Data protection in cloud educational system in Saudi Arabia
Keywords:
Cloud computing, Access control, Attribute-based encryption, Data protection, Time performanceAbstract
Education is the basis for the development of peoples and the progress of countries, so the Saudi government has made great efforts to develop education, and made this development one of the most important goals of the 2030 vision, and among the most prominent of these efforts and most in keeping with the current local and global conditions is what it provided during the Corona pandemic from the transformation to e-learning and the adoption of education platforms that enable its users to access and benefit from its services. Since the data of this systems users must be kept confidential and secure, this paper was made. This paper focuses on the security aspects of data protection in educational system in the Kingdom of Saudi Arabia in cloud computing environment. This paper involves data protection aspects by protecting data of Saudi educational systems and maintaining their integrity and confidentiality. It also proposes a secure model based on Attribute-based encryption as an access control technique to avoid tampering with data when unauthorized people try to access it, and to protect data the proposed model applies combined encryption system using AES and RSA encryption algorithms.
Downloads
References
Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing environments. In Cloud security: Concepts, methodologies, tools, and applications (pp. 249-263). IGI Global.
Wang, L., Von Laszewski, G., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: a perspective study. New generation computing, 28(2), 137-146.
Rashid, A., & Chaturvedi, A. (2019). Cloud computing characteristics and services: a brief review. International Journal of Computer Sciences and Engineering, 7(2), 421-426.
Mell P.M. and Grance.T. 2011. “The NIST Definition of Cloud Computing.” In Computer Security Publications from the National Institute of Standards and Technology (NIST) SP 800145.Gaithersburg: National Institute of Standards & Technology.
Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., ... & Sarkar, P. (2018, January). Cloud computing security challenges & solutions-A survey. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE.
Tabrizchi, H., & Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.
Alam, T. (2021). Cloud Computing and its role in the Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1, 108-115.
Sriram, I., & Khajeh-Hosseini, A. (2010). Research agenda in cloud technologies. arXiv preprint arXiv:1001.3259.
Taghipour, M., Soofi, M. E., Mahboobi, M., & Abdi, J. (2020). Application of cloud computing in system management in order to control the process. Management, 3(3), 34-55.
Singh, Jaswinder & Dhiman, Gaurav. (2021). A survey on cloud computing approaches. Materials Today: Proceedings. 10.1016/j.matpr.2021.05.334.
Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A comprehensive survey on security in cloud computing. Procedia Computer Science, 110, 465-472.
Csrc.nist.gov (2018) SP 500-299 (DRAFT), NIST Cloud Computing Security Reference Architecture | CSRC (online). https://csrc.nist.gov/publications/detail/sp/500-299/draft. Accessed 11 Sept 2018
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical review. International Journal of Computer Network and Information Security, 6(3), 20.
Bhad, P., Hande, J. Y., & Tiwari, S. J. INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY APPROACH TO THE OVERVIEW OF CLOUD COMPUTING, APPLICATION AND FUTURE SCOPE.
Aljabri, M., Chrouf, S. M., Alzahrani, N. A., Alghamdi, L., Alfehaid, R., Alqarawi, R., ... & Alduhailan, N. (2021). Sentiment Analysis of Arabic Tweets Regarding Distance Learning in Saudi Arabia during the COVID-19 Pandemic. Sensors, 21(16), 5431.
Rajeswari, S., & Kalaiselvi, R. (2017, December). Survey of data and storage security in cloud computing. In 2017 IEEE International Conference on Circuits and Systems (ICCS) (pp. 76-81). IEEE.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.
Karatas, G., & Akbulut, A. (2018). Survey on access control mechanisms in cloud computing. Journal of Cyber Security and Mobility, 1-36.
Shen, H. B., & Hong, F. (2005). Review of access control model. Appl. Res. Comput, 22(6), 9-11.
Cai, F., Zhu, N., He, J., Mu, P., Li, W., & Yu, Y. (2019). Survey of access control models and technologies for cloud computing. Cluster Computing, 22(3), 6111-6122.
Han, D. J., Gao, J., & Zhai, H. L. (2010). Research progress of access control model. Computer Science, (11), 29-33.
Lampson, B. W. (1968). A scheduling philosophy for multiprocessing systems. Communications of the ACM, 11(5), 347-360.
Dubey, S., & Rai, P. K. (2021). A Review of Cloud Service Security with Various Access Control Methods.
Albulayhi, K., Abuhussein, A., Alsubaei, F., & Sheldon, F. T. (2020, January). Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review. In 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0748-0755). IEEE.
Zhang, Y., Deng, R. H., Xu, S., Sun, J., Li, Q., & Zheng, D. (2020). Attribute-based encryption for cloud computing access control: A survey. ACM Computing Surveys (CSUR), 53(4), 1-41.
Zhang, P., Liu, J. K., Yu, F. R., Sookhak, M., Au, M. H., & Luo, X. (2018). A survey on access control in fog computing. IEEE Communications Magazine, 56(2), 144-149.
Zhong, H., Zhu, W., Xu, Y., & Cui, J. (2018). Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Computing, 22(1), 243-251.
Sifou, F., Hammouch, A., & Kartit, A. (2017, October). Ensuring security in cloud computing using access control: A survey. In Proceedings of the Mediterranean Symposium on Smart City Applications (pp. 255-264). Springer, Cham.
Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. In Annual international conference on the theory and applications of cryptographic techniques (pp. 457-473). Springer, Berlin, Heidelberg.
Asim, M., Petkovic, M., & Ignatenko, T. (2014). Attribute-based encryption with encryption and decryption outsourcing.
Sookhak, M., Yu, F. R., Khan, M. K., Xiang, Y., & Buyya, R. (2017). Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Future Generation Computer Systems, 72, 273-287.
Lee, J., Oh, S., & Jang, J. W. (2015). A Work in Progress: Context based encryption scheme for Internet of Things. Procedia Computer Science, 56, 271-275.
Goyal, V., & Pandey, O. a. Sahai andB. Waters, IattributeY Based Encryption for fineYgraind access control of encrypted data. In Proceedings of the 13th aCM conference on Computer and communications security.
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., & Jonker, W. (2009, August). Mediated ciphertext-policy attribute-based encryption and its application. In International Workshop on Information Security Applications (pp. 309-323). Springer, Berlin, Heidelberg.
Yu, S., Wang, C., Ren, K., & Lou, W. (2010, April). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM symposium on information, computer and communications security (pp. 261-270).
Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31.
Khan, S. S., & Tuteja, R. R. (2015). Security in cloud computing using cryptographic algorithms. International Journal of Innovative Research in Computer and Communication Engineering, 3(1), 148-155.
Gampala, V., Inuganti, S., & Muppidi, S. (2012). Data security in cloud computing with elliptic curve cryptography. International Journal of Soft Computing and Engineering (IJSCE), 2(3), 138-141.
Semwal, P., & Sharma, M. K. (2017, September). Comparative study of different cryptographic algorithms for data security in cloud computing. In 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall) (pp. 1-7). IEEE.
Ebrahim, M., Khan, S., & Khalid, U. B. (2014). Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398.
Bala, T., & Kumar, Y. (2015). Asymmetric Algorithms and Symmetric Algorithms: A Review. International Journal of Computer Applications (ICAET), 1-4.
Hardjono, T., & Dondeti, L. R. (2005). Security in Wireless LANS and MANS (Artech House Computer Security). Artech House, Inc..
Mahalle, V. S., & Shahade, A. K. (2014, October). Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm. In 2014 International Conference on Power, Automation and Communication (INPAC) (pp. 146-149). IEEE.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.