D-Library Repositry

//uquui/

Reports Community

Annual Report Collection

 2019

 An advanced security scheme for users’ authentication over e-learning platform

 Alqahtani, Abdulaziz Saleh


//uquui/handle/20.500.12248/116037
0 Downloads
838 Visits

An advanced security scheme for users’ authentication over e-learning platform

Call Number : 23279
Publisher :جامعة أم القرى
Pub Place : مكة المكرمة
Issue Date : 2019 - 1440 H
Description : 46 paper
Format : ماجستير
Language : عربي
Is format of : مكتبة الملك عبدالله بن عبدالعزيز الجامعية

With the rapid and remarkable growth of technologies for the past few years, the Internet has evolved and expanded to include the emergence of new and Internet-related technologies. Also, the applications developed and processed data and used the Internet in many magazines, including training through the Internet and developed to include all areas of education and the emergence of e-learning. In addition, people have increasingly used e-learning as an attractive education. Also, progress has been made in admission and distance learning and the opportunity to enroll in schools, institutes, and universities remotely and through the Internet. Therefore, educational institutions have traded e-learning platforms and distance education because of the increasing desire of people to learn online. In addition, e-learning and e-learning platforms have provided e-learning and e-learning platforms and are one of the main pillars of learning and one of the most important activities in the e-learning environment. Therefore, the use of electronic notes provides benefits such as learning opportunities, automatic signs and direct comments. Also, provide information on the delivery of the outputs of the educational process and improve the educational learning environment [1]. However, the availability of the e-learning infrastructure has been exposed to a range of illegal measures that rely on electronic assessments over the Internet. Also, e-learning stakeholders, faculty, students and databases have raised security problems in e-learning systems [2]. Therefore, the provision of security requirements ensures confidentiality, integrity, availability and authenticity that can be used in e-learning to ensure the safety of stakeholders against potential threats and risks. However, the potential threats and vulnerabilities of the e-learning environment, which contain many resources such as hardware, software, and data, are always being protected by security policies [3]. For this reason, users of e-learning systems complain about the weakness of the basic systems and the lack of appropriate authentication mechanisms for e-evaluation or e-testing. In addition, user authentication is the basis of protection in any security system, because it ensures the identity of the user when trying to access the system resources and ensure the granting of access to rights to the system resources. The use of new technologies has increased the growing immoral behavior of students [4] [5]. The immoral behavior of students includes the use of technology in fraud during electronic testing using other electronic devices such as chats and forums. In addition, students can cheat by giving the user name and password to another student to serve as the original student. If the number of students is very large and the number of supervisors few will not notice these behaviors. In [6] the teachers noted the lack of confidence in the results and standards of electronic assessments due to the increased fraud methodologies by students and their use of rapid advances in technology. Finally, to verify the validity of our proposed scheme and evaluate its performance and effectiveness, we will perform simulations using a virtual e-learning platform which is designed based on the MATLAB tool. Also, we will discuss the results obtained and analyze them and verify the strength of the new validation scheme. The present research work is organized as follows: The first chapter will provide e-learning and basic concepts of the characteristics of e-learning and its development and challenges. Chapter 2 is going to describe the security of information, threats, and attacks on information security. Also, it will discuss security in the e-learning platforms and authentication in e-learning and then discusses the methods of authentication and evaluation in e-learning and towards a new authentication system. Next, chapter 3 will present the proposed safety scheme system and describes the modeling, associated algorithm, analysis and discussion and then validation of the proposed approach. Chapter 4 will discuss the validation and evaluation of the proposed validation scheme and the numerical results by simulating, analyzing and discussing the results.

Title: An advanced security scheme for users’ authentication over e-learning platform
Authors: Khlifi, Yassine Ramdhane
Alqahtani, Abdulaziz Saleh
Issue Date :: 2019
Publisher :: جامعة أم القرى
Abstract: With the rapid and remarkable growth of technologies for the past few years, the Internet has evolved and expanded to include the emergence of new and Internet-related technologies. Also, the applications developed and processed data and used the Internet in many magazines, including training through the Internet and developed to include all areas of education and the emergence of e-learning. In addition, people have increasingly used e-learning as an attractive education. Also, progress has been made in admission and distance learning and the opportunity to enroll in schools, institutes, and universities remotely and through the Internet. Therefore, educational institutions have traded e-learning platforms and distance education because of the increasing desire of people to learn online. In addition, e-learning and e-learning platforms have provided e-learning and e-learning platforms and are one of the main pillars of learning and one of the most important activities in the e-learning environment. Therefore, the use of electronic notes provides benefits such as learning opportunities, automatic signs and direct comments. Also, provide information on the delivery of the outputs of the educational process and improve the educational learning environment [1]. However, the availability of the e-learning infrastructure has been exposed to a range of illegal measures that rely on electronic assessments over the Internet. Also, e-learning stakeholders, faculty, students and databases have raised security problems in e-learning systems [2]. Therefore, the provision of security requirements ensures confidentiality, integrity, availability and authenticity that can be used in e-learning to ensure the safety of stakeholders against potential threats and risks. However, the potential threats and vulnerabilities of the e-learning environment, which contain many resources such as hardware, software, and data, are always being protected by security policies [3]. For this reason, users of e-learning systems complain about the weakness of the basic systems and the lack of appropriate authentication mechanisms for e-evaluation or e-testing. In addition, user authentication is the basis of protection in any security system, because it ensures the identity of the user when trying to access the system resources and ensure the granting of access to rights to the system resources. The use of new technologies has increased the growing immoral behavior of students [4] [5]. The immoral behavior of students includes the use of technology in fraud during electronic testing using other electronic devices such as chats and forums. In addition, students can cheat by giving the user name and password to another student to serve as the original student. If the number of students is very large and the number of supervisors few will not notice these behaviors. In [6] the teachers noted the lack of confidence in the results and standards of electronic assessments due to the increased fraud methodologies by students and their use of rapid advances in technology. Finally, to verify the validity of our proposed scheme and evaluate its performance and effectiveness, we will perform simulations using a virtual e-learning platform which is designed based on the MATLAB tool. Also, we will discuss the results obtained and analyze them and verify the strength of the new validation scheme. The present research work is organized as follows: The first chapter will provide e-learning and basic concepts of the characteristics of e-learning and its development and challenges. Chapter 2 is going to describe the security of information, threats, and attacks on information security. Also, it will discuss security in the e-learning platforms and authentication in e-learning and then discusses the methods of authentication and evaluation in e-learning and towards a new authentication system. Next, chapter 3 will present the proposed safety scheme system and describes the modeling, associated algorithm, analysis and discussion and then validation of the proposed approach. Chapter 4 will discuss the validation and evaluation of the proposed validation scheme and the numerical results by simulating, analyzing and discussing the results.
Description :: 46 paper
URI: https://dorar.uqu.edu.sa/uquui/handle/20.500.12248/116037
Appears in Collections :الرسائل العلمية المحدثة

Files in This Item :
File Description SizeFormat 
Abdulaziz Alqahtani_Master_19_May.pdf
"   Restricted Access"
الرسالة الكاملة1.07 MBAdobe PDFView/Open
Request a copy
Title.pdf
"   Restricted Access"
غلاف131.82 kBAdobe PDFView/Open
Request a copy
absa.pdf
"   Restricted Access"
ملخص الرسالة بالعربي172.55 kBAdobe PDFView/Open
Request a copy
abse.pdf
"   Restricted Access"
ملخص الرسالة بالإنجليزي85.39 kBAdobe PDFView/Open
Request a copy
indu.pdf
"   Restricted Access"
المقدمة128.4 kBAdobe PDFView/Open
Request a copy
cont.pdf
"   Restricted Access"
فهرس الموضوعات128.65 kBAdobe PDFView/Open
Request a copy
Add to Auditors PDF citation Digitization Request

Comments (0)



Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.