Data Privacy Using Dynamic Multi-Layer Authentication Mechanism in Open Learning Environment

Authors

  • Anuratha R Mannar Thirumalai Naicker College, Govt. Arts College for Women, Sivagangai Tamil Nadu, India
  • Durga MG Mannar Thirumalai Naicker College, Govt. Arts College for Women, Sivagangai Tamil Nadu, India

DOI:

https://doi.org/10.26438/ijcse/v6si8.7780

Keywords:

Authentication, Access Control, Massive Open Online Course, Open Educational Resource, Responsive Open Learning, Environment, Self-Regulated Learning

Abstract

Cloud computing, delivers abundant services between Cloud Service Providers (CSP) and Cloud Users (CU) on a demand basis in metered service without having the underlying infrastructure with the help of Internet. This ease will increase the cloud users day by day to adopt cloud model. Technological advancements, specially Information Communication Technology (ICT) and cloud computing, transform traditional teaching and learning practices into blended learning. Due to the fabulous development of Massive Open Online Courses (MOOC) and Open Educational Resources (OER), more attention and efforts are crucial to the security procedures for massive open online courses. Authentication of the users to the cloud service is mandatory, because it eliminates the risks and attacks found in the cloud services. Password is widely used for user authentication because of its simplicity. Frequently changing password is a tedious work. Simple passwords are easily hacked, but complicated one is hard to memorize. To overcome this, we suggest Personally Identifiable Information (PII) for the purpose of Authentication. In this paper, we propose a security model using Dynamic Multi-Layer Authentication Mechanism, which is based on user’s personally identifiable information

References

[1] Pranav Vyas, Dr. Bhushan Trivedi, An Analysis of Session Key Exchange protocols, International Journal of Engineering Research and Applications, Vol. 2, Issue 4, June-July 2012, pp.658-663, ISSN: 2248-9622, available at www.ijera.com.

[2] Anuratha. R, Dr. Ganaga durga. M, “Authentication – A part of Identification in the Cloud Environment”, International Journal of Advance Research in Science and Engineering, vol. 07, Special Issue 01, January 2018, ISSN 2319-83554, pp. 25-34 [3] Anuratha. R, Dr. Ganaga durga. M, “Analysis of Data Security in Cloud Computing Using Access Control Technique”, International Conference on Global Talent Management in the Digital Era, ISBN: 978-93-86537-95-9, September, 2017.

[4] Sten Govaerts, Katrien Verbert, C. Delgado Kloos et al. (Eds.), Towards Responsive Open Learning Environments: The ROLE Interoperability Framework, EC-TEL 2011, LNCS 6964, pp. 125– 138, 2011. Springer-Verlag Berlin Heidelberg 2011.

[5] L. Das, A. Saxena, and V. P. Gulati, "A Dynamic ID-Based Remote User Authentication Scheme," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629 - 631, 2004.

[6] I-En Liao, Cheng-Chi Lee, and Min-Shiang Hwang, "Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme," In Proceeding of International Conference on Next Generation Web Services Practices, 2005 ( NWeSP 2005), pp. 43740 , 2005.

[7] Y. Yang, R. H. Deng and F. Bao, “A Practical Password- Based Two-Server Authentication and Key Exchange System,” IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 2, 2006, pp. 105-114. doi:10.1109/TDSC.2006.16

[8] J. L. Tsai, “Efficient Multi-Server Authentication Scheme Based on One-Way Hash Function without Verification Table,” Computers & Security, Vol. 27, No. 3-4, 2008, pp. 115-121. doi:1 0.1016/j.cose.2008.04.001

[9] Yi-Pin Liao and Shuenn-Shyang Wang, "A Secure Dynamic IDBased Remote User Authen- tication Scheme for Multi-Server Environment," Computer Standards & Interfaces, vol. 31, no. 1, pp. 24-29, 2009, available at www.sciencedirect.com.

[10] Han-Cheng Hsiang and Wei-Kuan Shih, "Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment," Computer Standards & Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009.

[11] Cheng-Chi Lee, Tsung-Hung Lin, and Rui-Xiang Chang, "A Secure Dynamic ID Based Re- mote User Authentication Scheme for Multi-Server Environment Using Smart Cards," Expert Systems with Applications, vol. 38, no. 11, pp. 13863-13870, 2011.

[12] N.S Chauhan and A.Saxena, “Energy Analysis of Security for Cloud Application,” in Proc. Annual IEEE India Conference, pp. 16, 2011.

Downloads

Published

2025-11-17
CITATION
DOI: 10.26438/ijcse/v6si8.7780
Published: 2025-11-17

How to Cite

[1]
R. Anuratha and M. G. Durga, “Data Privacy Using Dynamic Multi-Layer Authentication Mechanism in Open Learning Environment”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 77–80, Nov. 2025.