Secure E-Learning Environment with low cost

نویسندگان

  • Shweta Jain
  • Prateek Gupta
چکیده

Cloud computing is spreading around the world with leaps and touching every part of communication era with Internet technology. Rapid growth of the communication techniques and devices are adding the requirements to bind all of these devices under one hood. Cloud is becoming a perfect solution for the same. With this rapid penetration of cloud computing in human life creating many new challenges such as very high requirements of the security, load balancing, congestion control etc. Almost every researcher is focusing their current work to meet out these requirements of clouds to fit their work in the new cloud environment. Security over the cloud has been the challenge from the very initials of the cloud computing emergent. Security conventionally is being taken as a mechanism to incorporate availability, authentication, repudiation, isolation etc. Since cloud environment is being provided to the users on the pay per basis therefore cost management is also required alongwith the security measures to be applied with cloud computing. This paper proposes to provide a high security mechanism with low cost for the applications developed on the SaaS layer of the cloud. For simulation and result generation E-Learning for cloud has been taken as the application and simulation results shows that the cost is reduced even with the incorporation of the high security algorithm for the cloud. Keywords--Cloud Computing, e-Learning, Cloud Architecture, Virtualization, Distributed Computing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TBM Tunneling Construction Time with Respect to Learning Phase Period and Normal Phase Period

In every tunnel boring machine (TBM) tunneling project, there is an initial low production phase so-called the Learning Phase Period (LPP), in which low utilization is experienced and the operational parameters are adjusted to match the working conditions. LPP can be crucial in scheduling and evaluating the final project time and cost, especially for short tunnels for which it may constitute a ...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Exploiting Context Histories in Setting up an e-Home

Turning a home into a seamlessly integrated, yet secure environment, without excessive cost, presents a number of challenges. This paper attempts to draw various solutions together. What must be done for security, can also be exploited in making configuration less tedious. The home environment is augmented by low-cost invisible computers that let everyday objects communicate and integrate. Embe...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013