Infrastructure of E_courses Delivery
Transcript of Infrastructure of E_courses Delivery
-
8/14/2019 Infrastructure of E_courses Delivery
1/10
eCX: a secureinfrastructure fore-course delivery
Joe C.K. YauLucas C.K. Hui
Bruce Cheung and
S.M. Yiu
Introduction
Online education becomes one of the most
important channels for students to acquire
knowledge and learning material. Currently,
there are about three types of courses provided
through this education medium:(1) short courses without formal qualifications;
(2) diploma, degree or even higher degree
courses with formal qualifications; and
(3) courses which help students to take public
examinations or to get a formal degree such
as an external London University degree.
Although many projects and researches have
been conducted on online distance learning, the
issues of security have only been studied
recently (Cheung et al., 1999a; Cheung and
Hui, 1999; Furnell et al., 1998, 1999).In fact, there are quite a number of security
concerns in this type of education system, for
example, user authentication and access control,
non-repudiation for critical actions like course
registration, course tuition fee payment,
confidentiality of user personal information,
course material copyright protection, etc. For
more information on what security issues an
online learning system may consider, one can
refer to the security framework given by Furnell
et al. (1998); and for more information on the
problem of user authentication and access
control, one can refer to Cheung et al. (1999a)
and Cheung and Hui (1999). In particular,
Cheung et al. (1999) provides a security model
such that a legitimately registered student cannot
easily share the account with non-registered
students.
Depending on the type of courses offered by
an organization, the security concerns may
differ slightly. There is one security problem,
the copyright protection problem, which is
important to all kinds of e-courses, especiallyfor type (1) and (3) courses mentioned above.
Typical scenarios include the following:
registered students infringing the copyrights of
the course materials by passing the materials to
non-registered students. Usually, the
organization providing the course materials
depends on the registration fee to maintain the
operation of the organization. This copyright
infringement severely jeopardizes the income of
the organization.
The authors
Joe C.K. Yau is a Software Engineer, Lucas C.K. Hui is
Associate Professor and S.M. Yiu is a Teaching Consultant,
all at the Department of Computer Science and Information
Systems, The University of Hong Kong, Hong Kong.
Bruce Cheung is a Lecturer at the School of Professionaland Continuing Education, The University of Hong Kong,
Hong Kong.
Keywords
Security, Copyright, Applications software,
Learning organizations, Distance learning, Online computing
Abstract
Online education has emerged as one of the major channels
for dissemination of learning materials. As more and more
organizations offer online distance learning courses, the
security concerns of these online education systems become
more and more critical, especially when the organizations
rely on the registration fees of students to maintain the
smooth running of the courses. Provides a mechanism, the
Secure e-Course eXchange (eCX), to protect the learning
material from unauthorized dissemination, and shows how
this mechanism can be integrated in the operation model of
online learning course providers. The design of eCX is
general enough to fit two operating models, namely the
Institutional Server Model and the Corporate Server Model.
Electronic access
The Emerald Research Register for this journal is available at
http://www.emeraldinsight.com/researchregister
The current issue and full text archive of this journal is
available at
http://www.emeraldinsight.com/1066-2243.htm
116
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . pp. 116-125
# MCB UP Limited . ISSN 1066-2243
DOI 10.1108/10662240310469060
-
8/14/2019 Infrastructure of E_courses Delivery
2/10
Some argue that, for courses that lead to
formal qualifications, as long as students are
required to pay for writing the examinations,
freely distributing the course materials should
not be a matter. They argue that even without
protecting the copyrights of the materials, the
income of the organization could still besecured via examination fees. However, this
only fits type (2) courses mentioned above
which is a very narrowed model within the
online education trend. Moreover, the trend of
online education is that there will be
organizations holding examinations and
granting students the qualifications, while other
organizations may be producing the course
materials to assist students in learning the
materials and preparing them for the
examinations. In such cases, this ``charge-by-
examination'' model would not be appropriate,
and the copyrights of the course materials still
have to be protected.
The copyright protection problem for
e-Course material has been receiving little
attention. A good framework for online
education has been given in Furnell et al.
(1998), but the security issue for protecting the
copyright of the course materials has not been
addressed. Not long ago, another paper Furnell
et al. (1999) has studied the problem, but the
discussion is brief. In particular, it does not
provide an effective approach for copyright
protection and copyright detection in the
domain of online education. In this paper, we
give a design, the Secure e-Course eXchange
(eCX), on how to make the process of copying
``extremely difficult'' for users so as to protect
the copyright of the materials disseminated
through an e-Course. More importantly, we
also demonstrate how this design can be
incorporated in the operation model of online
learning course providers. The design can fit
into two operating models, namely theInstitutional Server Model and the Corporate
Server Model.
This study of copyright protection for e-
Course material is conducted by the SPACE
Online Universal Learning (SOUL) Project
Group of the School of Professional and
Continuing Education of the University of
Hong Kong (HKU SPACE). HKU SPACE is
one of the leading adult education providers in
Hong Kong. It provides life-long learning for
the public. The number of students registered
with HKU SPACE programmes is more than
70,000 and the figure is expected to go up at a
tremendous rate. In order to provide effective
support for online distance learning, the SOUL
Project Group was established in 1998. The
aim of the project is to provide online supportfor educational purposes; to develop HKU
SPACE online support courses in both Hong
Kong and Mainland China; and to carry out
researches related to online learning. The
SOUL platform is the major product of the
Project Group. As of October 2002, more than
21,000 students and teachers are using the
platform. For more information about the
SOUL system, please refer to (SOUL, 2002).
The rest of the paper is organized as follows:
the ``Background'' section briefly describes the
copyright protection problem. The core
technologies used in eCX will be given in ``The
secure e-Course eXchange (eCX)'' section. The
``Operations of eCX'' section will discuss the
operations of eCX. In the ``Trusting hierarchy
and operating models of e-institutes'' section,
we will discuss how eCX could be applied to
two different online education operating
models. Finally, we will provide some
concluding remarks in the last section.
Background
Although digital copyright protection in the
domain of the online learning system is a rather
new subject, there have been studies on this
problem in other domains. (For examples,
please refer to Brin et al., 1995; Dittmann and
Nack, 2000; Memon and Wong, 1998.) The
security concerning copyright is basically
divided into two major topics: copyright
detection and copyright protection. Interested
readers can refer to (Wayner, 1997) for moreinformation.
Copyright detection makes it easier to
discover the activities of unauthorized copying
or dissemination of the copyrighted materials.
Copyright detection techniques can be used
identify the owner of the copyrighted material,
and, hence, to track down copyright violators
who illegally disseminate the material. One
major technique used for copyright detection
on multimedia data is watermarking (Johnson
117
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125
-
8/14/2019 Infrastructure of E_courses Delivery
3/10
et al., 2001; Katzenbeisser et al., 2000). While
watermarking is quite useful in imaging data,
the applicability of the technique in text-based
materials is not straightforward. Also, for
material that is expected to have a wide
distribution (i.e. there are many legal users to
the material), keeping tracking of all legal copiesof the material becomes infeasible. In the
domain of online distance learning, most course
materials are text-based, and the distribution is
expected to be wide. Hence, protecting the
copyright by means of copyright detection does
not seem to be an effective approach.
On the other hand, copyright protection tries
to make unauthorized copying of materials
difficult or ``impossible''. Existing techniques
(Furnell et al., 1999; Wayner, 1997) include the
following: users cannot obtain a permanent
copy of the materials and must access the
materials using a ``secure'' and proprietary
browser. That is, users have to stay online while
using the materials. This approach creates some
inconvenience to the users. Another approach is
to couple the access rights to the material
(possibly a piece of data or software) with a
hardware configuration of the entitled
computer. The material itself may be encrypted
where the encryption key would be dependent
on the configuration of the legitimate computer.
In this case, even if the materials have been
illegally passed on to another user or computer,
the illegal copy will not function properly.
These approaches of copyright protection have
been used in some e-book systems and software
such as the product activation technique used in
Microsoft Windows XP (Microsoft, 2002).
For our study of the copyright protection
problem, we have extra design requirements,
which make our problem no easier, if not more
difficult, to solve. First, after some research on
the existing network facilities, we discovered
that it is expensive for students to remainonline. This means that, if the course material
must be viewed online, it will increase the
financial burden of the students and will make
e-courses not as attractive. Second, requiring
students to stay online means that students will
not be able to study when making network
connection is not possible. For example, using a
notebook computer to study while the student
is away from home for a business trip would not
be possible. Third, the bandwidth of the
network connection of students, who are
ordinary home users, is yet to meet the
demanding requirements for delivering material
of media types other than text or simple
graphical images, for example, video clips or
audio clips. Therefore, we propose a solution
whereby the students are allowed to download
the course material on to their own computer,
and be able to view the material offline. This
extra requirement makes the copyright
protection problem much more difficult and
challenging.
In this paper, we will propose a copyright
protection solution for the e-education domain,
the ecure e-Course eXchange (eCX). We will
show how eCX integrates copyright protection
techniques applied in other domains, as well as
encryption techniques to make copyrightprotection for e-Course material possible. We
will also show how eCX allows students to
retain a complete copy of the course material
while making it difficult to create or disseminate
copies of the material to other unauthorized
users. As a remark, due to the nature of the
digital data, none of the existing approaches can
provide perfect security regarding these
copyright problems, and it is very unlikely that
such methods exist. However, as long as it is
difficult for students to pass the materials to
other unauthorized users, most of the students
will register for the courses and obtain the
material in a proper manner.
The secure e-Course eXchange (eCX)
The secure e-Course eXchange (eCX) is a set
of software modules designed to work together
to protect the copyright of e-Course material.
These modules are shattered among various
components in PowerEdBuilder thearchitecture for the SOUL platform. Before
giving a detailed discussion on eCX, we will
give a brief description on PowerEdBuilder.
Figure 1 depicts a system overview of
PowerEdBuilder.
As PowerEdBuilder is designed to be used by
three different parties, namely instructors,
institutes and students, there are three software
components specifically designed for them.
They are the Content Engineering System, the
118
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125
-
8/14/2019 Infrastructure of E_courses Delivery
4/10
e-Institute, and the e-Learning Platform
respectively.
The Content Engineering System (CES) is
designed for instructors to create e-Course
materials and to launch e-Courses. There is an
eCX sub-module, called the Course Launcher,
residing in CES which is used for launching
e-Courses. The e-Institute is the administration
center of the platform. It is used for handling
student registration, course registration, course
payment, as well as course materials hosting
and downloading. The e-Learning Platform is
the client software installed on the students'
computers. It consists of two software
components: the Personal Classroom and the
Course Downloader. The Personal Classroom
is the software which students use for viewing
the course material. At the core of the Personal
Classroom is the SmartTutor, which is an
intelligent tutoring system built with artificial
intelligent technology, used for assisting
students in their learning process and to provide
guidance to students like a human tutor. The
Course Downloader is used for assisting
students in downloading e-Courses. It uses a
proprietary protocol to communicate with the
e-Institute for registering and downloadinge-Courses. Besides these three major
components, PowerEdBuilder also has a
Communication and Searching Infrastructure
(CSI) providing efficient and secure
communication channels among instructors,
institutes, and students. Lastly, the Secure
e-Course eXchange (eCX) provides
infrastructure for protecting the copyrighted
materials. In this paper, we will only focus on
the eCX related modules. For details about the
other components of PowerEdBuilder,
please refer to (Yau et al., 2002a; Cheung et al.,
2002a, b). Please also refer to our conference
papers (Yau et al., 2002b, c) for discussions onvarious development stages of eCX.
At the core of eCX, there are two important
technologies designed specifically for this
copyright protection system. They are the
Offline-Online Course and the Computer
License.
The offline-online course
As discussed above in the ``Background''
section, we believe that allowing students to
download e-Course material and view them
offline is beneficial to the students. The Offline-Online Course is a proprietary technology
designed specifically to make this possible.
Ordinary e-Course implementation requires
students to view the course material online, and
the material is stored in the server hosting the
course. On the contrary, the Offline-Online
Course permits students to download the
course material to their own computers and
view the material offline, while making it
difficult to perform unauthorized copying.
Basically, an instructor will compose
e-Course materials using the Content
Engineering System. When the preparation is
done, the instructor can make use of the Course
Launcher, one of the eCX modules situated at
the CES, to launch the newly created e-Course
to an affiliated e-Institute server (please see the
``Course Launching'' section for more details).
The launching process will create two objects
based on the e-Course material. They are the
Course Package and the Course Voucher. The
Figure 1 System overview of PowerEdBuilder
119
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125
-
8/14/2019 Infrastructure of E_courses Delivery
5/10
Course Package contains the online material,
and is encrypted by some symmetrical
encryption algorithm. The Course Voucher
contains different information about the course.
Most importantly, it contains the encryption
key for decrypting the Course Package. This
implies that, for viewing the course material,one must possess both the Course Package and
the Course Voucher for the course. Once the
e-Course is successfully launched, the Course
Package will be distributed over the network
and could be downloaded by students.
To take an available e-Course, students have
to register for it (please see the ``Course
Registration'' section for details). Students can
download the Course Package, and they must
also obtain the Course Voucher from the
e-Institute server in order to view the course
material. Please note that students are charged
for obtaining the Course Voucher, but not
charged for downloading the Course Package.
The whole process of obtaining the Course
Package and the Course Voucher, as well as the
payment process are all handled by the Course
Downloader software of the e-Learning
Platform.
The design of eCX applies PKI technology
Public Key Infrastructure (Stallings, 1999) to
tighten its security. As will be discussed below,
in the next section, all students possess a PKI
key-pair. When the Course Voucher is
delivered from the e-Institute server to the
student, the Course Voucher will be encrypted
using the student's public key, which can only
be decrypted using the student's private key.
When this encrypted Course Voucher is
received by the student, it will be stored
securely on the student's computer in this
encrypted form, which can only be accessed by
the Personal Classroom of the e-Learning
Platform. When the student possesses both the
Course Package and the Course Voucher, he/she can make use of the Personal Classroom
for viewing the e-Course material offline. The
next subsection will show why the offline
material obtained cannot be easily transferred
to others.
Computer License
The Computer License is a special object that
resides in the student's computer. It is created
when the student installs the e-Learning
Platform software on to his/her computer.
During the installation, a PKI key-pair is
generated. A hardware profile recording the
hardware configuration of the student's
computer is also generated. The public key of
the key-pair and this hardware profile are both
stored inside the Computer License. Besides,some personal information about the student is
also stored in this Computer License. This
makes Computer License unique to each
computer. This Computer License is then sent
to the e-Institute server, which the student has
affiliation with. The e-Institute server will
verify this Computer License, assign to it an
expiry date, and sign it digitally. The server
will send the signed Computer License back to
the student's computer. Note that in order to
keep information confidential, the
communication between the server and the
student's computer is done over some secure
communication channel (e.g. the Secure
Socket Layer SSL).
When a student invokes the Personal
Classroom software of the e-Learning Platform
for viewing the course material, the Computer
License will first be examined and check if
this invocation is valid. The invocation is valid
only if:. the Computer License is properly signed by
an e-Institute server;. the Computer License has not expired; and. the software is invoked on the computer on
which it was originally installed.
While the first two conditions are trivial, the
third condition requires some elaboration.
During the invocation, a hardware profile will
be generated to reflect the current hardware
configuration of the computer. This hardware
profile is compared with the hardware profile
stored in the Computer License. The third
condition will only be satisfied if the twohardware profiles match.
When a student has registered for an
e-Course, both the Course Package and the
Course Voucher will be under the student's
possession. As mentioned above, the Course
Package is protected by some symmetric
encryption. Since the encryption key to the
Course Package is contained in the Course
Voucher, the Course Voucher must also be
protected on the student's computer. When
120
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125
-
8/14/2019 Infrastructure of E_courses Delivery
6/10
the Course Voucher is received from the
e-Institute, it is encrypted with the computer's
public key using some asymmetric
cryptographic algorithm, such as RSA
(Stallings, 1999). This public key is in fact the
one stored in the Computer License. After this
encrypted Course Voucher is received from thee-Institute, it will be stored in the student's
computer in this encrypted form. Since it is
encrypted with the computer's public key, it can
only be decrypted by using the computer's
private key. The private key to this key-pair is
stored in some special location on the
computer's hard disk. The only time that a
Course Voucher is not encrypted is when the
student is viewing the course material. Please
refer to the ``Course Viewing'' section for
more details.
The Computer License is vital to the design
of eCX. By comparing the computer's hardware
profile with the one stored on the Computer
License, we can be sure that the Personal
Classroom is invoked on the computer where
the Computer License was originally issued to,
and the material can only be viewed on this
same computer. It prohibits unauthorized users
from using illegal copies of the course material.
Some of the other copyright protection systems
are breakable if the software and the protected
material are all copied on to another computer,
and most will fail if the hard disk is completely
duplicated. However, since eCX employs
Computer License, it would not be vulnerable
to these attacks.
Under some unexpected, yet possible
situations, hard disks of a student's computer may
fail which makes the retrieval of the student's
Computer License not possible. In that case, the
student would have to contact the institute and
request the re-issuing of a new Computer License.
Note that this re-issuing of the Computer License
is totally governed by the institute. Administrativepolicy can be applied to limit such re-issuing to
stop students from cheating. Note, also, that
when a Computer License is re-issued to a
student, the old Computer License will be
revoked at the same time.
In addition, the Computer License is
designed to have an expiry date, and the typical
lifetime of a Computer License is six months.
Before a Computer License expires, the
e-Learning Platform software will contact the
e-Institute server for renewal. By keeping track
of students' Computer Licenses, the institute
will make sure that there is only one valid
Computer License for each student. In a case
where a student cheats and request for re-
issuing Computer License, or the student's
private key is compromised, the old ComputerLicense would have been revoked and renewal
will not be possible.
Despite all its advantages, the Computer
License approach does have its own
disadvantage. If the hardware configuration of
the system is changed substantially, the
Computer License may be made invalid and the
student needs to contact the institute for
appropriate action. In our current
implementation, we have put in some tolerance
in this hardware configuration verification. Our
experience has been satisfactory and users'
feedback is positive.
Operations of eCX
In this section, we will describe the details of the
key operations, such as course launching,
course registration, and course viewing, of eCX.
Course Launching
As mentioned above, when an e-Course is
launched using the Course Launcher, two
objects, the Course Package and the Course
Voucher, will be created from the e-Course
material. The Course Launcher will send these
two objects through some secure
communication channel (e.g. SSL) to the
Voucher Administrator, which is a module
integrated into the e-Institute (see Figure 2).
Under the Voucher Administrator, the objects
are stored in a database and made available for
students to download.
Course registration
To register for an e-Course, the student has to
invoke the Course Downloader software of the
e-Learning Platform (see Figure 2). The
Course Downloader will establish a secure
communication connection with the Voucher
Administrator (e.g. SSL) to obtain the Course
Voucher. Students are not charged for
downloading the Course Package, but are
charged electronically and automatically for
121
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125
-
8/14/2019 Infrastructure of E_courses Delivery
7/10
obtaining the Course Voucher. The Voucher
Administrator will validate the student's
Computer License sent by the Course
Downloader and encrypt the voucher with the
student computer's public key. The encrypted
Course Voucher will be sent to student's
Course Downloader, then stored in the
Voucher Store of the student's machine in its
encrypted form.
Course viewing
After registering for an e-Course, the student
can use the Personal Classroom software of the
e-Learning Platform to view the course
material. Just as described in the ``ComputerLicense'' section, the Personal Classroom will
only proceed if the invocation validation is
successful. Once it is successfully invoked, the
Personal Classroom will obtain the Course
Voucher from the Voucher Store for decrypting
the Course Package. Note that, both the
Personal Classroom and the Voucher Store
processes are executed on the student's
computer. To guarantee the security of the
system, and to ensure the e-Course material is
well protected, these two processes will go
through a special authentication process to
mutually authenticate each other.
When this authentication process is done, the
Voucher Store will use the computer's private
key to decrypt the Course Voucher which was
previously encrypted by the e-Institute server
using the computer's public key (please see the
``Course Registration'' section for details).
Afterwards, the Voucher Store will release the
decrypted Course Voucher to the Personal
Classroom where it will be used for decrypting
the Course Package. Note that for security
reasons and performance reasons, the Personal
Classroom will decrypt the course materialfrom the Course Package in a material-on-
demand fashion.
Trusting hierarchy and operating modelsof e-institutes
The trusting hierarchy
PowerEdBuilder is designed so that many
e-Institute servers may exist on the network. A
Figure 2 A detail diagram of PowerEdBuilder (CSI omitted for simplicity)
122
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125
-
8/14/2019 Infrastructure of E_courses Delivery
8/10
possible real life example wouud be for
different companies to host their own servers
for in-house training programmes. These
servers, together with the student computers,
form a trusting hierarchy (see Figure 3).
Student computers belong to the lowest level
of the hierarchy, which has the least privilege.They could be authenticated by checking their
Computer Licenses. The only authority they
have is to digitally sign payment confirmations
for registering e-Courses. The
e-Institute servers belong to the middle level of
the hierarchy. These servers are the Certificate
Authorities (CA) for issuing Computer
Licenses to student computers. Each of these
servers possesses a Server Certificate, which is
used for proving its own identity to others. The
eCX Root Certificate Authority is in the
highest level of the hierarchy. It possesses the
Root Key to the whole PowerEdBuilder
trusting hierarchy, and is the root of the
trusting hierarchy. It signs the Server
Certificate of all of the servers in the
middle level.
The two server models
The eCX is designed to suit the needs of two
different operating models. They are the
Institutional Server Model and the Corporate
Server Model.
The Institutional Server Model is a server
model that is tailored to be used by educationalorganizations. All Institutional Servers are
equipped with a Server Certificate signed by the
Root Certificate Authority. They have the
authority of signing and issuing Computer
License for students registered under them.
There can be many servers operating under this
model, and each server is authorized to issue
Computer Licenses. Besides having computer
licenses issued by themselves, these institutional
servers can be configured to honor Computer
Licenses issued by other Institutional Servers.
However, they will never honor Computer
Licenses issued by any Corporate Servers.
An Institutional Server has no limitation as
to the number of ``copies'' of an e-Course that
it can issue to students. The revenue
generated from the course will be split among
Figure 3 Trusting hierarchy of e-institute servers
123
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125
-
8/14/2019 Infrastructure of E_courses Delivery
9/10
different parties according to the payment
agreement.
The Corporate Server Model is a server
model that is tailored to be used by business
organizations for corporate training. All
Corporate Servers are equipped with a Server
Certificate signed by the Root CertificateAuthority. They have the authority of signing
and issuing Computer Licenses for students
registered under them (i.e. their own staff).
Servers operating under the Corporate
Server Model function are very much like
those under the Institutional Server Model
except for three ways. The first difference is
that a Corporate Server only honors
Computer Licenses issued by itself. It will not
honor any Computer Licenses from any other
servers, regardless if the license is issued by
another Institutional Server or another
Corporate Server. The second difference is
that since a Corporate Server is operated
within the same corporation, it can have a
different mechanism for the payment system.
The course registration may be free for all of
its staff members, or charging according to
cost centers, etc. The third difference is that a
Corporate Server pays the instructor (i.e. the
e-Course provider) at a bulk rate. The
corporate pays the instructor a certain
amount of money for a fixed number of copies
of the e-Course, and the server will be limited
to issue that many copies of the
e-Course. In other words, the server can only
send a limited number of copies of a Course
Voucher to its staff members.
Conclusion
In this paper, we consider the problem of
copyright protection of online learning material
in the domain of e-Courses. We propose amechanism, called the Secure e-Course
eXchange (eCX), which allows students to
store a local copy of the material while making
the sharing of the material, with non-registered
students, difficult. The design of eCX is flexible
to fit two operating models, namely the
Institutional Server Model and the Corporate
Server Model. This design has been
implemented in an actual online learning
system, the SOUL platform, for the School of
Professional and Continuing Education of the
University of Hong Kong.
As one future direction of research,
evaluation on the eCX will be performed
shortly, and the results will be used in the
refinement of eCX and other PowerEdBuilder
components. In fact, there are many other
security issues regarding online learning
systems, such as online submission of
assignments (Luck and Joy, 1999), which are
not addressed in this paper. Therefore, other
future research directions would be to tackle
those security problems.
References
Brin, S., Davis, J. and Garcia-Molina, H. (1995), ``Copy
detection mechanisms for digital documents'',
SIGMOD 95, pp. 398-409.Cheung, B. and Hui, L.C.K. (1999), ``Student authentication for
a Web-based distance learning system'', Proceedings of
the Fifth International Conference on Information
Systems Analysis and Synthesis, pp. 441-6.Cheung, B., Hui, L.C.K., Yim, T. and Yung, V.W.L. (1999),
``Security design in an online-education project'',
in e-Education: Challenges and Opportunities.
Proceedings of the Fifth Hong Kong Web Symposium,
pp. 1-14.Cheung, B., Hui, L., Zhang, J. and Yiu, S.M. (2002a),
``SmartTutor: an intelligent tutoring system in Web-
based adult education'', Journal of Systems andSoftware.
Cheung, B., Hui, L.C.K., Yiu, S.M., Lee, J.K.W., Kwok, L.K.
and Leung, K. (2002b), ``Content engineering agent:
a TBL-based e-course development tool with TQM'',
International Journal of Distance Education
Technologies.Dittmann, J. and Nack, F. (2000), ``Copyright copywrong'',
IEEE Multimedia, Vol. 7 No. 4, pp. 14-17.Furnell, S. et al. (1998), ``A security framework for online
distance learning and training'', Internet Research:
Electronic Networking Applications and Policy, Vol. 8
No. 3, pp. 236-42.Furnell, S. et al. (1999), ``Security considerations in online
distance learning'', Proceedings of Euromedia 99,
pp. 131-5.Johnson, N. et al. (2001), Information Hiding :
Steganography and Watermarking Attacks and
Countermeasures (Advances in Information Security,
Volume 1), Kluwer Academic Publishers, Boston, MA.Katzenbeisser, S. et al. (2000), Information Hiding
Techniques for Steganography and Digital
Watermarking, Artech House, Boston, MA.Luck, M. and Joy, M. (1999), ``A secure on-line submission
system'', Software Practice and Experience, Vol. 29
No. 8, pp. 721-40.
124
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125
-
8/14/2019 Infrastructure of E_courses Delivery
10/10
Memon, N. and Wong, P.W. (1998), ``Protecting digitalmedia content'', Communications of the ACM, Vol. 41No. 7, pp. 35-43.
Microsoft (2002), Web site of Microsoft Corporation (2002),available at: www.microsoft.com.
SOUL (2002), Web site of SOUL project (2002), available at:http://soul.hkuspace.org.
Stallings, W. (1999), Cryptography and Network Security:Principles and Practice, 2nd ed., Prentice-Hall,Engelwood Cliffs, NJ.
Wayner, P. (1997), Digital Copyright Protection,AP Professional, Boston, MA.
Yau, J.C.K., Hui, L.C.K., Cheung, B.S.N., Yiu, S.M. andLee, J.K.W. (2002a), ``PowerEdBuilder a universalsecure e-learning infrastructure'', in ConferenceProceedings of SSGRR 2002 (Winter) InternationalConference on Advances in Infrastructure fore-Business, e-Education, e-Science, and e-Medicine onthe Internet (SSRGG 2002w), L'Aquila, Italy, 21-27January 2002.
Yau, J.C.K., Hui, L.C.K., Cheung, B.S.N., Yiu, S.M. (2002b),
``An online course material copyright protection
scheme'', in Conference Proceedings of International
Network Conference 2002 (INC2002), July.Yau, J.C.K., Hui, L.C.K., Cheung, B.S.N., Yiu, S.M., Cheung,
V.L.S. (2002c), ``A cryptographic schemes in secure
e-Course eXchange (eCX) for e-Course workflow'',
in Conference Proceedings of SSGRR 2002 (Summer)
International Conference on Advances in Infrastructure
for e-Business, e-Education, e-Science, and e-Medicine
on the Internet (SSRGG 2002s), L'Aquila, Italy, 29 July-
4 August.
Further reading
Harasim, L. (1999), ``A framework for online learning: the
virtual-U'', IEEE Computer, pp. 44-9.
125
eCX: a secure infrastructure for e-course delivery
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu
Internet Research: Electronic Networking Applications and Policy
Volume 13 . Number 2 . 2003 . 116-125