students ig. 3.

    Figure 3$ Communication and Elearning users

    =ased on this figure, we can conclude that

    this is a three-tier - learning &loudarchitecture system with 4hysical "ardware,

    >irtual 2torages and !achines and &loud

    !anagement 2ystem. $his is e#lained in the

    following ig. ?.

    Figure 4$ Mvervie! of a Cloud architecture for

    E(earning

    $here are a lot of benefits in using &loud

    systems for -1earning/

    or users, advantages of using the system

    are the following /

    @ 0sers of the system for -learning do not

    need to have high-erformance comuters to

    run their alications. $hey can be started

    from &loud latforms, while services are aid

    on a ay- as-you -go basis. i#ed monthly

    costs are low since &loud comuting networks

    are taking advantage by bringing large

    numbers - millions of users, and the low cost

    of oeration at information centers, which aremanaged from another location.

    @ $here is no u-front investment in

    hardware, which is articularly attractive to

    small and medium educational institutions,

    enterrises and newly founded comanies.

    2ince the alications are rocessed on a

    &loud latform, client machines cannot face

    roblems in their work.@ 2ince the alications for e-learning are

    centered on the owerful &loud servers, the

    software can automatically udate with &loud

    sources. $here is no need to install and

    maintain servers, manage suerstructure or

    care about whether the software is comatible

    with the hardware or not.

    @ 6lso, there is no need for license

    management alications.

    @ 2tudents and other users have numerous

    advantages using &louds for -learning . $heycan run on- line courses, attend on- line e#ams,

    receive feedback from rofessors and

    instructors, and send their ro;ects and secial

    assignments to be assesed. $he system can

    easily adat to the needs of more users or

    additional services - or it can reduce the

    activity when the demand for services

    seasonally decreases.

    @ %f any of the fonts and format documents

    do not oen roerly on other devices, users of

    &loud systems do not have to worry about this

    since such documents are now oen directly to

    the &loud system. $herefore, there is a

    ossibility to access documents from any kind

    of machine instead of being attached to a

    articular device.

    @ $he system can be e#anded, and does not

    have to be urchased, which is beneficial to

    the comanies that are still develoing.

    Benefits to the teachers are great as welland only some of them will be mentioned

    below /

    @ $he teachers reare online offers for

    student testing and teaching, create better

    resources for students through the content

    management. $hey can access tests and the

    content of students' home ro;ects that the

    students have done. $hey also send feedback

    and communicate with students through on -

    line forums.

    6s we have seen, -learning aroachescan combine different tyes of -learning

    comonents [7] ,$able 7.

    *+-./012-/0 /0.3/0 42/5+1+/678 9:;? @AD F0G12H2

  • 8/13/2019 101 Rad Unitech 2013konGROUNDS AND SECURITY ISSUES IN CLOUD BASED E-LEARNING OF THE ENGLISH LANGU

    4/6

    Te' Como"e"+' De'$r#+#o"

    E-&e!r"#"

    $o"+e"+

    S#m&e

    &e!r"#"

    re'or$e'

    2imle learning resources are non-interactive resources such as documents, 4ower4oint resentations, videos oraudio files. $hese materials are non-interactive in the sense that learners can only read or watch content without

    erforming any other action.

    I"+er!$+#ve

    E-&e''o"'

    $he most common aroach for self-aced e-learning is Web-based training consisting of a set of interactive e-

    lessons. 6n e-lesson is a linear sequence of screens which can include te#t, grahics, animations, audio, video

    and interactivity in the form of questions and feedback. -lessons can also include recommended reading and

    links to online resources, as well as additional information on secific toics.

    E&e$+ro"#$

    '#m&!+#o"'

    2imulations are highly interactive forms of e-learning. $he term AsimulationB basically means creating a

    learning environment that AsimulatesB the real world, allowing the learner to learn by doing. 2imulations aresecific forms of Web-based training that immerse the learner in a real-world situation and resond in a

    dynamic way to his+her behaviour.

    4ob !#/'

    Cob aids rovide ;ust-in-time knowledge. $hey can take several forms and be delivered on different latforms

    *e.g. comuter, rinted document, mobile hone. $hey usually rovide immediate answers to secific

    questions, thus heling users accomlish ;ob tasks. $echnical glossaries and checklists are ;ust a few e#amles

    of simle ;ob aids, but sohisticated e#ert systems can also be develoed to assist workers in comle#decision-making situations.

    E-++or#",

    E-$o!$5#",

    E-me"+or#"

    -

    2ervices which rovide human and social dimensions can be offered to learners to suort them through thelearning e#erience. -tutoring, -coaching and -mentoring rovide individual suort and feedback to

    learners through online tools and facilitation techniques.

    Co&&!bor!+#ve

    &e!r"#"

    O""e

    /#'$''#o"'

    2ynchronous and asynchronous online discussions are designed to facilitate communication and knowledge-

    sharing among learners. 1earners can comment and e#change ideas about course activities or contribute to

    grou learning by sharing their knowledge.

    Co&&!bor!+#o"&ollaborative ro;ect work imlies collaboration among learners to erform a task. &ollaborative activities can

    include ro;ect work and scenario-based assignments.

    V#r+!&

    $&!''room-

    6 virtual classroom is an - learning event where an instructor teaches remotely and in real time to a grou of

    learners using a combination of materials *e.g. 4ower4oint slides, audio or video materials. %t is also called

    synchronous learning. $his method requires the least amount of effort to convert materials *but instructors stillhave to reare them. 6roriate technology must be in lace for both the learners and roviders *e.g.

    software for the virtual classroom and good connectivity.

    Table 1$ Elearning components

    $here are many instructional system

    design models, most of which are based on

    &loud systems, resented in the diagrams

    below.

    6dating e#isting models to match secific

    needs is wiser than roceeding without any

    lan. "owever, fle#ibility is needed to select

    and adat a model to a given situation.

    -learning ro;ects vary considerably in com-

    le#ity and si)e. $he rocess described below

    is comrehensive-it covers all the otions thatcan be included in a comle# learning ro;ect.

    "owever, some of the stes can be skied or

    simlified according to the ro;ect8s

    ob;ectives and requirements, such as budget,

    e#ertise or organi)ational constraints.

    $he basic rincile of &loud -learning,

    alied to any form of the curriculum or

    course, lies in the fact that the teacher, in

    terms of mass instruction is transferring art

    of his+her functions to the secial devices for

    learning, which in this case allows thefulfillment of all the imortant conditions

    which are otherwise ossible only in

    individual work. $hese are/

    @ simultaneous accetance of ieces of

    information from individual students, their

    analysis and understanding@ simultaneous tutoring of each student,

    using the methods that are otirmal for each

    student

    @ simultaneous teaching erformance at a

    ace that suits each student individually

    @ simultaneous decision-making on otimal

    ways for training students

    @ simultaneous revision of student work

    and feedback information on the accuracy of

    each resonse, creating a ositive motivation

    for every student@ simultaneous reetition of information

    after which a student gave an incorrect answer

    as many times as it takes each student to

    understand the given roblem *information

    and give the correct answer to the question

    @ 6voidance of all the sub;ective factors of

    teachers, which influenced e#amination and

    assessment of the students8 knowledge, or

    determination of the roficiency level of the

    rogrammed material.

    $o build and start the ro;ect of &loud -learning of nglish, three roblems must be

    solved.

    *+-./012-/0 /0.3/0 42/5+1+/678 9:;? @AD F0G12H2

  • 8/13/2019 101 Rad Unitech 2013konGROUNDS AND SECURITY ISSUES IN CLOUD BASED E-LEARNING OF THE ENGLISH LANGU

    5/6

    $he first consists in drawing rogrammedbooks, bearing in mind the very motodicalsensitivity of the material for learning. 0singthe technique of linear or branched rogram-ming, books can be rogrammed relying onone of ordinary te#tbooks so that the entirematerial can be slit on many small logical

    entities *units of information. $he distancebetween them is called (a ste of rogrammedlearning(. 5eending on the model, a stemay be long or short. 6fter each unit ofinformation is resented to a student, thestudent receives questions and is given theoortunity to resond to them, choosing oneof the given otions or filling in a ga, withhis+her own resonse. 6fter answering thequestions, if the answers are correct, the stu-dent gets a new unit of information relying onthe logical sequence, or is informed about the

    nature of the error, after which he+she is for-ced to study again the information after whichhe+she gave the wrong answer. "owever,starting from the ossibility that an ordinaryte#tbook in terms of its content can be dif-ficult to gras and not always user-friendly,the material for learning will not become easi-er and more understandable by being rog-rammed. $he e#isting coursebook needs to berevised by creating a more suitable model. 6

    rogrammed te#tbook can be considered asemi-automatic (device( for learning, since it

    rovides information on student8s work andthe material he+she should master.

    $he second roblem is the rearation of thealication or alications and achieving theiralgorithmic - logical correctness. $his roblemis much easier to solve, because it deends onthe skill of the teacher, rogrammer and theknowledge of the rogramming techniques. $healication is usually written in one of the oeninteractive languages and enables work on thedislay and keyboard as inut-outut units.Dutut data, which are given after each chaterand rocessed at the end of the rogram, deliverthe reort on errors, number of asses throughthe rogrammed material and the time sentlearning *to establish the level of roficiency ofthe rogrammed material and contain diag-nostic information that would serve to identifythe shortcomings in the analysis of the students'answers. $his would hel to remove (bottle-necks( and (tight laces( from the rogram inorder to obtain otimal rograms which willenable uils to acquire the entire rogrammedmaterial with ma#imum efficiency andminimum time.

    $he third roblem is the hysical orga-ni)ation of the classroom for rogrammed

    learning, or selection of an alication for&loud - 1earning *whether it will be!oodle, 2&DE! &loud, oogle,World4ress, &loud 5rual, etc.

    $he quality of an -learning &loud courseis enhanced by/

    @ 1earner-centred content/ -learningcurricula should be relevant and secific tolearners8 needs, roles and resonsibilities in

    rofessional life. 2kills, knowledge andinformation should be rovided to this end.

    @ ranularity/ -learning content shouldbe segmented to facilitate assimilation of newknowledge and allow fle#ible scheduling oftime for learning.

    @ ngaging content/ %nstructional methodsand techniques should be used creatively todevelo an engaging and motivating learninge#erience.

    @ %nteractivity/ requent learner interactionis needed to sustain attention and romotelearning.

    @ 4ersonali)ation/ 2elf-aced coursesshould be customi)able to reflect learners8interests and needsF in instructor-led courses,tutors and facilitators should be able to followthe learners8 rogress and erformanceindividually.

    SECURITY IN E-LEARNING CLOUD

    2ecurity, digital identity and access control*authori)ation, authentication, and access

    control is a core oint for organi)ation of -

    learning &loud systems, which are looking for

    the aroriate standards that can be imle-

    mented across business systems and between

    university institutions. ach ste of inter-

    action between the two systems requires an

    indeendent identity and access management

    requirements.

    inal solution will be quite comlicated

    since it will require a set of standards, adetailed analysis of the interaction and the

    aroriate standards to be alied at each

    ste together with the suort in legal, social

    and economic conditions for their alication.

    $he rincial risks [3], which in this case can

    occur are given in $able 9.

    Co"6#/e"+#!+

    V#o&!+#o"

    Onauthori#ed user gains access to

    the s"stem for E(earning

    I"+er#+V#o&!+#o"

    Onauthori#ed access to the user

    name advantage, leading to thedesired state of the s"stem forElearning$

    De"#!& o6 Lreventing legitimate access rights

    *+-./012-/0 /0.3/0 42/5+1+/678 9:;? @AD F0G12H2

  • 8/13/2019 101 Rad Unitech 2013konGROUNDS AND SECURITY ISSUES IN CLOUD BASED E-LEARNING OF THE ENGLISH LANGU

    6/6

    Serv#$e

    to interfere !ith traffic during thetransactions bet!een users of

    Elearning$

    I&&e#+#m!+e 'eE&ploitation of privilege legitimateusers$

    %!$#o'

    ror!m

    (ines of code that harm other

    programs$

    Re/#!+#o"%enial of participation of users inan" transaction documents$

    %!'7er!/eBehavior that hides the true event id

    b" hacPers$

    Tr!66#$ !"!&'#'(eaPage of information misuse!ithin communication channel$

    Br+e-6or$e

    !++!$*

    Tr" to get all the possible

    combinations reveal it correct$

    Table 2$ Basic risP

    %n a ;oint - learning &loud environment,customers want to ensure that all domainmembers are roerly isolated and that there

    is no ossibility that the data and transactionfees have leaked from one of the followingdomains.

    $o achieve this, customers need the abilityto configure security virtual domain or

    roerly based security )one. 6s the data isgetting out of the clients8 control, the systemis e#ected to detect and revent the attack tothe environment. Eemoval of the data toe#ternal services creates additional concernsabout internal and %nternet-based denial ofservice *5D2 or distributed denial of service

    *55o2 attacks, from various virus attacks like2am, WDE!, $ro;ans, and $radoors, ig. G.

    $herefore the following measures must be

    rovided for/

    Securit" management - [9] deals with the%nternet and network to rotect and ensure theuser safety, information security, serversecurity from various attacks, and rotect thetotal system.

    Information securit" - $he securitymeasures taken by the organisation or the

    individual user to rotect the informationfrom being stolen from their system byhackers and unauthorised ersons.

    Server Securit"- $he security of servers isimortant because servers deal with the dataof a large number of individuals andorganisations. $herefore, server security andserver management is a big issue due towhich numerous security measures are takento save the data in server from hackers andnatural disasters.

    Figure 5$ Seven threats to securit" in Cloud

    computing E(earning

    )uthentication- is a method which helsavoid

    intruders to hack the roduct or access the

    roducts8 functionality to create malfunctions.

    End Oser -=ased on the e#ectation and

    demand of the end user, the comaniesmodify their roducts till the user becomes

    satisfied with the roducts of the comany.

    CONCLUSION

    &loud comuting model has created a large

    number of security roblems. "uge amounts

    of %$ resources are divided among many users

    and security rocesses are often hidden

    behind layers of abstraction. &loud comuting

    is often offered as a service, so that the

    control of the data and oeration switches to

    indeendent service roviders, demanding

    that their clients establish a trust relationshi

    with their rovider and develo solutions for

    the security that this relationshi takes into

    account.

    REFERENCE

    [7]E learning methodologies, Hnowledge#change and Eesearch, Eome, %taly, 9:79.

    [9] unasekar Humar, 6nirudh &helikani,)nal"sis of securit" issues in Cloud based Elearning, 0niversity of =orIs, 2weden, 9:77.

    [3] =orivo;e !iloJeviK, 2lobodan DbradoviK,ElePtronsPo uiQene ba#irano na Cloud

    platformama, L0 %ND 9:73, 2erbia.[?] =linco H., !ason C., !c1ean N., Wilson 2.,

    ATrends and Issues in ElearningInfrastructure %evelopmentD, 4reared on

    behalf of 52$ *6ustralia and C%2&-&$%2*0H, Culy 9::?.

    *+-./012-/0 /0.3/0 42/5+1+/678 9:;? @AD F0G12H2


Top Related