Research breakthrough possible @S-Logix pro@slogix.in

Office Address

Social List

Implementation of a Blockchain System Using Improved Elliptic Curve Cryptography Algorithm for the Performance Assessment of the Students in the E-Learning Platform - 2021

Implementation Of A Blockchain System Using Improved Elliptic Curve Cryptography Algorithm For The Performance Assessment Of The Students In The E-Learning Platform

Research Area:  Blockchain Technology

Abstract:

Blockchain technology allows for the decentralized creation of a propagated record of digital events, in which third parties do not control information and associated transactions. This methodology was initially developed for value transmission. Still, it now has a broad array of utilization in various industries, including health, banking, the internet of things, and several others. With its numerous added benefits, a blockchain-based learning management system is a commonly utilized methodology at academic institutes, and more specifically during and after the COVID-19 period. It also presents several potentials for decentralized, interoperable record management in the academic system in education. Integrity, authenticity, and peer-executed smart contracts (SC) are some of the qualities of a blockchain that could introduce a new degree of safety, trustworthiness, and openness to e-learning. This research proposes a unique encryption technique for implementing a blockchain system in an e-learning (EL) environment to promote transparency in assessment procedures. Our methodology may automate evaluations and provide credentials. We built it to be analytical and content-neutral in order to demonstrate the advantages of a blockchain back-end to end-users, including student and faculty members particularly during this COVID-19 era. This article explains the employment of blockchain and SC in e-learning. To improve the trust in the assessment, we propose a novel improved elliptic curve cryptography algorithm (IECCA) for data encryption and decryption. The performance of the suggested method is examined by comparing it with various existing algorithms of encryption. The evaluation of the behaviour of the presented method demonstrates that the technique shall enhance trust in online educational systems, assessment processes, educational history, and credentials.

Keywords:  

Author(s) Name:  Mohammad Y. Alshahrani

Journal name:  Applied Sciences

Conferrence name:  

Publisher name:  MDPI

DOI:  10.3390/app12010074

Volume Information:  Volume 12 Issue 1