IOT for Capturing Information and Providing Assessment Framework for Higher Educational Institutions—A Framework for Future Learning

  • Mayank SrivastavaEmail author
  • Praneet SaurabhEmail author
  • Bhupendra Verma
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1057)


Internet of Things (IoT) has been changing the way of operations for multiple segments like Industries, Health Care, and Manufacturing. It also holds a chance to change how Educational Institutions operates and enhance student learning experience. It has enormous opportunities for Educational Segment which will enhance the learning experiences for students, teachers and other stakeholders. The development of IOT Systems, devices, applications, and services are already in the consideration and process by the students and researchers. Therefore, this paper presents a framework to capture validated information of individual Higher Educational Institutions (HEI) through IOT devices to avail the assessment based platform to evaluate and enhance the educational experience. It also describes the processes to automate the survey of Educational Institutions and provide analytical report using IOT components and Machine Learning. To ease the understanding of different methods we provide a prototype with its practical implementations using common processes in a friendly manner.


Misuse Cloud computing Database Education segment Higher education institutions Framework Internet of things Survey Machine learning 


  1. 1.
    Nasaruddin, F., Gani, A., Karim, A., Abaker, I., Hashem, T., Siddiqa, A., Yaqoob, I., Marjani, M.: Big IoT data analytics: architecture, opportunities, and open research challenges, IEEE. Access 5, 5247–5261 (2017)CrossRefGoogle Scholar
  2. 2.
    Puschmann, D., Barnaghi, P., Carrez, F., Ganz, F.: A practical evaluation of information processing and abstraction. Internet Things J. (2015)Google Scholar
  3. 3.
    Iera, A., Morabito, G., Atzori, L.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  4. 4.
    Rehman, U., Ghazal, S., Umar, I., Aldowah, H.: Internet of things in higher education: a study on future learning. J. Phys.: ICCSCM (2017)Google Scholar
  5. 5.
    Ahamed, B.B., Ramkumar, T., Shanmugasundaram, H.: Data integration progression in large data source using mapping affinity, advanced software engineering and its applications (ASEA). In: 7th International Conference (2014)Google Scholar
  6. 6.
    Zhang, X., Liu, J.: Data integration in fuzzy XML documents. Inf. Sci. 280, 82–97 (2014)CrossRefGoogle Scholar
  7. 7.
    Bernstein, P., Bertino, E., Davidson, S., Dayal, U., Agrawal, D.: Challenges and opportunities with big data, whitepaper, computing community consortium (2012)Google Scholar
  8. 8.
    Bernstein, P., Bertino, E., Davidson,S., Dayal,U., Agrawal, D.: Challenges and opportunities with big data, whitepaper, computing community consortium, (2012)Google Scholar
  9. 9.
    Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology, U.S. Department of Commerce (2011)Google Scholar
  10. 10.
    Kanagavalli, R., Dr. Vagdevi, S.: A mixed homomorphic encryption scheme for secure data storage in cloud. In: IEEE International Advanced Computing Conference IACC2015 (2015)Google Scholar
  11. 11.
    Tebaa, M., Elhajii, S.: Secure cloud computing through Homomorphic Encryption. Int. J. Adv. Comput. Technol. 5(16), 29–38 (2013)Google Scholar
  12. 12.
    Parmar, P.V.: Survey of various Homomorphic Encryption algorithms and schemes. Int. J. Comput. Appl. (0975–8887), 91(8), 26–32 (2014)Google Scholar
  13. 13.
    Ogburn, M., Turner, C., Dahal, P.: Homomorphic Encryption in Complex Adaptive Systems, Publication 3, pp. 502–509. Elsevier, MD, Baltimore (2013)Google Scholar
  14. 14.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Song, X., Wang, Y.: Homomorphic cloud computing scheme based on hybrid homomorphic encryption. In: 3rd IEEE International Conference on Computer and Communications (2017)Google Scholar
  16. 16.
    Geetha, J.S., Amalarethinam, D.I.G.: ABCRNG—swarm intelligence in public key cryptography for random number generation. Intern. J. Fuzzy Mathematical Archive, 6(2), 177–186 (2015)Google Scholar
  17. 17.
    Chean, T.L., Ponnusamy, V., Fati, S.M.: Authentication scheme using unique identification method with homomorphic encryption in mobile cloud computing. IEEE (2018)Google Scholar
  18. 18.
    Oppermann, A., Toro, F.G., Seifert, T., Seifert, J.P.: Secure cloud computing: communication protocol for multithreaded fully homomorphic encryption for remote data processing. Int. J. Commun. Syst. 1–26 (2017)Google Scholar
  19. 19.
    Das, D.: Secure cloud computing algorithm using homomorphic encryption and multi-party computation. IEEE (2018)Google Scholar
  20. 20.
    Ding, Y., Li, X.: Policy based on homomorphic encryption and retrieval scheme in cloud computing. In: IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) (2017)Google Scholar
  21. 21.
    Anescu, G., Prisecaru, I.: NSC-PSO, a novel PSO variant without speeds and coefficients. In: 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (2016)Google Scholar
  22. 22.
    Abraham, A., Sharma, T.K., Pant, M.: Blend of local and global variant of PSO in ABC. IEEE (2013)Google Scholar
  23. 23.
    Tiwari, S., Mishra, K.K., Misra, A.K.: Test case generation for modified code using a variant of particle swarm optimization (PSO) Algorithm. In: 10th International Conference on Information Technology: New Generations (2013)Google Scholar
  24. 24.
    Singh, S., Shivangna, Mittal, E.: Range based wireless sensor node localization using PSO and BBO and its variants. In: International Conference on Communication Systems and Network Technologies (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Technocrats Institute of Technology AdvanceBhopalIndia
  2. 2.Technocrats Institute of TechnologyBhopalIndia

Personalised recommendations