Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 12857–12862 | Cite as

Secure cloud data storage approach in e-learning systems

  • G. Sahaya Stalin JoseEmail author
  • C. Seldev Christopher
Article
  • 145 Downloads

Abstract

This is the period of worldwide communication which is a very interesting and inspiring time in the domain of information technology. The modern daily lives may enrich based on Technical advancement in the internet sector. The gaining attractiveness of sophistication on the internet field, the creation of improved web oriented learning environment is become the interesting and latest area on researching remote education. The cloud computing based e-learning is plays a crucial and most powerful role in the area of education and learning. This paper proposes to encrypt the message using data encryption standard and to encode the message using erasure code before storing the message in the e-learning storage system. At the end of encoding, the encoded messages are saved in cloud data center. So, reconstruction is easy with low bandwidth and low traffic if any data center failure and Storing time is convincingly good in Reed Solomon code. It is mainly focused on distributed data storage security for e-learning system, which has always been an important aspect of quality service.

Keywords

Data encryption standards Reed Solomon code e-Learning Cloud storage 

References

  1. 1.
    Dong, B., et al.: An e-learning ecosystem based on cloud computing infrastructure. In: 9th IEEE International Conference on Advanced Learning Technologies (2009)Google Scholar
  2. 2.
    Laisheng, X., et al.: Cloud computing: a new Business paradigm for e-learning. In: 3rd International Conference on Measuring Technology and Mechatronics Automation (2011)Google Scholar
  3. 3.
    Pocatilu, P., et al.: Measuring the efficiency of cloud computing for e-learning systems. WSEAS Trans. Comput. 9(1), 42–51 (2010)Google Scholar
  4. 4.
    Al-Zoube, M.: e-Learning on the Cloud. Int. Arab J. e-Technol 1(2), 58–64 (2009)Google Scholar
  5. 5.
    Bahrami, M., Singhal, M.: The role of cloud computing architecture in big data. In: Pedrycz, W., Chen, W.-S. (eds.) Information Granularity, Big Data, and Computational Intelligence, pp. 275–295. Springer, New York (2015)Google Scholar
  6. 6.
    Vouk, M.A.: Cloud computing -Issues, research and implementations. J. Comput. Inf. Technol.-CIT 16 4, 235–246 (2008)CrossRefGoogle Scholar
  7. 7.
    Rao, V.S., Rao, N.K.N., Kumari, E.K.: Cloud computing: an overview. J. Theor. Appl. Inf. Technol (2005–2009)Google Scholar
  8. 8.
    Mukundrao, J.A., Vikram, G.P.: Enhancing security in cloud computing. Inf. Knowl. Manage. 1(1), 40–45 (2011)Google Scholar
  9. 9.
    Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012)CrossRefGoogle Scholar
  10. 10.
    Lin, H.Y., Tzeng, W.G.: A secure decentralized erasure code for distributed networked storage. IEEE Trans. Parallel Distrib. Syst. 21(11), 1586–1594 (2010)CrossRefGoogle Scholar
  11. 11.
    Oliveira, P.F., Lima, L., Vinhoza, T.T., Barros, J., Medard, M.: Coding for trusted storage in untrusted networks. IEEE Trans. Inf. Forens. Secu. 7(6), 1890–1899 (2012)CrossRefGoogle Scholar
  12. 12.
    Luby, M.G., Mitzenmacher, M., Shokrollahi, M.A., Spielman, D.A.: Efficient erasure correcting codes. IEEE Trans. Inf. Theory 47(2), 569–584 (2001)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput 5(2), 220–232 (2012)CrossRefGoogle Scholar
  14. 14.
    Delimitrou, C., Sankar, S., Vaid, K., Kozyrakis, C.: Decoupling data center storage studies from access to large-scale applications. IEEE Comput. Archit. Lett. 11(2), 53–56 (2012)CrossRefGoogle Scholar
  15. 15.
    Sahaya Stalin, J.G., Seldev, C.C.: Minimize the replication for secure cloud data storage systems using error correction codes. Appl. Mech. Mater. 626, 26–31 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Information TechnologySt.Xavier’s Catholic College of EngineeringNagercoilIndia
  2. 2.Computer Science and EngineeringSt.Xavier’s Catholic College of EngineeringNagercoilIndia

Personalised recommendations