Sharing Students’ Records in Cloud Computing Thesis

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Cloud computing is generally perceived as the next generation computing structure for hosting and delivering economical services such as platform, software, and infrastructure.

Notwithstanding the various advantages and facilities of cloud computing, privacy and security issues remain a basic concern and impair the growth of this technology. Consequently, this research proposal discusses the possibility using attribute-based encryption to achieve secure sharing of students’ cloud-based data.

The proposed pilot study will be performed on a university domain that shares student files and will validate the use of attribute-based encryption system for improving security and enhancing the trust of cloud users. This section presents a background of the privacy and security issues characteristic to cloud systems.

As a result, the importance of using attribute-based encryption to eliminate the security and privacy issues of cloud based systems is highlighted.

Background

There are numerous, related research studies that highlight the significance of students’ record systems for improved effectiveness, better student management (Ewing, 2012), advanced student academic follow-up, strict student privacy (Urtel, 2008), and reduced costs (Stowell, Addison, & Smith, 2012).

Using students’ management software will improve the management of student assessment tests, class attendance, class participation, scores, and GPAs. Students and parents monitor the students’ learning progress and examine other extracurricular activities, such as students’ engagement in sports.

Also, the school board can promptly view the students’ academic records and recommend future career paths for the students.

Students’ electronic recording systems offer potential for improved privacy and higher accessibility to required records. Likewise, with the rapid increase in tablet and smartphone use, more students and instructors are ready to migrate to students’ electronic recording system.

Nevertheless, privacy issues have prevented the implementation of cloud-based students’ recording systems. Mobile devices can be operated in almost every environment and may be used to instantly access various networks, and this exposes them to potential privacy risks.

Thus, it becomes difficult to secure students’ scores on mobile devices without compromising students’ privacy. For instance, a mobile virus harnessed the susceptibility of Android’s browser to circumvent application authorizations and retrieve users’ data.

Therefore, the possible utilization of mobile technology to access students’ records has highlighted the need to create significant methods for safeguarding the privacy of information, inside and outside the school environment.

Importance of Offline Access

Cloud-based academic systems are gaining acceptance by scholarly institutions, offering students access to their academic records through online environments, such as blackboards and portals. Nevertheless, solely depending on a cloud-based server is restrictive, particularly when students need to access course instructions.

Such events make it necessary for students to be offered offline access to their academic records. In case a physical disaster affects connectivity, students’ academic record systems that function online will be inaccessible.

For instance, Hurricane Katrina exposed various issues with existing cloud-based systems (Tang, Ash, Bates, Overhage & Sands, 2006). Offering offline accessibility enables students to move around with their academic records, and allows them to access the records even in the absence of a connected server.

Cloud-based academic systems must be structured to also respond to cyber threats (Tripathi, Delano, Lund & Rudolph, 2009). Data theft, information compromise, and service attacks on cloud-based systems is beyond a hypothetical issue (Prasad & Ahammed, 2014).

Delivering offline access disintegrates the safety of academic records from the system server, thus reducing its security requirements (Prasad & Ahammed, 2014).

Attribute-Based Encryption

The proposed study will use recent advancement in attribute-based encryption (ABE). ABE systems allow individual users to decrypt encrypted text if the individuals’ keys match the explicit attributes that were used to create the ciphered text (Bethencourt, Sahai, & Waters, 2007).

Attribute-based-encryption is an open-key encryption method and allows all users to encode data through restricted key generating systems (Prasad & Ahammed, 2014).

Two formulations usually describe ABE. The cipher-text rule ABE (Bethencourt, Sahai, & Waters, 2007) is a system that combines ciphertexts with guidelines that describe the authorized encoder.

The guidelines are usually communicated as Boolean equations citing a group of characteristics that is integrated with an individual’s personal key.

For instance, given the characteristics Professor, Supervisor, Princeton University (PU), WorldEducationService and Staff, the following sample guideline can obtain data that may be accessed by a PU professor, a supervisor or a staff of World Education Service:

((Professor_ Supervisor) ^ PU) _ (WorldEducationService ^ Staff)

Another variant of attribute-based-encryption is the key policy ABE, which reverses the connection between key and ciphertext. Personal records are labeled with their appropriate attributes (for example, assignment score, and examination grade).

The owner gives access to part of the data by generating specific keys that integrate the policy equation, and suggesting the retrievable data segment.

Collusion resistance is a basic characteristic of all ABE systems and makes it impossible for users to fuse attributes on personal keys to fulfill a specific guideline. For example, the policy below may state that only the staff linked with PU or with the scholarship company may access the students’ current grades:

(ScholarshipCo _ PU) ^ (WorldEducationService ^ Staff)

It is impossible to combine the WES staff’s key with a professor’s key using the ScholarshipCo and Staff attributes (that is, PU attribute) or the scholarship company’s key (that is, ScholarshipCo attribute) to fulfill the requirement.

Here, the WES staff must create a trust association with the school to access PU or ScholarshipCo attributes. Users will be unable to jointly decrypt information they cannot decrypt alone since each personal key is generated with an exclusive random source.

One important advantage of attribute-based encryption is its use of expressive operators. Access guidelines may be written using AND and OR commands, and allow comparison functions.

Number values used for comparison functions are usually expressed as binary attributes so every bit needed to characterize the numeric value matches to a nonnumeric element. An integration of OR and AND gates is applied to create a binary tree that indicate appraisals over textual attributes (Bethencourt, Sahai, & Waters, 2007).

Problem Description

The proposed research will be designed to respond to some problems. One of the problems that will be addressed in the research is the dependence of cloud based students’ record systems on file-sharing safety.

When students’ records are shared between departments and schools, they are usually secured using transport-level protocols only (Bethencourt, Sahai, & Waters, 2007).

Receivers of these cloud-based records derive clear textual outputs from cached and insecure forms. This poses a problem because it exposes the information to security threats.

Another problem that would be addressed in the proposed research is the fact that access control to cloud-based students’ records is strictly online. Many school systems currently need Internet access to switch decisions (Bethencourt, Sahai, & Waters, 2007).

The records cannot be reached when the database or server is unreachable, which may delay students’ communication with supervisors or external users. Furthermore, the design of cloud-based systems is provider-centric. As a result, students will have limited access to their school records only when they are online.

The problem must be addressed since academic records are always useful for students.

The insecurity of academic records is a major problem in cloud-based systems. Notwithstanding the implementation of strict regulatory measures, academic systems fail to effectively secure students’ records. Instead, schools depend on post hoc audits to identify security breaches. Using the attribute-based encryption may eliminate this deficiency.

The complicated nature of access guidelines to students’ records influence its usefulness and effective manipulation over the cloud. Academic employees experience numerous records with various types of policies related to them.

Numerous players including instructors, supervisors, board officers, auditors, and technicians, with different accessibility ranks manipulate students’ records. The efficiency of data manipulation is the effective definition of the access control medium that defines who can access specific data.

This excessively complicated, expensive, and error prone setting severely requires tools and computerization.

Conclusion

This chapter highlighted the role of attribute-based encryption for improving security and privacy in cloud computing systems.

The importance of cloud computing systems for future technological applications is obvious. Chapter one offered an overview of the privacy and security concerns related to cloud systems and the need to integrate encryption to promote security.

The next chapter will offer a comprehensive literature review on the importance of cloud computing systems for managing academic records. Consequently, the use of attribute-based encryption to enhance cloud-based systems will be analyzed.

References

Bethencourt, J., Sahai, A. & Waters, B. (2007). Ciphertext-policy attribute-based encryption. IEEE Computer Society, 32(3): 321-334.

Ewing, A. M. (2012). Estimating the Impact of Relative Expected Grade on Student Evaluations of Teachers. Economics of Education Review, 31(1): 141–54.

Prasad, P. S. & Ahammed, A. (2014). Attribute-Based Encryption for Scalable and Secure Sharing of Personal Health Records in Cloud Computing. International Journal of Computer Science and Information Technologies, 5(4): 5038-5040.

Stowell, J. R., Addison, W. E., & Smith, J. L. (2012), Comparison of Online and Classroom based Student Evaluations of Instruction. Assessment and Evaluation in Higher Education, 37(4): 465–73.

Tang, P. C., Ash, J. S., Bates, D. W., Overhage, J. M., & Sands, D. Z. (2006). Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption. Journal of the American Medical Informatics Association, 13(2): 121-126.

Tripathi, M., Delano, D., Lund, B., & Rudolph, L. (2009). Engaging patients for health information exchange. Health Affairs, 28(2): 435-443.

Urtel, M. G. (2008). Assessing Academic Performance between Traditional and Distance Education Course Formats. Technology and Society, 11(1): 322–30.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, June 21). Sharing Students' Records in Cloud Computing. https://ivypanda.com/essays/sharing-students-records-in-cloud-computing/

Work Cited

"Sharing Students' Records in Cloud Computing." IvyPanda, 21 June 2019, ivypanda.com/essays/sharing-students-records-in-cloud-computing/.

References

IvyPanda. (2019) 'Sharing Students' Records in Cloud Computing'. 21 June.

References

IvyPanda. 2019. "Sharing Students' Records in Cloud Computing." June 21, 2019. https://ivypanda.com/essays/sharing-students-records-in-cloud-computing/.

1. IvyPanda. "Sharing Students' Records in Cloud Computing." June 21, 2019. https://ivypanda.com/essays/sharing-students-records-in-cloud-computing/.


Bibliography


IvyPanda. "Sharing Students' Records in Cloud Computing." June 21, 2019. https://ivypanda.com/essays/sharing-students-records-in-cloud-computing/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1