Presentation is loading. Please wait.

Presentation is loading. Please wait.

FICEER 2017 Docker as a Solution for Data Confidentiality Issues in Learning Management System.

Similar presentations


Presentation on theme: "FICEER 2017 Docker as a Solution for Data Confidentiality Issues in Learning Management System."— Presentation transcript:

1 FICEER 2017 Docker as a Solution for Data Confidentiality Issues in Learning Management System

2 Outlines Introduction. E-Learning. Learning Management System (LMS).
Docker. Data Confidentiality Issues and Possible Solution using Docker. Conclusion and future work.

3 Introduction E-learning is the way where each and every person can share their knowledge with any one on any time and many IT organizations are using the services of cloud computing to more efficiently utilize the services on internet (Khetan, M. et al. 2013). Docker is an open source product that has many capabilities from previous technologies such as LXC containers, Git type of version control and operation system virtualization. Most of the cloud based systems need an eased scalability option, where Docker containers play a great solution (Boettiger, 2015). There will be a growing need for high levels of confidentiality and privacy in e-learning applications, and that security technologies must be put in place to meet these needs (El-khatib, K. 2003).

4 E-Learning E-learning is a form of distance learning because the participants and the instructor can reside in different locations, and the interaction is mostly asynchronous (Luminita, D. C. 2011). E-learning is related to designing, delivering, selecting, administering and extend learning using Internet technology. As a consequence of e-learning having to depend on the Internet or, specifically, mostly via web web applications, the e-learning environment has also become affected by security threats (Alwi, N. 2009).

5 Learning Management System (LMS)
LMS is a software that allows managing information and documentation as well as tracking the learning process together with reporting and delivering the courses or training programs (Watson, W. et all 2007). It allows the lecturer/instructor delivering the course material to the students, monitoring and managing the tests/assignments, monitoring the student performance, managing record and transaction. Cloud computing has become a hot topic due to its ability to deliver resources on demand as well as sharing its resources (Fernandes, D. A. 2014). The improvement of cloud’s performance and efficiency through container-based virtualization encourages e-learning developers to deploy their LMS in this environment (Ketel, M. 2014). Docker is one of the brand solution for this purpose.

6 Figure 1. Virtual machine vs container

7 Docker Cloud computing is a technology to share resources such as networks, servers, storages, applications, and services. Previously, a virtual machine was used to enable cloud computing and virtual machine using hypervisor virtualization. New technology emerges called container base virtualization and Docker is one of the most successful open source container based virtualization solution. Docker has an ability to perform without the need of additional operating system (OS) reducing the required resources related with the OS (Bernstein, 2014). Its has the ability to be launched within second which enable it to be used as security tools for data confidentiality (Tuomas, V. 2015).

8 Parameter Virtual Machines Containers (Docker) Guest OS Each virtual machine runs on virtual hardware and kernel is loaded into in its memory region All the guests share same OS and Kernel. Kernel image is loaded into the physical memory Communication Will be through Ethernet Devices Standard IPC mechanism like signals, pipes, sockets etc. Security Depends on the implementation of Hypervisor Mandatory access control can be leveraged Performance Virtual machines suffer from a small overhead as the machine instructions are translated from Guest to Host OS Containers provide near native performance as compared to the underlying Host OS Isolation Sharing libraries, files, etc. between guests and between guests hosts not possible Subdirectories can be transparently mounted and can be shared Start-up time Virtual machines take a few minutes to boot up Containers can be booted up in a few seconds as compared to virtual machines Storage Virtual machines take much more storage as the whole OS kernel and its associated programs have to be installed and run Containers take lower amount of storage as the base OS is shared TABLE 1. Comparison Between The Virtual Machines And Containers

9 Data Confidentiality Issues and Possible Solution using Docker
Data confidentiality means that the data is sensitive and need to be avoid from leaking to unauthorized individuals or systems (Xiao, Z. et al. 2013). Personal information is very confidential in nature that can lead to unlawful activities that effect the information’s owner. Avoiding the dangers that can effect on the confidentiality, integrity and availability of digital resources is the main purpose in governing information security (Luminita, D. C. 2011). In e-learning-based educational institutions, the information is always stored in databases and transmitted over the networks where risks can arise with regard to the confidentiality, integrity and availability.

10 Example of this information are student information (e. g
Example of this information are student information (e.g. course marks and study records), staff information (e.g. salaries and pension information), results, progress and intellectual property information. Data confidentiality transpire when data exposed to unauthorized party (Luminita, D. C. 2011).. Authentication, authorization, accountability and availability are the main processes of any access control mechanism.

11 Docker has the ability of isolating each instance application, therefore each application instance run on different container which avoid other authenticated user accessing other user’s information. The isolation able to avoid one application instance accessing the others (Špaček, F. 2015). Docker can reduce cost by improving the resource efficiency. Setting up docker do not require pre allocation of resource. Docker also have the capability to be instantiated in flash allowing it to use and release resource economically and efficiently. This ability will increase the security of the system.

12 Conclusion and future work
This paper discuss the issues related with data confidentiality and the docker capability as a possible solution. There is high potential that many issues which crop up from cloud implementation in e-learning can be resolved through the docker. These issues also may happen in other industries such as medical, business and social media. For example, rehabilitation in medical industry starting to automate their process using cloud solution. Our future work is to use docker as a part of the security measures for cloud hosting in our intelligent rehabilitation (IntelliRehab) system.

13 Thank you. Q & A


Download ppt "FICEER 2017 Docker as a Solution for Data Confidentiality Issues in Learning Management System."

Similar presentations


Ads by Google