Affiliation:
1. Department of Computer Science and Engineering, K.S.Rangasamy College of Technology, Tiruchengode, Tamil Nadu, India
Abstract
Abundant reasonable computers, web resources and education content are identified to transform educational usage on-demand in the field of cloud infrastructure. Therefore, there comes a necessity to redesign the educational system to meet the needs better. The appearance of cloud based services supports the creation of latest generation e-learning systems for storing multimedia data within the cloud; it draws attention for academia and research area, which may be able to use high quality of resources. Even though the merits of cloud service are more attractive, the physical possession of users data is under security risk with respect to data correctness. This poses many new security challenges which have not been well explored. This paper focuses mainly on distributed data storage security for e-learning system, which has always been an important aspect of quality service. To make sure the correctness of users data within the cloud, an adaptable and effective auditing mechanism hitches the challenges and distributes erasure-coded data for e-learning web application. This extensive analysis shows that the auditing result achieves quick data error correction and localization of servers for malicious data modification attacks.
Reference21 articles.
1. A cost-effective cloud computing framework for accelerating multimedia communication simulations
2. Anirban, B., Jaideep, V., Hiroaki, K., Dimitrakos, T., & Srijith, K. N. (2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing: Advances, Systems and Applications. Springer.
3. Chengcheng, Z., & Wang, F. (2010). e-Learning instructional platforms based on network and multimedia technology. In Proceedings of the Second International Workshop on Education Technology and Computer Science (Vol. 2, pp. 464-467). IEEE Computer Society.
4. Chin-Bang., & Yao. (2010). Adaptive context aware and intelligent searching in mobile learning applications. In Proceedings of the Second International Conference on Computer and Automation (Vol. 5, pp. 802-806).
5. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献