A Secure Mobile Learning Framework based on Cloud
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 10
Abstract
With the rising need for highly advanced and digital learning coupled with the growing penetration of smartphones has contributed to the growth of Mobile Learning. According to Ericsson’s forecast, 80% of the world’s population (6.4 billion people) will be Smartphone users by 2021. But the existing Mobile Learning Frameworks has some limitations that need to be addressed for mass adaptation, limitations include device compatibility and security. In this paper we propose a Secure Mobile Learning Framework (SMLF) based on TPM in the cloud. SMLF is supported by three layers Communication Module (CM) which helps in ensuring end to end security. In addition to this we propose a procedure for personalizing mobile learning applications of the student and instructors. We also propose a secure mobile learning protocol in SMLF framework. Proposed SMLF ensures mutual authentication of all the stakeholders, privacy of the message, integrity of the message, and anonymity of the student from the instructor and non-repudiation and is free from known attacks. Our proposed SMLF framework is successfully verified using BAN logic.
Authors and Affiliations
Mohammad Al Shehri
Answer Extraction System Based on Latent Dirichlet Allocation
Question Answering (QA) task is still an active area of research in information retrieval. A variety of methods which have been proposed in the literature during the last few decades to solve this task have achieved mixe...
Cloud Computing: Pricing Model
Cloud computing is the elemental aspect for online security of computing resources. It helps on-demand dividing of resources and cost between a major number of end users. It provides end users to process, manage, and sto...
Towards an Adaptive Learning System Based on a New Learning Object Granularity Approach
To achieve the adaptability required in ALS, adaptive learning system (ALS) takes advantage of granular and reusable content. The main goal of this paper is to examine the learning object granularity issue which is direc...
Analyzing the Efficiency of Text-to-Image Encryption Algorithm
Today many of the activities are performed online through the Internet. One of the methods used to protect the data while sending it through the Internet is cryptography. In a previous work we proposed the Text-to-Image...
Holistic Evaluation Framework for Automated Bug Triage Systems: Integration of Developer Performance
Bug Triage is an important aspect of Open Source Software Development. Automated Bug Triage system is essential to reduce the cost and effort incurred by manual Bug Triage. At present, the metrics that are available in t...