Cloud Computing Based E-learning System

Cloud Computing Based E-learning System

Cloud Computing Based E-learning SystemDigital Education

Cloud computing is a new model for managing and delivering services over the internet. It consists of a series of hardware and software resources made available on the Internet. Users can access, process, share, and store information through the Internet anytime and anywhere from any digital device. Cloud computing is flexible, highly scalable and creates virtualized resources that users can access all these resources without any specialized knowledge about the concept of cloud computing.

Cloud computing has a significant impact on teaching and learning environment. It is highly practical in education for both students and teachers. The cloud based environment supports the creation of new generation of e-learning systems. “E-learning (web-based learning system) is an Internet-based learning process using internet technology to design, implement, select, manage, support, and extend learning, which will not replace traditional education method, but will greatly improve the efficiency of education.” In fact, using web-based learning system has revolutionized educational organizations and has affected teaching and learning contexts in universities and educational institutions all over the world. In traditional web-based learning model, educational institutions invest a huge amount of money on hardware and software applications, infrastructure, maintenance and the appropriate training of staff to enable them to use technology effectively. However, in cloud based e-learning model, educational institutions without any infrastructure investments can get powerful software with lower or no up-front costs and fewer management headaches in the classroom. The development of e-Learning services within the cloud computing environment enables users to access diverse software applications, share data, collaborate more easily, and keep their data safely in the infrastructure. Moreover, it can lower expenses, reduce energy consumption, and help organizations with limited IT resources to deploy and maintain needed software in a timely manner.

Nowadays, some educational institutions provide private cloud services for their staff and students as well as external people for collaboration purposes. They can access various applications, services, and tools wherever and whenever they want. Students and teachers can conduct formal lessons even without a standard indoor classroom because cloud services allow them to share their information with anyone, anywhere, and at any time. Hence, learner-staff and learner-learner interactions as well as the learning experiences of both learners and staff will be enhanced. Therefore, cloud based-learning can be an efficient and effective system to help students obtain the 21st century skills and prepare them to succeed in the global information society.

Shifting e-learning in the cloud creates new security challenges. Main security concerns are about confidentiality, integrity and availability. Microsoft has provided instructions for IT managers to enhance the security in cloud based e-learning.

They are as follows:

  • Integration: Security and identity management technologies such as active directory, controls for role-based access and entity-level applications can be used to check integration points.
  • Privacy: data encryption, effective data anonymization and mobile location privacy are techniques for enhancing the security of cloud based e-learning.
  • Access: Educational institutions should be aware of a variety of methods to protect education records from improper access.
  • Jurisdiction: “ A cloud provider’s terms of service, privacy policy, and location may significantly affect a user’s privacy and confidentiality interests.” Educational institutions need to check the data whether it is to reside within their legal jurisdiction. Therefore, security concerns about cloud-based E-learning products are critical, and essential security measures should be implemented to protect valuable data.

By Mojgan Afshari

About Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

View All Articles

Sorry, comments are closed for this post.

Increasing Efficiency and Reducing Cost with Managed Printing Services

Increasing Efficiency and Reducing Cost with Managed Printing Services

Managed Printing Services This is a sponsored post written on behalf of HP MPS.  Today’s business leaders recognize the value of shared services, significantly providing a wide range of enterprises with the sophisticated tools they need to compete with big business, while additionally driving costs down. But an area often overlooked in our tech-savvy world…

Curing Cancer With Big Data

Curing Cancer With Big Data

Cancer & Big Data The fight against cancer has been going on for centuries. Many leaders have tried and failed to bring about change to cancer treatment. Richard Nixon famously declared a War on Cancer with the National Cancer Act of 1971, and while the Nixon administration certainly increased research funding, they ultimately fell short…

IoT & Predictive Analytics In Healthcare

IoT & Predictive Analytics In Healthcare

IoT & Predictive Analytics In a report by Grand View Research Inc., it’s predicted that the global Internet of Things (IoT) healthcare market will reach nearly $410 billion by 2022, with mobile penetration, software automation, and innovation medical devices promising rapid testing, greater accuracy, portability, and user-friendliness. Chronic diseases such as obesity, diabetes, heart failure,…

What Do You Do With A Drunken Sailor? Look To The Cloud

What Do You Do With A Drunken Sailor? Look To The Cloud

Saferide App Petty officer Michael Daigle of the US Navy has rolled out an app to curb drunken driving in the Navy ranks. His Saferide ride-sharing service runs on Voxox’s Cloud Phone service which costs just $15 a month and is popular among US Service members abroad, where mobile phones are not permitted for use…

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…