Sustainable Cloud-Based Security Architecture for Data Protection in E-Learning and Healthcare Systems

Authors

  • Munera A. Jabaar Middle Technical University - Al- Rusafa Management Institute

Keywords:

Cloud Security, Sustainable Encryption, Hybrid Encryption, Federated Learning, Block-chain-based Security, E-Learning Data Protection, Healthcare Data Privacy

Abstract

 

Abstract: Cloud computing is one of the new innovations in digital transformation that have revolutionized various areas of life including education and healthcare. However, with the rising significance of cloud infrastructures, the level of security threat and privacy concern is on the rise with regard to sensitive data. Sustainable cloud encryption techniques will be discussed in this paper in the enhancement of data security in e-learning and health-related platform.

The hybrid encryption techniques, proxy re-encryption and block-chain-based systems, are analyzed with the assistance of systematic literature review. It offers a proposed security structure which is based on federated learning, with sustainable encryption to strengthen data protection. The findings have shown that sustainable encryption is a means to ensure confidentiality, integrity, as well as minimizing the cost of computing and environmental costs thereby ensuring the digital ecosystems are secure and environmental friendly.

 

References

Abbas SR, Abbas Z, Zahir A, Lee SW. Federated Learning in Smart Healthcare: A Comprehensive Review on Privacy, Security, and Predictive Analytics with IoT Integration. Healthcare. 2024;12(24):2587. doi:10.3390/healthcare12242587

Ali MS, Ahsan MM, Tasnim L, Afrin S, Biswas K, Ahmed MM, Hashan R, Islam MK, Raman S. Federated Learning in Healthcare: Model Misconducts, Security, Challenges, Applications, and Future Research Directions – A Systematic Review. arXiv preprint. 2024. Available from: https://arxiv.org/abs/2405.13832

Lin H-Y, Chen P-R. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments. Sensors. 2024;24(19):6290. doi:10.3390/s24196290

Yan L, Qin H, Yang K, Xie H, Wang XA, Liu S. Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing. Electronics. 2024;13(3):534. doi:10.3390/electronics13030534

Zhou Y, Liu S, Han S. Multi-Hop Fine-Grained Proxy Re-Encryption (mFPRE). IACR Cryptology ePrint Archive. 2024. Available from: https://eprint.iacr.org/2024/055

Guo H, Li W, Nejad M, Shen C-C. A Hybrid Blockchain-Edge Architecture for Electronic Health Records Management with Attribute-Based Cryptographic Mechanisms. arXiv preprint. 2023. Available from: https://arxiv.org/abs/2305.19797

Huang J, Yi J. The Key Security Management Scheme of Cloud Storage Based on Blockchain and Digital Twins. Journal of Cloud Computing. 2024;13:15. doi:10.1186/s13677-023-00587-4

Chen L, Wan Z, Zhou J. An Efficient Autonomous Path Proxy Re-encryption Without Pairing for Cloud-Assisted mHealth. In: Ge C, Yung M, editors. Information Security and Cryptology (Inscrypt 2023). Lecture Notes in Computer Science, vol. 14527. Singapore: Springer; 2024. p. 448-467. doi:10.1007/978-981-97-0945-8_28

Thushara GA, Bhanu SMS. A New Hybrid Encryption in Fog-Cloud Environment for Secure Medical Data-Sharing. Iran Journal of Computer Science. 2023;6:169-183. doi:10.1007/s42044-022-00129-2

Sepehri M, Trombetta A, Sepehri M. Secure Data Sharing in Cloud Using an Efficient Inner-Product Proxy Re-Encryption Scheme. Journal of Cyber Security and Mobility. 2024;13(1):1-20. doi:10.13052/2245-1439.635

Kumar R, Khan P, Kumar S. Healthcare Data Encryption Technique Using Hybrid Cellular Automata in IoT Networks. Wireless Personal Communications. 2022;126:3021-3039. doi:10.1007/s11277-022-09850-4

Boumezbeur I, Zarour K. Improving Privacy-preserving Healthcare Data Sharing in a Cloud Environment Using Hybrid Encryption. Acta Informatica Pragensia. 2022;11(3):361-379. doi:10.18267/j.aip.182

Singh R, Sharma A, Arora V. A Novel Hybrid Encryption Method to Secure Healthcare Data in IoT-enabled Healthcare Infrastructure. Computers & Electrical Engineering. 2022;101:107991. doi:10.1016/j.compeleceng.2022.107991

Shakor MY, Shafiq NMS, Khlaif ZN. Hybrid Security Model for Medical Image Protection in Cloud. Diyala Journal of Engineering Sciences. 2023;16(1):68-77. doi:10.24237/djes.2023.16107

Bekhit M, Alsadoon A. Data Security in Hybrid Cloud Computing Using AES Encryption for Health Sector Organization. In: 7th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA). Cham: Springer; 2022. p.155-167. doi:10.1007/978-3-031-29078-7_15

Srinivasan R, Panguluri LD, Mohammed SB. Cloud Compliance in Healthcare: A Technical Evaluation of Data Encryption, Access Control, and Risk Management Practices. Journal of Machine Learning for Healthcare Decision Support. 2022;2(2):21-35.

Jain K. Key Management Strategy and Distribution of Public Key for Cloud Security. International Journal of Engineering and Management Research. 2023;13(1):129-135.

GEECO Consortium. Green Data Centers for Energy Optimization and Carbon Footprint Reduction (GEECO Model). Sustainability. 2023;15(21):15249. doi:10.3390/su152115249

Malele V. Cybersecurity Cloud-Based Online Learning: A Literature Review Approach. Journal of Information Systems and Informatics. 2023;5(4):1623-1632. doi:10.51519/journalisi.v5i4.583

Alajmi Q, Chellathurai GJ. Adoption of Cloud Computing in E-Learning Systems: Security Perspective Review. Tasnim International Journal for Human, Social and Legal Sciences. 2023;2(3):356-374. doi:10.56924/tasnim.6.2023/18

Review of Privacy Enhancement Methods for Federated Learning in Healthcare Systems. International Journal of Environmental Research and Public Health. 2023;20(15):6539. doi:10.3390/ijerph20156539

Comprehensive Review on Federated Learning Based Models for Healthcare Applications. PubMed. 2023. Available from: https://pubmed.ncbi.nlm.nih.gov/38042608

Downloads

Published

2026-02-14

How to Cite

Jabaar, M. A. . (2026). Sustainable Cloud-Based Security Architecture for Data Protection in E-Learning and Healthcare Systems. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(2), 37–42. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/881

Issue

Section

Articles