Secure Data Management for Online Learning Applications With the increasing use of e-l earning, technology has not only revolution- ized the way businesses operate but has also impacted learning processes in the education sector. E- Learning is slowly replacing traditional methods of teaching and security in e- learning is an important issue in the educational context. With this book, you will be familiarized with the theoretical frame- works, technical methodologies, information security, and empirical research findings in the field to protect your computers and information from threats. Secure Data Management for Online Learning Applications will keep you interested and involved throughout. Secure Data Management for Online Learning Applications Edited by L. Jegatha Deborah P. Vijayakumar Brij B. Gupta Danilo Pelusi First edition published 2023 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN © 2023 selection and editorial matter, L. Jegatha Deborah, P. Vijayakumar, Brij B. Gupta and Danilo Pelusi; individual chapters, the contributors CRC Press is an imprint of Taylor & Francis Group, LLC Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copy- right material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under US Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750- 8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging‑in‑Publication Data Names: Deborah, L. Jegatha, editor. | Vijayakumar, P., editor. | Gupta, Brij, 1982- editor. | Pelusi, Danilo, editor. Title: Secure data management for online learning applications / edited by: L. Jegatha Deborah, P. Vijayakumar, Brij B.Gupta and Danilo Pelusi. Description: First Edition. | Boca Raton ; London : CRC Press, 2023. | Includes bibliographical references and index. Identifiers: LCCN 2022047445 (print) | LCCN 2022047446 (ebook) | ISBN 9781032206424 (Hardback) | ISBN 9781032206431 (Paperback) | ISBN 9781003264538 (eBook) Subjects: LCSH: Distance education--Computer-assisted instruction--Management. | Computer networks--Security measures--Computer programs. | Educational technology--Access control. Classification: LCC LC5803.C65 S435 2023 (print) | LCC LC5803.C65 (ebook) | DDC 371.33/4--dc23/eng/20221003 LC record available at https://lccn.loc.gov/2022047445 LC ebook record available at https://lccn.loc.gov/2022047446 ISBN: 978-1-032-20642-4 (hbk) ISBN: 978-1-032-20643-1 (pbk) ISBN: 978-1-003-26453-8 (ebk) DOI: 10.1201/9781003264538 Typeset in Sabon by SPi Technologies India Pvt Ltd (Straive) Dedicated to my husband and children for their constant support during the course of this book. L. Jegatha Deborah Dedicated to my wife and children for their constant support dur- ing the course of this book. P. Vijayakumar Dedicated to my wife Varsha Gupta for her constant support during the course of this book. Brij B. Gupta Dedicated to my wife and children for their constant support dur- ing the course of this book. Danilo Pelusi Contents Preface ix Acknowledgements xiii Editors’ biographies xv Contributors xix 1 Secure online assessment of students using optimized deep learning techniques 1 S.V. VIJAYA KARTHIK AND S. ARUNKUMAR 2 Survey of risks and threats in online learning applications 31 DAHLIA SAM, K. NITHYA, S. DEEPA KANMANI, ADLIN SHEEBA, A. SHAMILA EBENEZER, B. UMA MAHESWARI, AND JENNIFER DAFFODILS AMESH 3 Approaches to overcome security risks and threats in online learning applications 49 ADRI JOVIN JOHN JOSEPH AND MARIKKANNAN MARIAPPAN 4 Secure data aggregation and sharing for online learning applications 71 CHEN WANG, JIAN SHEN, TIANQI ZHOU, AND HUIJIE YANG 5 A secure data-centric approach to blended learning for programming languages 87 C. BEULAH, CHRISTALIN LATHA, SUJNI PAUL, AND RAJAN JOHN 6 Centralized key distribution protocol using identity-based encryption techniques in cloud computing environments 111 S. AMBIKA, A.S. ANAKATH, S. RAJAKUMAR, R. KANNADASAN, AND S. SENTHILKUMAR vii viii Contents 7 Efficient key management and key distribution for online learning 135 V. JEYALAKSHMI, G. RAMESH, AND S. RAJKUMAR 8 An efficient privacy preserving and public auditing data integrity verification protocol for cloud-based online learning environments 157 L. JEGATHA DEBORAH, S. MILTON GANESH, AND P. VIJAYAKUMAR 9 A novel secure e-learning model for accurate recommendations of learning objects 169 R. KARTHIKA, S.C. RAJKUMAR, L. JEGATHA DEBORAH, AND S. GEETHA 10 Efficient key management and key distribution schemes for online learning 191 FAHMINA TARANUM AND K.S. NIRAJA 11 Secure virtual learning using blockchain technology 205 K.R. KARTHICK AND J. SATHEESHKUMAR 12 A robust mutual and batch authentication scheme based on ECC for online learning in Industry 4.0 221 ARUN SEKAR RAJASEKARAN, AZEES MARIA, AND P. VIJAYAKUMAR 13 Sentiment Analysis: The beginning 241 C. SINDHU AND G. VADIVU Index 271 Preface As technology advances and user experience improves, so too does the popularity of online education, which has been proven to be a successful method of learning and offers a number of different benefits when com- pared with traditional education. Online teaching and learning refers to education that takes place over the internet. A significant number of colleges in the US and abroad are moving from the traditional face-t o- face classes into fully online, web- based courses. Online education, often called distance education or web- based education, is currently the latest, and most popular form of distance education. It has recently become an integral part of many university programs. With the pandemic nearing no visible end, it is under- stood that educators, both in schools and colleges, will continue to rely on online learning. In the era of digitalization that we live in, cyber security incidences have reached unprecedented heights, and online learning needs to be secured from hackers. Chapter 1: The topic of safe online evaluation of students’ learning is covered as e-l earning gradually replaces traditional classroom settings. Online education and learning have become major topics in regard to cyber security. Without the utilization of digital infrastructure, e- learning, which uses electronic technologies to provide knowledge and skills, is not conceiv- able. As e- learning spreads and more people enroll in online classes, safety and security have grown to be a significant issue in the contemporary aca- demic environment. The integrity of data, authentication, content retention, access management, and other crucial issues must all be taken into account. This chapter focuses on using online services as learning and teaching plat- forms and discusses how spending time on social networking sites affects students’ performance and productivity. Chapter 2: the internet or the web is essential to the full operation of online learning techniques. Despite all the advantages the internet offers for uninterruptible learning, it is inescapably the source of all security risks. Online learning environments are hence more vulnerable to cyber- attacks. Numerous well- known video conferencing and online learning platforms, such as Moodle and Google Classroom, among others, all have their share of security risks. The various security risks, mostly from outside ix