International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.10, No.4, Apr. 2018

E-Learning to m-Learning: Framework for Data Protection and Security in Cloud Infrastructure

Full Text (PDF, 692KB), PP.1-9

Views:74   Downloads:4


Olugbenga W. Adejo, Isaiah Ewuzie, Abel Usoro, Thomas Connolly

Index Terms

Electronic learning;Mobile Learning;Learning Analytics;Cloud Computing;Security Framework


In recent years, the advancement in internet technologies has greatly altered the learning landscape, thus, a shift from traditional methods of learning to internet based learning platforms. E-learning, m-learning and cloud are some of the most powerful responses to these growing technological shift by the education sectors. Their impact and benefits cannot be over-emphasized with regard to making learning accessible, affordable, available and convenient. In addition, the use of cloud technology has made the world of education more integrated, networked and composite. This makes e-learning and m-learning as highly effective as the conventional method of learning delivery. However, despite these advantages, the security and the protection of learners’ data on this cloud platform have been some of the major challenges to m-learning effective implementation and use.

This paper discusses the various benefits of the using m-learning platform and cloud infrastructure in higher education. It also examines the vulnerabilities of the platform as well as other security and privacy challenges regarding the effective implementation of m-learning in cloud infrastructure environment. Finally, it proposes a detailed data protection and security framework that is needed for addressing these issues. It is expected that the proposed framework when fully implemented, will bring about necessary solution to issues relating to the security and data protection of m-learners in cloud computing environment, increase trust in the use of the system as well as enhance the m-learning platforms.

Cite This Paper

Olugbenga W. Adejo, Isaiah Ewuzie, Abel Usoro, Thomas Connolly, "E-Learning to m-Learning: Framework for Data Protection and Security in Cloud Infrastructure", International Journal of Information Technology and Computer Science(IJITCS), Vol.10, No.4, pp.1-9, 2018. DOI: 10.5815/ijitcs.2018.04.01


[1]F. Bahry, N. Anwar, N. Amran, and R. Rias 2015. “Conceptualizing security measures on mobile learning for Malaysian higher education institutions”. Procedia-Social and Behavioral Sciences, 176, pp.1083-1088.

[2]D. Keegan, G. Dismihok, N. Mileva, and T. Rekkedal. (2006). “The role of mobile learning in European education”. Work Package 4, 227828-CP-1-2006-1-IE-MINERVA-M, European Commission.

[3]A. Dias, J. Carvalho, D. Keegan, G. Kismihok, N. Mileva, J. Nix, and T. Rekkedal, 2008. “An Introduction to mobile learning”. Work package.

[4]A. T. Korucu, and A. Alkan,, 2011. “Differences between m-learning (mobile learning) and e-learning, basic terminology and usage of m-learning in education”. Procedia-Social and Behavioral Sciences, 15, pp.1925-1930.

[5]A. Al-Hunaiyyan,,  R. Alhajri and S. Al-Sharhan , 2016. “Perceptions and challenges of mobile learning in Kuwait”. Journal of King Saud University-Computer and Information Sciences

[6]S. Oyelere, D. Sajoh, Y. Malgwi  and L. Oyelere, 2015, November. “Cybersecurity issues on web-based systems in Nigeria: M-learning case study”. In Cyberspace (CYBER-Abuja), 2015 International Conference on (pp. 259-264). IEEE.

[7]R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. Brandic, 2009. “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility”. Future Generation computer systems, 25(6), pp.599-616.

[8]C. Low, Y. Chen, and M. Wu, 2011. “Understanding the determinants of cloud computing adoption”. Industrial management & data systems, 111 (7), pp.1006-1023

[9]T. Ercan, (2010). “Effective use of cloud in educational institutions”. Science Direct. Procedia Social and Behavioural Science.  pp. 938-942. Elsevier

[10]P. Mell, and T. Grance, 2011. The NIST definition of cloud computing.

[11]C. Allison, A. Miller, I. Oliver, R. Michaelson. and T. Tiropanis (2012). “The Web in education”. Computer Networks, 56 (18), pp. 3811-3824.

[12]R. Arora, A. Parashar and C. C. Transforming, 2013. “Secure user data in cloud computing using encryption algorithms”. International journal of engineering research and applications, 3(4), pp.1922-1926.

[13]D.Morrill, (2011) “Cloud Computing in Education” Available at

[14]A. Jain and U.S. Pandey, (2013). “Role of Cloud computing in higher education. International Journal of Advanced Research in Computer Science and Software Engineering, 3(7).

[15]R. Katz, P. Goldstein, R. Yanosky, and B. Rushlo. "Cloud computing in higher education." In EDUCAUSE.[Online],[Retrieved October 5, 2017], http://net. educause. edu/section_params/conf/CCW, vol. 10. 2010.

[16]S. Tout, W. Sverdlik, and G. Lawver (2009). Cloud computing and its security in higher education. [Online] Available from:  _Cloud_Computing_and_its_Security_in_Higher_Education/links/553841300cf226723ab62be6.pdf [Accessed 15 March 2017].

[17]A. Singh, D. Shrivastava. (2012) “Overview of attacks on cloud computing”. International Journal of Engineering and Innovative Technology (IJEIT). 2012 Apr;1(4).

[18]J. M. Calero, N. Edwards, J. Kirschnick, L.Wilcock, and M. Wray, 2010. “Toward a multi-tenancy authorization system for cloud services”. IEEE Security & Privacy, 8(6), pp.48-55.

[19]I. Ivanov, (2011). “Cloud computing in education: the Intersection of challenges and opportunities”. In:  International Conference on Web Information Systems and Technologies, pp. 3-16, Springer, Berlin, Heidelberg.

[20]G. Feuerlicht, V. Snasel, P. Szczepaniak, A. Abraham and J. Kacprzyk  (2010). “Next Generation SOA: Can SOA Survive Cloud Computing?” In: Advances in Intelligent Web Mastering - 2 Springer Berlin / Heidelberg, pp. 19-29.

[21]R. N. Katz, P. Goldstein, and R. Yanosky, 2009. “Demystifying cloud computing for higher education”. EDUCAUSE Center for Applied Research Bulletin, 19, pp.1-13.

[22]P. Pocatilu, F. Alecu, and M.Vetrici, 2010. “Measuring the efficiency of cloud computing for e-learning systems”. Wseas transactions on computers, 9(1), pp.42-51

[23]J. Staten, (2009). Is Cloud Computing Ready For The Enterprise?  [Online] Available from: [Accessed 13 October 2017].

[24]L.M Vaquero, M. Rodero-Merino, J. Caceres and M. Lindner. (2009). Break in the Clouds: Towards a Cloud definition. ACM SIGCOMM Computer Review, 39 (1), pp. 50-55.

[25]L. Wang, J. Tao and M. Kunze (2008). “Scientific Cloud Computing: Early Definition and Experience”. In: the 10th IEEE International Conference on High Performance Computing and Communications, 8, pp. 825-830.  IEEE.

[26]A. Weiss. (2007). “Computing in the clouds”. networker, 11(4), pp.16-25.

[27]X. Li, Y. Li, T. Liu, J. Qiu, and F. Wang, (2009). “The Method and Tool of Cost Analysis for Cloud Computing”. 2009 IEEE International Conference on Cloud Computing. DOI 10.1109/CLOUD.2009.84, IEEE Computer Society.

[28]H. Suo, Z. Liu, J. Wan, and Zhou, K. (2013). “Security and privacy in mobile cloud computing”. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International (pp. 655-659). IEEE.