International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 12, Issue 2 (February 2025), Pages: 136-142

----------------------------------------------

 Original Research Paper

Strengthening authentication in online learning environments using public key infrastructure: A literature review

 Author(s): 

 Mohammad Husam Alhumsi 1, *, Hamza Alhumsi 2

 Affiliation(s):

 1College of Sciences and Theoretical Studies, Saudi Electronic University, Riyadh, Saudi Arabia
 2Saudi Information Technology Company (SITE), Riyadh, Saudi Arabia

 Full text

  Full Text - PDF

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0002-0189-4443

 Digital Object Identifier (DOI)

 https://doi.org/10.21833/ijaas.2025.02.015

 Abstract

Higher education institutions are increasingly adopting e-learning due to its numerous advantages. Although online education technologies have advanced significantly, issues related to security and privacy have not received adequate attention. This paper reviews existing research on security and privacy challenges in online education, with a particular focus on enhancing online learning environments using Public Key Infrastructure (PKI). The review shows that PKI provides a secure foundation for online interactions by ensuring reliable authentication and data protection. Additionally, both service providers and users benefit from mutual trust when PKI certificates are used to support authentication and authorization processes. Further research could explore how machine learning and deep learning can enhance security measures and strengthen the effectiveness of PKI systems.

 © 2025 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords

 E-learning security, Privacy concerns, Public key infrastructure, Online authentication, Machine learning security

 Article history

 Received 19 September 2024, Received in revised form 13 January 2025, Accepted 28 January 2025

 Acknowledgment

No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Alhumsi MH and Alhumsi H (2025). Strengthening authentication in online learning environments using public key infrastructure: A literature review. International Journal of Advanced and Applied Sciences, 12(2): 136-142

 Permanent Link to this page

 Figures

 No Figure

 Tables

 No Table

----------------------------------------------   

 References (36)

  1. Abouelmehdi K, Beni-Hessane A, and Khaloufi H (2018). Big healthcare data: Preserving security and privacy. Journal of Big Data, 5: 1. https://doi.org/10.1186/s40537-017-0110-7   [Google Scholar]
  2. Akacha SAL and Awad AI (2023). Enhancing security and sustainability of e-learning software systems: A comprehensive vulnerability analysis and recommendations for stakeholders. Sustainability, 15(19): 14132. https://doi.org/10.3390/su151914132   [Google Scholar]
  3. Albarqi A, Alzaid E, Al Ghamdi F, Asiri S, and Kar J (2015). Public key infrastructure: A survey. Journal of Information Security, 6: 31-37. https://doi.org/10.4236/jis.2015.61004   [Google Scholar]
  4. Aldhaheri A, Alwahedi F, Ferrag MA, and Battah A (2024). Deep learning for cyber threat detection in IoT networks: A review. Internet of Things and Cyber-Physical Systems, 4: 110-128. https://doi.org/10.1016/j.iotcps.2023.09.003   [Google Scholar]
  5. Alghazzawi DM, Hasan SH, and Trigui MSA (2014). Information systems threats and vulnerabilities. International Journal of Computer Applications, 89(3): 25-29. https://doi.org/10.5120/15483-4248   [Google Scholar]
  6. Al-Hamdani WA (2014). Secure e-learning and cryptography. In: Sullivan KPH, Czigler PE, and Hellgren JMSC (Eds.), Cases on professional distance education degree programs and practices: Successes, challenges, and issues: 331-369. IGI Global, Pennsylvania, USA. https://doi.org/10.4018/978-1-4666-4486-1.ch012   [Google Scholar]
  7. Alhumsi MH, Alshaye RA, and Sendi KK (2021). The effect of e-learning sessions on the development of reading comprehension: A case of EFL students' perceptions at Saudi electronic university. Journal of Education and e-Learning Research, 8(4): 431-439. https://doi.org/10.20448/journal.509.2021.84.431.439   [Google Scholar]
  8. Ali R and Zafar H (2017). A security and privacy framework for e-learning. International Journal for E-Learning Security, 7(2): 556-566. https://doi.org/10.20533/ijels.2046.4568.2017.0070   [Google Scholar]
  9. Alsayyar A and Almakki R (2021). The impact of augmented reality on E-learning systems in Saudi Arabia universities. Computer and Information Science, 14(2): 50-62. https://doi.org/10.5539/cis.v14n2p50   [Google Scholar]
  10. Choudhury S and Pattnaik S (2020). Emerging themes in e-learning: A review from the stakeholders' perspective. Computers & Education, 144: 103657. https://doi.org/10.1016/j.compedu.2019.103657   [Google Scholar]
  11. Costinela-LuminiĊ£a CD and Nicoleta-Magdalena CI (2012). E-learning security vulnerabilities. Procedia-Social and Behavioral Sciences, 46: 2297-2301. https://doi.org/10.1016/j.sbspro.2012.05.474   [Google Scholar]
  12. Danquah P and Kwabena-Adade H (2020). Public key infrastructure: An enhanced validation framework. Journal of Information Security, 11(4): 241-260. https://doi.org/10.4236/jis.2020.114016   [Google Scholar]
  13. Devineni SK, Kathiriya S, and Shende A (2023). Machine learning-powered anomaly detection: Enhancing data security and integrity. Journal of Artificial Intelligence and Cloud Computing, 2(2): 1-9. https://doi.org/10.47363/JAICC/2023(2)184   [Google Scholar]
  14. Dhillon G, Smith K, and Dissanayaka I (2021). Information systems security research agenda: Exploring the gap between research and practice. The Journal of Strategic Information Systems, 30(4): 101693. https://doi.org/10.1016/j.jsis.2021.101693   [Google Scholar]
  15. Dwiastuty N and Sulhan M (2018). The using of readutainment as e-learning to improve students' reading comprehension skill. In the MATEC Web of Conferences: The 2nd International Conference on Engineering and Technology for Sustainable Development, EDP Sciences, Yogyakarta, Indonesia, 154: 03007. https://doi.org/10.1051/matecconf/201815403007   [Google Scholar]
  16. Hadan H, Serrano N, and Camp LJ (2021). A holistic analysis of web-based public key infrastructure failures: Comparing experts' perceptions and real-world incidents. Journal of Cybersecurity, 7(1): 1-17. https://doi.org/10.1093/cybsec/tyab025   [Google Scholar]
  17. Ibrahim H, Karabatak S, and Abdullahi AA (2020). A study on cybersecurity challenges in e-learning and database management system. In the 8th International Symposium on Digital Forensics and Security, IEEE, Beirut, Lebanon: 1-5. https://doi.org/10.1109/ISDFS49300.2020.9116415   [Google Scholar]
  18. Jorayeva S and Eyadat MS (2023). Ensuring data security in elearning: Challenges and solutions. In the International Conference on Computational Science and Computational Intelligence, IEEE, Las Vegas, USA: 900-906. https://doi.org/10.1109/CSCI62032.2023.00150   [Google Scholar]
  19. Kambourakis G, Kontoni DPN, Rouskas A, and Gritzalis S (2007). A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Computers and Education, 48(1): 1-16. https://doi.org/10.1016/j.compedu.2004.10.017   [Google Scholar]
  20. Kausar S, Huahu X, Ullah A, Wenhao Z, and Shabir MY (2023). Fog-assisted secure data exchange for examination and testing in e-learning system. Mobile Networks and Applications, 28: 673–689. https://doi.org/10.1007/s11036-019-01429-x   [Google Scholar]
  21. Khashan OA, Alamri S, Alomoush W, Alsmadi MK, Atawneh S, and Mir U (2023). Blockchain-based decentralized authentication model for IoT-based e-learning and educational environments. Computers, Materials and Continua, 75(2): 3133-3158. https://doi.org/10.32604/cmc.2023.036217   [Google Scholar]
  22. Li Z, Lou X, Chen M, Li S, Lv C, Song S, and Li L (2023). Students' online learning adaptability and their continuous usage intention across different disciplines. Humanities and Social Sciences Communications, 10: 838. https://doi.org/10.1057/s41599-023-02376-5   [Google Scholar]
  23. Lozupone V (2018). Analyze encryption and public key infrastructure (PKI). International Journal of Information Management, 38(1): 42-44. https://doi.org/10.1016/j.ijinfomgt.2017.08.004   [Google Scholar]
  24. Majeed A, Baadel S, and Haq AU (2016). Global triumph or exploitation of security and privacy concerns in e-learning systems. In the 11th International Conference on Global Security, Safety and Sustainability-The Security Challenges of the Connected World, Springer International Publishing, London, UK: 351-363. https://doi.org/10.1007/978-3-319-51064-4_28   [Google Scholar]
  25. Martins JT and Nunes MB (2016). Academics' e-learning adoption in higher education institutions: A matter of trust. The Learning Organization, 23(5): 299-331. https://doi.org/10.1108/TLO-05-2015-0034   [Google Scholar]
  26. Maulani G, Gunawan G, Leli L, Nabila EA, and Sari WY (2021). Digital certificate authority with blockchain cybersecurity in education. International Journal of Cyber and IT Service Management, 1(1): 136-150. https://doi.org/10.34306/ijcitsm.v1i1.40   [Google Scholar]
  27. Medaglia CM and Serbanati A (2010). An overview of privacy and security issues in the the Internet of Things. In: Giusto D, Iera A, Morabito G, and Atzori L (Eds.), The Internet of Things: 389-395. Springer, New York, USA. https://doi.org/10.1007/978-1-4419-1674-7_38   [Google Scholar]
  28. Mogollon M (2008). Certificates and public key infrastructure. In: Mogollon M (Ed.), Cryptography and security services: mechanisms and applications: 217-245. IGI Global, Pennsylvania, USA. https://doi.org/10.4018/978-1-59904-837-6.ch009   [Google Scholar]
  29. Nassani AA, Grigorescu A, Yousaf Z, Trandafir RA, Javed A, and Haffar M (2023). Leading role of e-learning and blockchain towards privacy and security management: A study of electronics manufacturing firms. Electronics, 12(7): 1579. https://doi.org/10.3390/electronics12071579   [Google Scholar]
  30. Ren Y, Qi J, Liu Y, Wang J, and Kim GJ (2021b). Integrity verification mechanism of sensor data based on bilinear map accumulator. ACM Transactions on Internet Technology, 21(1): 5. https://doi.org/10.1145/3380749   [Google Scholar]
  31. Ren Y, Zhu F, Zhu K, Sharma PK, and Wang J (2021a). Blockchain-based trust establishment mechanism in the Internet of Multimedia Things. Multimedia Tools and Applications, 80: 30653-30676. https://doi.org/10.1007/s11042-020-09578-y   [Google Scholar]
  32. Saleous H, Ismail M, AlDaajeh SH, Madathil N, Alrabaee S, Choo KKR, and Al-Qirim N (2023). COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. Digital Communications and Networks, 9(1): 211-222. https://doi.org/10.1016/j.dcan.2022.06.005   [Google Scholar] PMid:35765301 PMCid:PMC9222023
  33. Tick A, Cranfield DJ, Venter IM, Renaud KV, and Blignaut RJ (2021). Comparing three countries' higher education students' cyber related perceptions and behaviours during COVID-19. Electronics, 10(22): 2865. https://doi.org/10.3390/electronics10222865   [Google Scholar]
  34. Xia Z, Wei Z, and Zhang H (2022). Review on security issues and applications of trust mechanism in wireless sensor networks. Computational Intelligence and Neuroscience, 2022: 3449428. https://doi.org/10.1155/2022/3449428   [Google Scholar] PMid:36203716 PMCid:PMC9532060
  35. Yee G, Xu Y, Korba L, and El-Khatib K (2007). Privacy and security in e-learning. In: Shih TK and Hung J (Eds.), Future directions in distance learning and communication technologies: 52-75. IGI Global, Pennsylvania, USA. https://doi.org/10.4018/978-1-59904-376-0.ch003   [Google Scholar]
  36. Zhang C, Sun J, Zhu X, and Fang Y (2010). Privacy and security for online social networks: Challenges and opportunities. IEEE Network, 24(4): 13-18. https://doi.org/10.1109/MNET.2010.5510913   [Google Scholar]