Cybersecurity Cloud-Based Online Learning: A Literature Review Approach
Abstract
Cloud-based online learning is the electronic learning activity that supports teaching and learning (T&L) that could be done from anywhere and in the world. Some of its benefits are scalability and affordability that could in a decision-making support on the mechanisms of material selection. Cloud computing has been adopted by most universities around the world. In this regard, lecturers and students will use it to facilitate T&L; however, due to concerns of information technology or systems security, cloud-based online learning users are also not immune. In this regard, the users could be affected by different cybersecurity attacks. In this paper, a systematic literature review method was used to sift the different models and solutions used to address the cybersecurity concerns surrounding cloud-based online learning. A brief Likert-scale questionnaire was used to obtained data that could corroborate the systematic literature findings. In this regard, a group of 20 online learning designers were sampled as participants. It was found that the confidentiality, integrity, and availability issues are a concern. This led to issues of security awareness, authentication and blended attacks being issues. In this regard, a cloud-based online learning model is not immune from security issues. In this paper, a conceptual framework as the line-of-defense is proposed as a solution towards having a cybersecure cloud based online learning.
Downloads
References
S. Okai-Ugbaje, K. Ardzejewska, A. Imran, A. Yakubu and M. Yakubu. Cloud-based m-learning: A pedagogical tool to manage infrastructural limitations and enhance learning. International Journal of Education and Development using Information and Communication Technology (IJEDICT), vol. 16(2), p. 48-67, 2020.
W.Q. Qwaider, “A Cloud Computing Based Learning Management Systems (LMSs) Architecture”. International Journal of Computing and Network Technology, 5(2), p. 51-58, 2017.
A. Ekuase-Anwansedo, and A. Smith, “Effect of Cloud Based Learning Management System on The Learning Management System Implementation Process”. SIGUCCS '19: Proceedings of the 2019 ACM SIGUCCS Annual Conference, p. 176–179, 2019. https://doi.org/10.1145/3347709.3347835
M. Rajesh, “A Systematic review of cloud security challenges in Higher Education”. The Online Journal of Distance Education and e-Learning, p. 10, 2017.
B. Kitchenham and P. Brereton, “A systematic review of systematic review process research in software engineering”. Information and Software Technology, 2013.
M. Kaur and H. Singh, “A Review of Cloud Computing Security Issues”. International Journal of Grid Distribution Computing, vol. 8, p. 215-222, 2015.
T.-S. Chou, “Security threats on cloud computing vulnerabilities”. International Journal of Computer Science & Information Technology (IJCSIT), vol. 5, 2013.
J. Jang¬‐Jaccard, S. Nepal, and Y. J. Guo, “Cybersecurity threats in cloud computing”. Australian Journal of Telecommunications and the Digital Economy, vol. 1, 2013.
M. Attaran, S. Mohsen and B. G. Celik, “Promises and Challenges of Cloud Computing in Higher Education: A Practical Guide for Implementation”. Journal of Higher Education Theory and Practice, vol. 17(6), 2017.
Y. A. M. Qasem, R. Abdullah, Y.Y. Jusoh, R. Atan, and S. Asadi, “Cloud Computing Adoption in Higher Education Institutions: A Systematic Review” IEEE Access, vol. 10, 2019.
G. Kumar and A. Chelikani, “Analysis of security issues in cloud-based e-learning”. Security Management, 2011.
H. Takabi, J. B. Joshi and G.-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments”. The IEEE Computer and Reliability Societies, 2010.
C. N. Magdalena, “E-learning Security Vulnerabilities”. Procedia - Social and Behavioral Sciences, vol. 46, p. 2297 – 2301.2012.
R. Khalil, A. E. Mansour, W. A. Fadda, K. Almisnid, M. Aldamegh, A. Al-Nafeesah, A. Alkhalifah and O. Al-Wutayd, “The sudden transition to synchronized online learning during COVID-19 pandemic in Saudi Arabi: a qualitative study exploring medical students' perspectives”. BMC Medical Education, 2020.
H. Abusaimeh, “Security Attacks in Cloud Computing and Corresponding Defending Mechanisms”. International Journal of Advanced Trends in Computer Science and Engineering, 2020.
E. Bagarukayo and B. Kalema, “Evaluation of elearning usage in South African universities: A critical review”. International Journal of Education and Development using Information and Communication Technology, 2015.
I. Bandara, F. Ioras and K. Maher, “Cyber security concerns in E-learning education”. Proceedings of ICERI2014 Conference, 17-19 November 2014.
V. Chang, Y. Kuo and M. Ramachandran, “Cloud computing adoption framework: A security framework for business clouds”. Future Generation Computer Systems, 2016.
B. Grobauer, T. Walloschek and E. Stöcker, “Understanding Cloud Computing Vulnerabilities”. The IEEE Computer and Reliability, 2011
P. Chouhan and R. Singh, “Security Attacks on Cloud Computing With Possible Solution”. International Journal of Advanced Research in Computer Science and Software Engineering, 2016.
A. Jalal and M. A. Zeb, “Security Enhancement for e-Learning Portal”. International Journal of Computer Sciences and Engineering Systems, 2015.
F. Makoza, “Cloud computing adoption in Higher Education Institutions of Malawi: An exploratory study”. International Journal Computing and ICT Research, vol 9(2), 2016.
R. P. Madhubala, “Survey on Security Concerns in Cloud Computing”. International Conference on Green Computing and Internet of Things (ICGCIoT), 2015.
M. V. Pawar and J. Anuradha, “Network Security and Types of Attacks in Network”. Procedia Computer Science, vol. 48, pp. 503 – 506, 2015. https://doi.org/10.1016/j.procs.2015.04.126
K. Van der Schyff and K. E. Kraussy, “Higher education cloud computing in South Africa: Towards understanding trust and adoption issues”. South African Computer Journal (SACJ), 55 40-55, 2014.
D. R. Queiros and M. R. de Villiers, “Online Learning in a South African Higher Education Institution: Determining the Right Connections for the Student”. International Review of Research in Open and Distributed Learning, 2016.
P. Mell and T. Grance, “The NIST Definition of Cloud Computing”. National Institute of Standards and Technology Recommendations of the National Institute of Standards and Technology, 2011.
National Institute of Standards and Technology Cybersecurity Framework Documents. https://www.nist.gov/cyberframework/framework
Download PDF: 629 times
Copyright (c) 2023 Journal of Information Systems and Informatics
This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)