Research on Computer Technology for E-learning in Higher Education
IC4E '10 Proceedings of the 2010 International Conference on e-Education, e-Business, e-Management and e-Learning
Private cloud for collaboration and e-Learning services: from IaaS to SaaS
Computing - Cloud Computing
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Journal of Network and Computer Applications
Recommendation Models for Open Authorization
IEEE Transactions on Dependable and Secure Computing
Toward Secure and Dependable Storage Services in Cloud Computing
IEEE Transactions on Services Computing
A cost-effective cloud computing framework for accelerating multimedia communication simulations
Journal of Parallel and Distributed Computing
A combined approach to ensure data security in cloud computing
Journal of Network and Computer Applications
Computers and Electrical Engineering
An authentication model towards cloud federation in the enterprise
Journal of Systems and Software
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
Abundant reasonable computers, web resources and education content are identified to transform educational usage on-demand in the field of cloud infrastructure. Therefore, there comes a necessity to redesign the educational system to meet the needs better. The appearance of cloud based services supports the creation of latest generation e-learning systems for storing multimedia data within the cloud; it draws attention for academia and research area, which may be able to use high quality of resources. Even though the merits of cloud service are more attractive, the physical possession of users data is under security risk with respect to data correctness. This poses many new security challenges which have not been well explored. This paper focuses mainly on distributed data storage security for e-learning system, which has always been an important aspect of quality service. To make sure the correctness of users data within the cloud, an adaptable and effective auditing mechanism hitches the challenges and distributes erasure-coded data for e-learning web application. This extensive analysis shows that the auditing result achieves quick data error correction and localization of servers for malicious data modification attacks.