Skip to main content

A Trustworthy and Privacy Preserving Model for Online Competence Evaluation System

  • Conference paper
  • First Online:
Contemporary Complex Systems and Their Dependability (DepCoS-RELCOMEX 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 761))

Included in the following conference series:

Abstract

Nowadays, all academic institutions exhibit and distribute their material over Internet. Moreover e-learning and e-evaluation products is one of the most rapidly expanding areas of education and training, with nearly 30% of U.S. college and university students now taking at least one online course. However, Internet increases the vulnerability of digital educational content exploitation since it is a possibly hostile environment for secure data management. Educational institutions have to deal with all the open security challenges that can cause huge data and financial losses, harm their reputation and strictly affect people’s trust on them. In this paper we propose a trust preserving approach for utilizing online evaluation of acquired student competences and we present a trust preserving approach for handling the increasingly complex issues of designing, developing and e-competence evaluation systems suitable for educational and e-learning environments. The proposed architecture for an online competence evaluation system will offer to the authorized users procedures for evaluating competences and providing their feedback but they have to prove their eligibility to participate in the evaluation while, at the same time, it will preserve their privacy and it will ensure system’s trustworthiness. The proposed model addresses a list of fundamental operational and security requirements and implements a small scale proof of concept of privacy enhancement technologies.

This work has been partially supported by the “Implementation of Software Engineering Competence Remote Evaluation for Master Program Graduates (ISECRET)” project No 2015-1-LVo1-KA203-013439 funded by ERASMUS+ of the European Commission and by the National funds allocated by the Greek General Secretarial of Research and Development project 2006SE01330025 as continuation of FP7-PEOPLE-IAPP-2009, Grant Agreement No. 251589, Acronym: SAIL.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aljbori, M.A., Guirguis, S.K., Madbouly, M.M.: Adaptable mobile user interface for securing e-learning environment. Trans. Netw. Commun. 2(4), 64–83 (2013)

    Google Scholar 

  2. Bichsel, P., Camenisch, J., Gro, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of 16th ACM Conference on Computer and Communications Security, CCS, pp. 600–610 (2009)

    Google Scholar 

  3. Camenisch, J.: Protecting (anonymous) credentials with the trusted computing group’s TPM, vol. 1, pp. 135–147 (2001)

    Google Scholar 

  4. Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Proceedings of EUROCRYPT , pp. 93–118 (2001)

    Google Scholar 

  5. Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Proceedings of EUROCRYPT, pp. 61–76 (2002)

    Chapter  Google Scholar 

  6. Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Proceedings of EUROCRYPT, pp. 56–72 (2004)

    Chapter  Google Scholar 

  7. Chen, Y., He, W.: Security risks and protection in online learning: a survey. Int. Rev. Res. Open. Distance Learn. 14(5), 109–127 (2013)

    Google Scholar 

  8. Farias, G., Muñoz de la Peña, D., Gómez-Estern, F., De la Torre, L., Sánchez, C., Dormido, S.: Adding automatic evaluation to interactive virtual labs. Interact. Learn. Environ. 24(7), 1456–1476 (2016)

    Article  Google Scholar 

  9. Huu Phuoc Dai, N., Kerti, A., Rajnai, Z.: E-Learning security risks and its countermeasures. J. Emerg. Res. Solut. ICT. 1(1), 17–25 (2016)

    Article  Google Scholar 

  10. Jain, K., Ngoh, L.B.: Motivating factors in e-learning -a case study of UNITAR. Student Affairs Online, vol. 4(1) (2003). http://www.studentaffairs.com/ejournal/eLearning.html

  11. Kritzinger, E., von Solms, S.H.: E-learning: incorporating information security governance. Issues Inf. Sci. Inf. Technol. 3, 319–325 (2006)

    Google Scholar 

  12. LeBeau, J.E., McCormack, J., Beyerlein, S., Davis, D., Trevisan, M., Leiffer, P., Thompson, P., Davis, H., Howe, S., Brackin, P., Gerlick, R., Khan, M.J.: Alumni perspective on professional skills gained through integrated assessment and learning. Int. J. Eng. Educ. 30(1), 48–59 (2014)

    Google Scholar 

  13. Liagkou, V., Metakides, G., Pyrgelis, A., Raptopoulos, C., Spirakis, P., Stamatiou, Y.: Privacy preserving course evaluations in greek higher education institutes: an e-participation case study with the empowerment of attribute based credentials. In: Proceedings of Privacy Technologies and Policy, Lecture Notes in Computer Science, vol. 8319, pp. 140–156. Springer Berlin Heidelberg (2014)

    Chapter  Google Scholar 

  14. Liagkou, V., Stylios, C. : The case study of a software engineering e-competence evaluation portal. In: Proceedings of Actual Problem of Education (MIP-2017), pp. 21–23 (2017)

    Google Scholar 

  15. Mohd Alwi, N., Fan, I.: E-learning and information security management. Int. J. Digit. Soc. 1, 148–156 (2010)

    Article  Google Scholar 

  16. Morrison, D.: E-Learning Strategies. Wiley, Chichester (2005)

    Google Scholar 

  17. Rannenberg, K., Camenisch, J., Sabouri, A.: Attribute-Based Credentials for Trust: Identity in the Information Society. Springer Publishing Company, Incorporated, Cham (2014)

    Google Scholar 

  18. Rjaibi, N., Rabai, L.B.A., Aissa, A.B., Louadi, M.: Cyber security measurement in depth for e-learning systems. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(11), 1–15 (2012)

    Google Scholar 

  19. Romansky, R., Noninska, I.: Implementation of security and privacy principles in e-learning architecture. In: Proceedings of the 29th International Conference on Information Technologies (InfoTech-2015), St. Constantine and Elena, Bulgaria, pp. 66–77 (2015)

    Google Scholar 

  20. Ruano, M., Colomo, P.R., Gómez, J., García Crespo, A.: A mobile framework for competence evaluation: innovation assessment using mobile information systems. J. Technol. Manag. Innov. 2(3), 49–57 (2007)

    Google Scholar 

  21. Saxena, R.: Security and online content management: balancing access and security, breaking boundaries: integration and interoperability. In: Proceedings of the 12th Biennial VALA Conference and Exhibition Victorian Association for Library Automation (2004)

    Google Scholar 

  22. Tsinakos, A., Kazanidis, I.: Identification of conflicting questions in the PARES system. Int. Rev. Res. Open Distrib. Learn. 13(3), 298–314 (2012)

    Article  Google Scholar 

  23. Yong, J.: Digital identity design and privacy preservation for e-learning. In: Proceeding of the 2007 11th International Conference on Computer Supported Cooperative Work in Design, pp. 858–863 (2007)

    Google Scholar 

  24. Treek, D.: An integral framework for information systems security management. Comput. Secur. 22(4), 337–360 (2003)

    Article  Google Scholar 

  25. Reddy, G.S.: Security issues and threats in educational clouds of e-learning: a review on security measures. Comput. Technol. Appl. 4, 312–316 (2013)

    Google Scholar 

  26. Whitson, G.: Computer security: theory, process and management. J. Comput. Small Coll. 18(6), 57–66 (2003)

    Google Scholar 

  27. Yang, C., Lin, F.O., Lin, H.: Policy based privacy and security management for collaborative e-education systems. In: Proceedings of the 5th IASTED International Multi-Conference Computers and Advanced Technology in Education (CATE 2002), pp. 501–505 (2002)

    Google Scholar 

  28. Younis Alsabawya, A., Cater-Steel, A., Soar, J.: IT infrastructure services as a requirement for elearning system success. Comput. Educ. 69, 431–451 (2013)

    Article  Google Scholar 

  29. Zhang, Z., Yang, K., Hu, X., Wang, Y.: Practical anonymous password authentication and TLS with anonymous client authentication. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasiliki Liagkou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liagkou, V., Stylios, C. (2019). A Trustworthy and Privacy Preserving Model for Online Competence Evaluation System. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Contemporary Complex Systems and Their Dependability. DepCoS-RELCOMEX 2018. Advances in Intelligent Systems and Computing, vol 761. Springer, Cham. https://doi.org/10.1007/978-3-319-91446-6_32

Download citation

Publish with us

Policies and ethics