SCES proposed model for data protection in cloud educational system in Saudi Arabia

https://doi.org/10.53730/ijhs.v6nS3.7018

Authors

  • Sanaa Alkhaldi
  • Mohammed A. AlZain
  • Mehedi Masud

Keywords:

cloud computing, access control, attribute-based encryption, data protection, time performance

Abstract

Education is the basis for the development of peoples and the progress of countries, so the Saudi government has made great efforts to develop education, and made this development one of the most important goals of the 2030 vision, and among the most prominent of these efforts and most in keeping with the current local and global conditions is what it provided during the Corona pandemic from the transformation to e-learning and the adoption of education platforms that enable its users to access and benefit from its services. Since the data of this systems users must be kept confidential and secure, this paper was made. This paper focuses on the security aspects of data protection in educational system in the Kingdom of Saudi Arabia in cloud computing environment. This paper involves data protection aspects by protecting data of Saudi educational systems and maintaining their integrity and confidentiality. It also proposes a secure model called SCES (Secure Cloud Educational System) based on Attribute-based encryption as an access control technique to avoid tampering with data when unauthorized people try to access it, and to protect data the proposed model applies combined encryption system using AES and RSA encryption algorithms.  

Downloads

Download data is not yet available.

References

Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing environments. In Cloud security: Concepts, methodologies, tools, and applications (pp. 249-263). IGI Global.‏

Wang, L., Von Laszewski, G., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: a perspective study. New generation computing, 28(2), 137-146.‏

Rashid, A., & Chaturvedi, A. (2019). Cloud computing characteristics and services: a brief review. International Journal of Computer Sciences and Engineering, 7(2), 421-426.‏

Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., ... & Sarkar, P. (2018, January). Cloud computing security challenges & solutions-A survey. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE.‏

Tabrizchi, H., & Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.‏

Alam, T. (2021). Cloud Computing and its role in the Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1, 108-115.‏

Sriram, I., & Khajeh-Hosseini, A. (2010). Research agenda in cloud technologies. arXiv preprint arXiv:1001.3259.‏

Taghipour, M., Soofi, M. E., Mahboobi, M., & Abdi, J. (2020). Application of cloud computing in system management in order to control the process. Management, 3(3), 34-55.‏

Bhad, P., Hande, J. Y., & Tiwari, S. J. INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY APPROACH TO THE OVERVIEW OF CLOUD COMPUTING, APPLICATION AND FUTURE SCOPE.‏

Aljabri, M., Chrouf, S. M., Alzahrani, N. A., Alghamdi, L., Alfehaid, R., Alqarawi, R., ... & Alduhailan, N. (2021). Sentiment Analysis of Arabic Tweets Regarding Distance Learning in Saudi Arabia during the COVID-19 Pandemic. Sensors, 21(16), 5431.‏

Rajeswari, S., & Kalaiselvi, R. (2017, December). Survey of data and storage security in cloud computing. In 2017 IEEE International Conference on Circuits and Systems (ICCS) (pp. 76-81). IEEE.‏

Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.‏

Karatas, G., & Akbulut, A. (2018). Survey on access control mechanisms in cloud computing. Journal of Cyber Security and Mobility, 1-36.‏

Shen, H. B., & Hong, F. (2005). Review of access control model. Appl. Res. Comput, 22(6), 9-11.‏

Cai, F., Zhu, N., He, J., Mu, P., Li, W., & Yu, Y. (2019). Survey of access control models and technologies for cloud computing. Cluster Computing, 22(3), 6111-6122.‏

Han, D. J., Gao, J., & Zhai, H. L. (2010). Research progress of access control model. Computer Science, (11), 29-33.‏

Lampson, B. W. (1968). A scheduling philosophy for multiprocessing systems. Communications of the ACM, 11(5), 347-360.‏

Dubey, S., & Rai, P. K. (2021). A Review of Cloud Service Security with Various Access Control Methods.‏

Albulayhi, K., Abuhussein, A., Alsubaei, F., & Sheldon, F. T. (2020, January). Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review. In 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0748-0755). IEEE.‏

Zhang, Y., Deng, R. H., Xu, S., Sun, J., Li, Q., & Zheng, D. (2020). Attribute-based encryption for cloud computing access control: A survey. ACM Computing Surveys (CSUR), 53(4), 1-41.‏

Zhang, P., Liu, J. K., Yu, F. R., Sookhak, M., Au, M. H., & Luo, X. (2018). A survey on access control in fog computing. IEEE Communications Magazine, 56(2), 144-149.‏

Zhong, H., Zhu, W., Xu, Y., & Cui, J. (2018). Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Computing, 22(1), 243-251.‏

Sifou, F., Hammouch, A., & Kartit, A. (2017, October). Ensuring security in cloud computing using access control: A survey. In Proceedings of the Mediterranean Symposium on Smart City Applications (pp. 255-264). Springer, Cham.‏

Published

07-05-2022

How to Cite

Alkhaldi, S., AlZain, M. A., & Masud, M. (2022). SCES proposed model for data protection in cloud educational system in Saudi Arabia. International Journal of Health Sciences, 6(S3), 5090–5126. https://doi.org/10.53730/ijhs.v6nS3.7018

Issue

Section

Peer Review Articles