PriMera Scientific Engineering (ISSN: 2834-2550)

Review Article

Volume 3 Issue 3

Cloud-Secured Learning: Strengthening E-Learning Platforms for Enhanced Accessibility and Protection

Sourav Mishra* and Sushree Bibhuprada Priyadarshini

August 18, 2023

DOI : 10.56831/PSEN-03-073

Abstract

Cloud computing has transformed the technological landscape by providing businesses with scalable virtual resources and by transforming the e-learning industry. With this transformation, however, comes a paramount concern for security. The improvement of e-learning systems requires substantial investments in hardware and software. Cloud computing provides a cost-effective solution for institutions with limited resources. A comprehensive security framework adapted to the specific requirements of the e-learning platform is crucial for maximising the utility of common applications. Skilled security experts and software architects are essential to the design and implementation of such solutions. Authentication, encryption, and access controls serve as the security arsenal's armour and weaponry. The ongoing pursuit of a secure educational environment necessitates a dedicated team that stays current on the most recent threats and countermeasures. Combining cloud computing and e-learning offers numerous opportunities, but security must remain a top priority. This report examines the principles of neural networks and high-performance computing for fortifying cloud-based e-learning platforms, resulting in a tapestry of safeguards that protect the treasures of online education.

Keywords: Cloud computing; Scalable; Authentication; Encryption; Neural Networks

References

  1. G Divyashree., et al. “Intrusion detection system in wireless sensor network”. Int. J.Recent Technol. Eng 8.1 (2019): 2047-2051.
  2. PR Chandre, PN Mahalle and GR Shinde. “Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification”. Proc. - 2018 IEEE Glob. Conf. Wirel. Comput. Networking, GCWCN 2018 (2019): 135-140.
  3. L Sheeba and V Meenakshi. “A Brief survey on Intrusion Detection System for WSN”. Int. J. Comput. Trends Technol 40.3 (2016): 109-113.
  4. AH Farooqi and FA Khan. “A survey of intrusion detection systems for wireless sensor networks”. Int. J. Ad Hoc Ubiquitous Comput 9.2 (2012): 69-83.
  5. SHAH Baddar, A Merlo and M Migliardi. “Anomaly detection in computer networks: A state-of-the-art review”. J. Wirel. Mob. Networks, Ubiquitous Comput. Dependable Appl 5.4 (2014): 29-64.
  6. I Butun, SD Morgera and R Sankar. “A survey of intrusion detection systems in wireless sensor networks”. IEEE Commun. Surv. Tutorials 16.1 (2014): 266-282.
  7. S Ifzarne., et al. “Anomaly Detection using Machine Learning Techniques in Wireless Sensor Networks”. J. Phys. Conf. Ser 1743.1 (2021).
  8. F Cauteruccio., et al. “Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance”. Inf. Fusion 52 (2019): 13-30.
  9. Yihao Zang, Xianhao Shen and Shaohua Niu. “A Method for Detecting Abnormal Data of Network Nodes Based on Convolutional Neural Network”. Electrical Engineering and Systems Science (2021): 1-12.