Secure electronic exam

Download
2016
Ölçüoğlu, Lütfü Tarkan
With the recent developments in information technology, computers and mobile devices have an important role in daily life. The field of education are also affected by these developments, as a result electronic learning (e-learning) subject becomes popular. By the developments in e-learning area, students are now able to reach their documents using computers instead of books. This situation provides teachers to perform exams in digital environments. Information security concepts in an exam should be satisfied in order to get reliable evaluation in education. Some of the candidates can use illegal ways to reach exam questions before exam or change their scores during or after exam. To prevent these, cryptography plays an essential role in electronic exam. Therefore, a secure electronic exam is one of the most vital and difficult part in e-learning security. In this thesis,we first give a model satisfying authenticity, anonymity, secrecy and long term confidentiality on sensitive data. The model is using ID-Based cryptosystems for authentication, sanitizable signature schemes for data editing and verifiable secret sharing schemes for long term confidentiality issues. A novel secure electronic exam approach is proposed by combining sanitizable signature and ID-Based cryptography. Then, security analysis of the proposed model is discussed.

Suggestions

Database security in private database clouds
Çınar, Onur; Yazıcı, Adnan; Baykal, Nazife; Department of Information Systems (2015)
Cloud computing and systems are very popular in today’s Information Technology and Systems and have grown extremely. Cloud computing helps organizations solve increasing IT costs such as their licenses,power consumption,physical protection,by providing better standardization,higher benefit,greater performance,and quick responses of information services. This thesis presents the study of ensuring database security in cloud computing, protecting data especially from internal attacks, and managing high volumes ...
Increasing trustworthiness of security critical applications using trusted computing
Uzunay, Yusuf; Baykal, Nazife; Bıçakcı, Kemal; Department of Information Systems (2014)
In this thesis work, we aim to increase the trustworthiness of security critical applications by utilizing trusted computing technologies. We focus on two case applications; authentication proxy systems and e-voting systems. Our first case application is authentication proxy systems which store users’ sensitive credentials and submit them to the servers of the service providers on their behalf. To increase the trustworthiness of authentication proxy systems, we propose Trust-in-the-Middle a trusted platform...
Development of a multi-dimensional model to evaluate higher education instructors’ adoption towards learning management system
Fındık, Duygu; Özkan Yıldırım, Sevgi; Department of Information Systems (2010)
Through the rapid expansion of information technologies, Learning Management Systems have become one of the most important innovations for delivery of education. Successful implementation and management of these systems are primarily based on the instructors' adoption. However, too few researches have been conducted to evaluate instructors’ adoption towards e-learning system as taking higher education as base. This study aims to understand behavioral intentions of higher education instructors towards Learni...
Design, development and implementation of an information security and cyberethics course for pre-service teachers: a design-based research
Akman Kadıoğlu, Evrim; Aşkun, Cengiz Savaş; Department of Computer Education and Instructional Technology (2019)
With the introduction of the Information and Communication Technologies (ICT) into our lives, production and distribution of information have increased exponentially. The ICT systems and the data, which these systems use, create, or both is an essential resource of schools. For this reason, the secure and ethical use of information is a primary concern for schools. However, the curriculum in teacher training institutions does not include a course that aims to raise pre-service teachers’ awareness of informa...
Moving object identification and event recognition in video surveillance systems
Örten, Burkay Birant; Alatan, Abdullah Aydın; Department of Electrical and Electronics Engineering (2005)
This thesis is devoted to the problems of defining and developing the basic building blocks of an automated surveillance system. As its initial step, a background-modeling algorithm is described for segmenting moving objects from the background, which is capable of adapting to dynamic scene conditions, as well as determining shadows of the moving objects. After obtaining binary silhouettes for targets, object association between consecutive frames is achieved by a hypothesis-based tracking method. Both of t...
Citation Formats
L. T. Ölçüoğlu, “Secure electronic exam,” Ph.D. - Doctoral Program, Middle East Technical University, 2016.