1. Introduction
In the past few years, breakthrough technological innovation and progression have brought forth another new approach to learn in university surroundings, named mobile learning or m-learning [
1]. Mobile learning is an emerging recent trend in which the user can access the study materials everywhere and, on any occasion, using mobile devices. In addition, by managing and providing the study materials and educational contents, mobile learning also provides sufficient visualization and adaptation on the small display of mobile phones. The modern characteristic traits in smart phones, namely the browsing feature, color display screen and video streaming, make mobile learning both practical and promising [
2]. In addition to this, mobile learning possesses the following advantages: mobility, sharing of information, independent self-education and facilitating communication among the students and teachers. The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions worldwide. In general, mobile learning includes learning with diverse mobile devices, namely web tablets, pocket PCs, cell phones, wireless cameras, palms and various other handheld devices [
3].
Mobile learning has attracted the people of Asian, European countries and the United Nations. On the other hand, the integration of both e-learning and mobile computing is referred to as mobile computing [
4]. Recent mobile terminals consist of strong computational capability containing CPUs with high frequency. Mobile learning also implements suitable service applications based on multimedia, containing various modes of operation and friendly human interfaces. In addition, it also accesses numerous resource networks using diverse network connection approaches [
5]. Currently, the computing network [
6] plays a vital role due to its rapid development. Therefore, the proficient advancements of wireless sensor networks transformed pocket PC, iPods and mobile phones into various learning devices. Additionally, Wi-Fi and Bluetooth, the general packet radio services, are considered as the fundamental system in transferring the network data to each mobile terminal [
6]. Users can gather the study materials and communicate with teachers or other professionals if the signal location through GPRS is available in the neighborhood [
7].
Therefore, the GPRS system enables learners to access the Internet everywhere and on any occasion. Due to the rapid progression of mobile learning, distance education has turned to challenge both traditional classroom teaching and formal schoolings [
8]. Even though distance education provides the bridge between experimental and formal learning, it is necessary to reconsider the physical classroom anatomy [
9]. Thus, feature-based mobile learning is utilized in various educational activities and acts as a mediating tool to gather the educational materials and to learn the relevant topics using mobile devices via wireless technologies [
10]. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users [
11].
This paper proposes a safe and protected cloud-based mobile learning system that comprises various security characteristics, namely privacy and confidentiality of information, intrusion detection, entity authentication, secure routing and data aggregation, key management and distribution, and data integrity. Here, the mobile learning system is influenced directly by progressive technological advancements and the issues based on security and privacy are entirely different from the e-learning system. This paper proposes a cloud-based mobile learning system using a hybrid optimal elliptic curve cryptography (HOECC) algorithm comprising public and private keys for data encryption. The proposed approach selects optimally the random value, and the adaptive tunicate slime-mold (ATS) algorithm is employed for generating the optimal key value. The major contribution of the paper can be summarized as follows:
Proposing hybrid optimal elliptic curve cryptography for data encryption, thereby generating the public and private keys;
Proposing an adaptive tunicate slime-mold algorithm to select optimally the random value and to generate optimal keys;
Comparing the proposed ATS approach with various other existing techniques to determine the system effectiveness.
The remainder of the paper is structured as follows:
Section 2 reviews and provides a comparative analysis of existing literature on the mobile learning system. The problem definition and the motivation of the paper are discussed in
Section 3.
Section 4 provides the empirical design for the cloud-based secure mobile learning model. In
Section 5, the performance evaluation and the comparative analysis are portrayed.
Section 6 concludes the research paper.
2. Related Literature Review
Ennouamani et al. [
12] proposed a context-aware mobile learning system adapting the learning content. A dynamic mobile adaptive learning content and format (D-MALCOF) was employed in appropriate learning for every student. Moreover, this approach was provided with encouraging feedbacks and positive perceptions. It becomes a necessary task to collect the feedback, but this approach failed in the feedback collection activity.
A context-aware mobile learning system (CAMLS) and usability assessment were proposed by Pensabe-Rodriguez et al. [
13]. The usability assessment was evaluated and the experimental results revealed that the acceptance, applicability and satisfaction were enhanced while comparing with several other context-aware mobile learning schemes. The augmented reality and collaborative works were poor, however, which are the two common disadvantages of this approach.
Romero et al. [
14] demonstrated the structural equation design for good teaching practice based on mobile learning in higher education. The main intention of this approach employed was to investigate the factors that influence the progression of good teaching. The teaching activity and the interaction among the student and teacher association were very high. However, the sample size was limited, which further affects the effectiveness of the system.
An integrative evaluation of learning process, based on the effects of mobile learning for nursery students, was established by Li et al. [
15]. The learning process was evaluated by employing the Framework for Rational Analysis of Mobile Education (FRAME) approach that investigates the relationship among diverse variables. This approach was provided with enhanced learning motivation but poor theoretical establishment.
Bi et al. [
16] introduced pedagogical practices of mobile learning in K–12 and higher education settings. The most significant objective of this research was to provide theoretical foundations for mobile learning. The satisfaction level high was very high when comparing this approach with various other existing approaches. Low effectiveness and acceptance rate were the major drawbacks of this approach.
A conceptual model for examining the impact of knowledge management factors on mobile learning and acceptance was developed by Al-Emran et al. [
17]. Here, the mobile learning acceptance was determined by using partial least squares–structural equation modeling (PLS–SEM) for developing a conceptual model. The education environment was good, but the acceptance rate and the rate of satisfaction were very poor.
Mutambara et al. [
18] developed the determinants of mobile learning acceptance for STEM education in rural areas. The major objective of this approach was to examine the acceptance rate of high school learning, which includes high psychological readiness and skilled readiness. However, the motivation for learning was very low.
Advanced technology, i.e., mobile and wearable technology, in measuring and understanding the role of mobile technology in education was demonstrated by Bernacki et al. [
19]. The major contribution of this approach was to provide a balanced consideration of learning for obtaining very high learning processes. However, this approach failed to collect the data accurately and was the disadvantage of this approach.
El-Sofany et al. [
20] investigated the effectiveness of using mobile learning techniques to improve learning outcomes in higher education. This approach aimed at evaluating the student’s perceptions and recognizing quality. The positive perception of the students, skill of every student and flexibility rate were very high. However, an unsatisfied education environment was the major drawback of this approach.
Mobile game-based learning in higher education using collaboration and a dynamic fuzzy-based model was proposed by Troussas et al. [
21]. This approach analyzed the pedagogical affordance to provide high learning outcome rate, but failed to analyze and classify various sentiments.
Similarly, Korac et al. [
22] implemented information security in mobile learning systems. The significant objective of this approach was to enhance the security awareness and behavior in the m-learning system. The personal information was highly secured by employing this approach, but the acceptance and satisfaction rate were poor.
Khairi et al. [
23] presented a secure mobile learning system by employing voice authentication. This approach utilized a human-behavior-based particle swarm optimization algorithm to obtain a secure m-learning approach. The authentication performance of this approach was very high, but low efficiency was considered as its major drawback.
A secure mobile learning system based on a cloud system is presented by Al shehri et al. [
24]. A secure mobile learning framework was developed to ensure mutual authentication and end-to-end security. The integrity and privacy of this approach was high, but implementation failed in the simulation environment.
The summary of prior work is tabulated in
Table 1.
3. Problem Identification and Motivation
Currently, diverse m-learning approaches have been concentrated on the progression of various courses. The mobile learning system is becoming more prevalent due to the presence of the Internet everywhere. Therefore, it is an excellent chance and large opportunity for various organizations, such as educational institutions, various universities and cloud service operators, to provide several assessment services and mobile learning. In various cases, the privacy and security during data sharing are considered as the most significant issue, and it needs to be solved. On the other hand, the mobile learning system is influenced directly by progressive technological advancements and the issues based on security and privacy is entirely different from the e-learning system. Let us consider an illustration. While concentrating on privacy, the concerned parties have worries and doubts regarding the usage of personal sensitive information (mobile number, IP address, individual phone ID) that are gathered indirectly without the permission of the data owner. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users. Uploading and storing specific data in the cloud is familiar and widespread, but securing the data is a complicated task. The following points provide few issues faced by the contributor.
Under cloud computing ambiance, one relies on the cloud provider to store the data in the cloud from unknown locations. Thus, the provider defends the user data from diverse conditions.
Protection of data derived to supply the counterfeit, and identifying the nonrepudiation of information or data.
User’s apprehension regarding the hacking threats, both internally and externally.
From these points, it is apparent that the requirement of preserving a privacy mechanism is more significant than safeguarding sensitive and personal data. Name, date of birth, email address, history, locations and biometric features of comprise the particular data. These drawbacks of the diverse existing work inspired us to work on securing the data in the cloud storage system [
23]. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users. Uploading and storing specific data in the cloud is familiar and widespread, but securing the data is a complicated task. Such shortcomings were overcome by our proposed mobile learning system.
4. Proposed Mobile Learning System
The architecture (
Figure 1) provides an overview of the proposed empirical cloud-based mobile learning model. The structural design for the cloud-based mobile learning model comprises an educator who uploads the educational content data into the cloud system. The uploaded data are then downloaded by the students using mobile phones. Here, the teacher can engage with the students and the students can engage among themselves for collaborative study. The step-by-step procedure involved in the proposed methodology is discussed in the subsequent section.
4.1. Data Collection
The data collection process includes collecting necessary domain knowledge about the m-learning approach from handbooks. Here, the survey was conducted among King Abdulaziz University (KAU) sophomore students from the Faculty of Computing and Information Technology (FCIT). The inputs were used for selecting programming language and other factors in developing the tool. The study investigation employed a survey comprising 50 students, and the questionnaire sent to all fifty students. In general, the initial phase involved the collection of indicators from the KA University for building the classification of platforms for selecting the technology and to determine the usability and effectiveness of the system. Here, both the pre-testing and the post-testing conducted were employed in testing the tool efficiency. The questionnaire was employed for data collection as there was no device to calculate good teaching practices in mobile learning. The scale generated referred to an analysis of mobile learning practice at King Abdulaziz University (KAU) by evaluating good teaching practice in mobile learning. The following section describes the questionnaire items:
Whether or not the students have mobile devices to learn.
Do the security and risk activities affect the teachers while utilizing mobile devices?
Is the mobile learning technology important for students?
Do the planned activities with the mobile devices permit the students to generate digital content?
Whether or not the activities executed by using mobile devices allow you to track the students learning process.
Whether or not the task or activities evolved using mobile device encourage the student to reflect on his/her own learning.
Do the activities developed encourage collaborative work?
Do the planned activities with mobile devices motivate communication among students?
Will the proposed activity allow for group discussion?
Whether or not the planned activities with mobile devices permit the students to share data?
Do security threats create dangerous impact affects from mobile learning?
The data for the study were collected from 50 students of FCIT at King Abdulaziz University. Several techniques were implemented to evaluate the stability and the efficiency, such as post-test, pre-test and usability features corresponding in a number of Saudi Arabia universities. The questionnaire was sent to 50 students; only 35 students responded. The data for this research were collected using the survey and from observational methods. The researcher intimately examined group chat activities in the face-to-face class sessions. Most of the questions used were based on the 5-point Likert scale, in which 1 represents strongly agree and 5 represents the strongly disagree. The first Likert scale consists of 15 questions regarding whether or not cloud computing has any consequences on infrastructure restrictions and the student’s knowledge of m-learning. The second scale consists of 12 questions, which compare student attitude to m-learning before and after the trial.
4.2. Secure M-Learning Design
The consequences based on the privacy problem in mobile learning systems are specifically emphasized since they are infused as a challenge of considerable significance. Privacy and security are considered as the two most subjective aspects that provide diverse meanings to various users [
25]. This implies that using similar mobile-based technological advancements provide diverse definitions to various scholars and undergraduates. Thus, the mobile technological advancements provide imprecise boundaries among infringing and protection of the privacy factors (i.e., tracking the movement of the students and monitoring the student’s characteristic behavior). The constituent of privacy and security plays a significant role in various mobile learning-based applications. Here, the members of high organizations and various institutions are concerned regarding the security and the authentication of mobile learning.
A safe and protected mobile learning system comprises various security characteristics, namely privacy and confidentiality of information, intrusion detection, entity authentication, secure routing and data aggregation, key management and distribution, and data integrity. It is necessary to consider these characteristic features to obtain complete learning materials that are highly secure when using various mobile devices. In addition, data integrity and confidentiality are the two significant security conditions satisfied by executing a simple link–layer mechanism that utilizes authentication codes by encrypting the data packets. In addition, authentication is the most significant privacy asset for ensuring the receiver that an appropriate sender sends the message or not [
24].
On the contrary, in terms of security, the attackers can hijack the sessions, also referred to as cookie spoofing. In the proposed system, the cloud data comprises information on the data owner, data user, negotiator inspector and cloud server. Here the teacher or educator signifies the data owner, and the students are represented as the user. Initially, the user commences a file for storing it in cloud service, examining the type of data file and cloud server accessibility. In addition, the user has the capability to decide if the input file is significant (critical and sensitive) or insignificant. If the data file is sensitive, then the files are split and accumulated in a diverse virtual machine. If it is an ordinary file, then the data file will be accumulated in single virtual machine. Meanwhile, if the data owner stores the file that is at risk, then it needs to be encrypted. At this point, the hybrid optimal elliptic curve cryptography (HOECC) algorithm is employed in data encryption [
23].
4.3. Setup Processes
During the processes of encryption, the system parameters are initialized by the data proprietor for generating both the public and the private keys. This paper proposes a cloud-based mobile learning system using a hybrid optimal elliptic curve cryptography (HOECC) algorithm comprising public and private keys for data encryption. The proposed approach utilizes an adaptive tunicate slime-mold (ATS) algorithm to generate optimal key value. The steps involved in set up process and their respective mathematical expressions are discussed in the next section.
4.3.1. HOECC Algorithm
The general form of the elliptic curve is expressed in Equation (1):
From the Equation (1), E and F signify the standard variables, j and k denote the elliptical curves. It is well known that the elliptic curve is varied by varying j and k. In addition to this, the HOECC comprises two keys (i.e., private keys and public keys) for both encryption and decryption. The encryption processes employed in verifying the signature and the signals are generated using decryption processes [
26].
4.3.2. Key Generation Process
The optimal elliptical curve cryptography process is described for two pre-determined sectors. It is necessary to pick the field containing numerous points for various cryptographic-based tasks. The prime sector chooses the prime number and the finite number generated on the elliptical curve. Therefore, the public key is generated by
From Equation (2), the public key and the point of curve are represented by
and
, respectively; r denotes the random number that ranges from
. The proposed approach optimally selects the random value and the (ATS) algorithm is employed for generating the optimal key value [
27].
Tunicate Swarm Algorithm
Tunicates are an invertebrate marine animal that generate light of a pale bluish-green color that belongs to the subphylum Tunicate. Tunicates are radiant, cylindrical-shaped and glow in the dark place. The tunicates are small and contain a gelatinous tunic that assists in fusing all individuals. The tunicates are the only marine animal that generates jet-like propulsion from its atrial siphon [
28]. Jet propulsion is more effective, and it has the capability to move around the tunicates perpendicularly deep in the sea. The size of tunicates may vary from few centimeters to 4m, and each tunicate differs from the other. Similarly, the tunicate swarm algorithm imitates the activities, manners and characteristic features of the tunicates. The tunicate algorithm, in other terms, is referred to as the swarm intelligence algorithm that solves diverse engineering-based problems. The following section provides the step-by-step process involved in the tunicate swarm algorithm.
The dispute among various tunicates (search agents) is avoided by employing a vector
. Therefore, the position of new search agents is evaluated using Equation (3):
From this Equation, and signify different forces, namely the gravity force and the social force among the tunicates.
From Equations (4) and (5), the random value ranges from 0 to 1 and are represented as , respectively. The flow of water in the deepsea is denoted by . The first and final subordinate speeds are represented as .
This process describes the movement of tunicates to the best neighbor following conflict among the neighboring tunicates [
29]. Hence,
From Equation (6), the distance among the food source and the tunicates is represented as . , , and signifies the food position, tunicate position and random value that ranges from 0 to1.
Here, the tunicates uphold their position towards the food source. Thus, the mathematical expression in converging the tunicate towards the food source is represented in Equation (7):
From this equation, the updated position of the tunicate with respect to the food position is denoted by .
The positions of various search agents are updated in accordance with the best search agents’ position. Therefore, the updated equation is
From Equation (8), the updated tunicate’s position is represented by .
Slime-Mold Algorithm
At an initial stage, the slime-mold algorithm was categorized under the fungus family and it was said to be known as slime mold. In general, the slime molds are eukaryotic, surviving in both hot and cold localities. There are three significant phases in slime mold: plasmodium stage, dynamic and active stage, and research stage. In addition, the slime mold can adjust the search patterns based on the amount of available food. The slime mold employs a region-limited search approach when the food source quality is large. If the quality of the food is low, then the slime mold leaves and searches for other quality food sources. The slime-mold algorithm imitates the characteristic behavior and performances of the slime mold; the mechanisms involved [
30] are discussed in the subsequent section.
The slime mold identifies as the food source by aroma floating in the air. The mathematical expression in searching for the food source is given in Equation (9):
From Equation (9),
,
and
signifies the location and randomly selected individuals of the slime mold. The weight of the slime mold in vector form is denoted as
. The parameter
increases from [−k to k] and the parameter
linearly decreases from 1 to 0;
signifies the high aroma location. The total number of current iterations is represented by t. Then, the
value is expressed as
From Equation (10), the fitness and the best fitness values are represented by
, respectively. It is known that
The expression based on the weight of the slime mold in vector form is given by Equation (13). Therefore,
From Equation (13), the random value is represented by which ranges from [0, 1]. The smell index is denoted by .
This process imitates the food searching behavior of the slime mold. If the food quality is high, then the waves produced by the bio-oscillator are very strong, which further causes the cytoplasm to flow fast within a thick vein. The numerical expression in determining the food wrapping processes with reference to the location updating is obtained in Equation (14):
From Equation (14), the upper and lower limits are represented as , respectively. The terms and signify random values that have the range [0, 1]. The value signifies the parameter setting experiments.
The slime mold relies significantly on waves of propagation generated by the biological oscillator for changing the flow of cytoplasm in the vein. Here we utilized, and to simulate the variations in the width of the slime mold.
: The value employs in simulating the frequency of oscillation at diverse food concentration for the quick approach of food when the food is obtained at high quality. Similarly, the approach of food is very low when the food quality is small.
: The value gradually reaches to zero and randomly oscillates among [−k to k] with respect to increase in iterations.
: The value eventually reaches to zero and randomly oscillates between [−1,1] with respect to an increase in iterations.
Adaptive Tunicate Slime-Mold (ATS) Approach-Based Optimal Key Generation
Figure 2 provides the schematic flow diagram for the proposed adaptive tunicate slime-mold (ATS) approach based on optimal key generation. The proposed ATS approach is selected in such a way that performances in terms of encryption time, decryption time, computation time, success rate and convergence rate are better when compared with various other optimization algorithms. In addition, the step-by-step process for the proposed ATS approach is discussed in the following section.
The initial process involves generating the initial population of the tunicates followed by selecting the initial parameters. The condition is checked and if the criteria are satisfied, then the fitness values are evaluated for all respective tunicates. Then, the swarm behavior of the tunicates and the jet-like propulsions are determined using Equation (8). Finally, the position of every search agent (food source) is updated. Here, the conditions for the tunicate containing at least one neighboring tunicate are checked and the position of various search agents evaluated using Equation (14). The processes are iteratively repeated until the last iteration is used to find the optimal keys.
Computational Complexity
The computational complexity of the proposed ATS algorithm is expressed in Equation (15):
In this equation, the size of the population or the total number of search agents is represented as , and are the objective function and dimensions, respectively
4.3.3. Encryption and Decryption Process
During the optimal generation of elliptical curve cryptography, the input data are encrypted and the output data are split into two various cipher texts, namely
and
. The multiplication and addition operation involved is determined in Equations (16) and (17):
From Equations (15) and (16),
signifies the random value that ranges from 1 to −(n−1). The encrypted message
and
is transmitted to the receiver. Then, the data are decrypted by the receiver, followed by the transmission of cipher text. Thus,
In accordance with Equation (18), the input data are encrypted on the data proprietor side.
Figure 3 provides a detailed understanding regarding the process of encryption and decryption, and how the data are secured with high authentication, data integrity and confidentiality.
The advantages of the proposed HOECC-based mobile learning system are discussed as follows:
- ➢
Low power consumption;
- ➢
Low CPU utilization;
- ➢
Low memory usage;
- ➢
Fast encryption and decryption process.
6. Conclusions
The secure m-learning method is presented to assure consistent educational activities such as examinations, lectures, quizzes and other tests. This study states the merit of cloud computing and m-learning create benefits at Abdulaziz University. This paper discusses the student observations on security features of mobile learning that are increasing the potential for open and distance education. The mobile learning system is becoming more prevalent due to the presence of the Internet everywhere. In various cases, privacy and security during data sharing are considered the most significant issue. On the other hand, the mobile learning system is influenced directly by progressive technological advancements and the issues based on security and privacy are entirely different from the e-learning system. This paper proposes a cloud-based mobile learning system using the HOCC algorithm, comprising public and private keys for data encryption. The proposed approach selects optimally the random value and the ATS algorithm is employed for generating the optimal key value. Here, the survey was conducted among King Abdulaziz University sophomore students from the Faculty of Computing and Information Technology (FCIT). The inputs were used for selecting programming language and other factors in developing the tool. The study investigation employed a survey comprising 50 students, and the questionnaire was sent for all fifty students. In general, the initial phase involved the collection of indicators from the KA University for building the classification of platforms for selecting the technology, and to determine the usability and effectiveness of the system. In addition, various evaluation parameters, namely the encryption time, decryption time, downloading time, uploading time and reputation were evaluated. The analysis revealed that the proposed approach provided better results when compared with other techniques. In future research studies it will be necessary to focus on computational cost during the encryption process, which needs to be minimized.