Information Technology Reference
In-Depth Information
4 Conclusions and Future Work
In the current work, a registration protocol that allows the incorporation of a
PKI infrastructure into an interactive environment like Moodle has been de-
signed, making possible the introduction of all the functionalities that public
key cryptography provides. This incorporation means a big step towards a more
robust, privacy enhancing and secure system, a matter that does not usually get
the deserved attention in this kind of systems, probably due to the fact that
they are oriented to make third-party contributions easier and system configu-
ration faster. Also, we have made a preliminary analysis showing that the added
functionality does not worsen usability and the introduced overload is bearable.
We have developed Moodle modules to sign files and quizzes by students,
which can be afterwards verified by the teachers in the corresponding course.
This will allow to further expand system functionalities. For example, it has
been studied the benefits that an adequate anonymity model can provide in order
to improve the students experience (see [2,8]). E.g., an exam being submitted
anonymously will ensure the maximum level of neutrality during correction,
or an option for making anonymous posts in a forum could make introverted
students to lose fear and have a more active participation in a course. Or even
an anonymous model with direct non-repudiation (similar to the one in [17]) can
be used to avoid “hooligans” to take advantage of anonymity. Also, public key
watermarking methods can be used to protect digital contents uploaded to the
system ([23]).
Currently, we are also working on the verification of the proposed protocol,
using tools for secure protocols verification and preparing a test involving real
users to measure their acceptance to the system.
References
1. Adida, B., Chau, D., Hohenberger, S., Rivest, R.L.: Lightweight email signatures
(2006)
2. Aïmeur, E., Hage, H., Onana, F.S.M.: Anonymous credentials for privacy-
preserving e-learning. In: Proceedings of the 2008 International MCETECH Con-
ference on e-Technologies, pp. 70-80. IEEE Computer Society, Washington, DC,
USA (2008), http://portal.acm.org/citation.cfm?id=1397754.1397777
3. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryp-
tosystems. Int. J. Bifurc. Chaos 16(8), 2129-2151 (2006)
4. Amigó, J.M.: Chaos-based cryptography. In: Kocarev, L., Galias, Z., Lian, S. (eds.)
Chaos-based cryptography, pp. 291-314. Springer, Heidelberg (2009)
5. Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed
Systems, 2nd edn. Wiley Publishing, Chichester (2008)
6. Arroyo, D., Alvarez, G., Amigó, J.M., Li, S.: Cryptanalysis of a family of self-
synchronizing chaotic stream ciphers. Communications in Nonlinear Science and
Numerical Simulation 16(2), 805-813 (2011), http://arxiv.org/abs/0903.2928
7. Arroyo,D.,Rhouma,R.,Alvarez,G.,Li,S.,Fernandez,V.:Onthesecurityofa
new image encryption scheme based on chaotic map lattices. Chaos: An Interdis-
ciplinary Journal of Nonlinear Science 18, 033112, 7 pages (2008)
 
Search WWH ::




Custom Search