Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : Journal of Information Systems and Informatics

Cybersecurity Cloud-Based Online Learning: A Literature Review Approach Malele, Vusumuzi
Journal of Information System and Informatics Vol 5 No 4 (2023): Journal of Information Systems and Informatics
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v5i4.583

Abstract

Cloud-based online learning is the electronic learning activity that supports teaching and learning (T&L) that could be done from anywhere and in the world. Some of its benefits are scalability and affordability that could in a decision-making support on the mechanisms of material selection. Cloud computing has been adopted by most universities around the world. In this regard, lecturers and students will use it to facilitate T&L; however, due to concerns of information technology or systems security, cloud-based online learning users are also not immune. In this regard, the users could be affected by different cybersecurity attacks. In this paper, a systematic literature review method was used to sift the different models and solutions used to address the cybersecurity concerns surrounding cloud-based online learning. A brief Likert-scale questionnaire was used to obtained data that could corroborate the systematic literature findings. In this regard, a group of 20 online learning designers were sampled as participants. It was found that the confidentiality, integrity, and availability issues are a concern. This led to issues of security awareness, authentication and blended attacks being issues. In this regard, a cloud-based online learning model is not immune from security issues. In this paper, a conceptual framework as the line-of-defense is proposed as a solution towards having a cybersecure cloud based online learning.
Data Analytics Techniques for Addressing Cloud Computing Resources Allocation Challenges: A Bibliometric Analysis Approach Sekwatlakwatla, Sello Prince; Malele, Vusumuzi
Journal of Information System and Informatics Vol 6 No 1 (2024): March
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v6i1.640

Abstract

The increase in the use of digital technology led to an increase in online activities. In this regard, many organizations adopted cloud computing systems to manage this online traffic. It is plan of every cloud computing resource provider to manage their system effectively and efficiently. This paper uses bibliometric analysis technique to look at the prevalence of utilization of data analytics techniques in addressing cloud computing resource allocation challenges. In this regard, the following research databases the Association for Computing Machinery, the Institute of Electrical and Electronics Engineering, Web of Science and Scopus databases, were consulted. The research articles published before the beginning of 2017 to 2023 were considered as part of the analysis. The results showed that the prevalent data analytics techniques used to address the cloud computing resources allocation challenge are Support Vector Machine, Spatio-temporal and edge-cloud collaborative scheme. Failure to effectively and efficiently provide cloud computing management resource allocation will lead to system bottlenecks especially during peak periods. In this regard, such a failure could lead to dissatisfied clients.
Model for Enhancing Cloud Computing Resource Allocation Management Using Data Analytics Sekwatlakwatla, Sello Prince; Malele, Vusumuzi
Journal of Information System and Informatics Vol 6 No 1 (2024): March
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v6i1.679

Abstract

The cloud computing environment requires an adequate and accurate traffic prediction tool to fulfill the needs of customers and support organizations effectively. In the absence of an effective tool for forecasting cloud computing traffic, many organizations might fail. It is difficult to predict the network resources that are suitable to meet the needs of all network clients at a given time in a cloud computing environment because of the inconsistent network traffic flow. There is still room for improving the predictive accuracy of the model in cloud computing. The higher the accuracy of the traffic flow, the better the allocation of resources. Therefore, this study proposes an ensemble method called SGLA (Stepwise Gaussian Linear Autoregressive) by combining linear regression, support vector machines, Gaussian process regression, and the autoregressive integrated moving average technique. SGLA performed better than all methods with a minimum MAPE of 1.03% of the ensemble approach by using the averaging strategy, SGLA shows a clear advantage in handling resource allocation better despite traffic fluctuations, with 91.7% traffic prediction accuracy. Overall experimental results indicate that this method performed better than single models in terms of prediction accuracy. The main contribution of this study is to propose a data analytics model for enhancing cloud computing resource management.
Bibliometric Analysis of Data Analytics Techniques in Cloud Computing Resources Allocation Sekwatlakwatla, Sello Prince; Malele, Vusumuzi
Journal of Information System and Informatics Vol 6 No 3 (2024): September
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v6i3.782

Abstract

Cloud computing provides on-demand computing services over the Internet, allowing for quicker innovation, more flexible resources, and economies of scale while reducing the need for physical data centers and servers. With this benefit, most organizations are adopting this technology, and some organizations are also operating fully on cloud computing. This causes traffic to increase, and most of these organizations are struggling with resource allocation, resulting in complaints from users regarding inactive system performance, timeouts in applications, and higher bandwidth use during peak hours. In this regard, this study investigates data analytics techniques and tools for the allocation of resources in cloud computing. The study indexed journal articles from the Scopus Database and Web of Science (WOS) between 2010 and 2024. This article brings new insights into the analysis of data analytics techniques in Africa and collaborations with other developing countries. The findings present tools and approaches that may be used to allocate cloud computing resources and give recommendations.
A Hybrid Framework for Enhancing Privacy in Blockchain-Based Personal Data Sharing using Off-Chain Storage and Zero-Knowledge Proofs Mandinyenya, Godwin; Malele, Vusumuzi
Journal of Information System and Informatics Vol 7 No 2 (2025): June
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v7i2.1119

Abstract

Blockchain technology presents transformative opportunities for secure personal data sharing, particularly in healthcare, finance, and identity management. However, its widespread adoption is constrained by challenges such as limited scalability, privacy concerns, and conflicts with regulatory frameworks like the General Data Protection Regulation (GDPR). This study introduces a novel hybrid framework that integrates the InterPlanetary File System (IPFS) for off-chain storage with Zero-Knowledge Proofs (ZKPs) to enhance privacy, ensure regulatory compliance, and reduce on-chain storage demands. Employing a Design Science Research (DSR) methodology, the framework was developed and validated using Ethereum and Hyperledger Fabric, guided by insights from a systematic review of 180 studies from 2018 to 2023. Empirical evaluations revealed a 75% reduction in blockchain storage, 98% GDPR compliance, and zk-SNARK proof verification times below one second. The framework also enables GDPR-compliant erasure by removing encrypted off-chain data while preserving on-chain auditability. Despite challenges such as IPFS latency and trusted setup complexities, the solution offers a scalable and privacy-preserving architecture applicable to real-world domains, especially in privacy-critical environments like healthcare and finance by resolving blockchain’s GDPR compliance paradox.