A Framework for Privacy-Preserving E-learning

  • Esma Aïmeur
  • Hicham Hage
  • Flavien Serge Mani Onana
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


E-learning systems have made considerable progress within the last few years. Nonetheless, the issue of learner privacy has been practically ignored. The security of E-learning systems offers some privacy protection, but remains unsatisfactory on several levels. In this work, we corroborate the need for privacy in E-learning systems. In particular, we introduce a framework for privacy preserving E-learning to provide the learner with the possibility of combining different levels of Privacy and Tracking to satisfy his personal privacy concerns. This allows the learner to perform learning activities and to prove his achievements (such as with anonymous transcripts and anonymous degrees) without exposing various aspects of his private data. In addition, we introduce the Blind Digital Certificate, a digital certificate that does not reveal the learner’s identity. Finally, we report on the implementation and validation of our approach in the context of an E-testing system.


Certificate Authority Privacy Level Digital Certificate Learner Profile Tracking Level 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Arroyo, I., and Park Woolf, B.: “Inferring Learning and Attitudes from a Bayesian Network of Log File Data”. International Conference on Artificial Intelligence in Education (AIED 2005), pp 33–40, Amsterdam, 2005.Google Scholar
  2. 2.
    Westin, A.: Privacy and Freedom (Atheneum, New York, 1967).Google Scholar
  3. 3.
    Aïmeur, E., Brassard, G., Fernandez, J.M., and Mani Onana, F. S.: “Privacy-Preserving demographic filtering”. The 21st Annual ACM Symposium on Applied Computing, pp 872–878, Dijon, 2006.Google Scholar
  4. 4.
    Mani Onana, F. S.: “Vie privée en commerce électronique”. Ph.D. Thesis, Département d’informatique et de recherche opérationnelle, Université de Montréal, Mai 2006.Google Scholar
  5. 5.
    Raitman, R., Ngo, L., Augar, N., and Zhou, W.: “Security in the online e-learning environment”. IEEE International Conference on Advanced Learning Technologies (ICALT 2005), 5(8), pp 702–706, 2005.CrossRefGoogle Scholar
  6. 6.
    Franz, E., Wahrig, H., Boettcher, A., and Borcea-Pfitzmann, K.: “Access Control in a Privacy-Aware eLearning Environment”. International Conference on Availability, Reliability and Security (ARES 2006), pp 879–886, Vienna, 2006.Google Scholar
  7. 7.
    Yee, G., and Korba, L.: “The Negotiation of Privacy Policies in Distance Education”. Information Resources Management Association International Conference (IRMA 2003), Philadelphia, 2003.Google Scholar
  8. 8.
    Chaum, D.: “Security without identification: Transaction systems to make Big Brother obsolete”. Communications of the ACM, 28(10), pp 1030–1044, 1985.CrossRefGoogle Scholar
  9. 9.
    Chaum, D., and Evertse, J.: A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. In Andrew M. Odlyzko, editor, Advances in Cryptology — CRYPTO’ 86, volume 263 of Lecture Notes in Computer Science, pp 118–167 (Springer, Berlin, 1987).Google Scholar
  10. 10.
    Brands, S.: Rethinking Public Key Infrastructure and Digital Certificates — Building in Privacy. (MIT Press, Cambridge, 2000).Google Scholar
  11. 11.
    Camenish, J., and Lysyanskaya, A.: An Efficient System for None-transferable Anonymous Credentials with Optional Anonymity Revocation. In Birgit Pfitzmann, editor, Advances in Cryptology — EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pp 93–118 (Springer, Berlin, 2001).Google Scholar
  12. 12.
    Lysyanskaya, A., Rivest, R. L., Sahai, A., and Wolf S.: In Howard Heys and Carlisle Adams, editors, Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, pp 184–199 (Springer, Berlin, 1999).Google Scholar
  13. 13.
    Sander, T., and Tschudin, C.: “Towards mobile cryptography”. Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp 215–224, Oakland, 1998.Google Scholar
  14. 14.
    Boyan, J.: “The Anonymizer: Protecting user privacy on the Web”. Computer-Mediated Communication Magazine, 4(9), 1997.Google Scholar
  15. 15.
    Gabber, E., Gibbons, P.B., Kristol, D.M., Matias Y. and Mayer A.J.: “Consistent, yet anonymous, web access with LPWA”. Communications of the ACM, 42(2), pp. 42–47, 1999.CrossRefGoogle Scholar
  16. 16.
    Chaum, D.: “Untraceable electronic mail, return addresses, and digital pseudonyms”. Communications of the ACM, 24(2), pp. 84–90, 1981.CrossRefGoogle Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Esma Aïmeur
    • 1
  • Hicham Hage
    • 1
  • Flavien Serge Mani Onana
    • 1
  1. 1.Département d’informatique et de recherche opérationnelleUniversité de MontréalCanada

Personalised recommendations