Security and Privacy in Bigdata Learning Analytics

An Affordable and Modular Solution
  • Jeremie SeanoskyEmail author
  • Daniel Jacques
  • Vive Kumar
  • Kinshuk
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 49)


In a growing world of bigdata learning analytics, tremendous quantities of data streams are collected and analyzed by various analytics solutions. These data are crucial in providing the most accurate and reliable analysis results, but at the same time they constitute a risk and challenge from a security standpoint. As fire needs fuel to burn, so do hacking attacks need data in order to be “successful”. Data is the fuel for hackers, and as we protect wood from fire sources, so do we need to protect data from hackers. Learning analytics is all about data. This paper discusses a modular, affordable security model that can be implemented in any learning analytics platform to provide total privacy of learners’ data through encryption mechanisms and security policies and principles at the network level.


Bigdata Learning analytics Analytics Security Privacy 


  1. 1.
    Korfiatis, N.: Big data for enhanced learning analytics: a case for large-scale comparative assessments. In: Garoufallou, E., Greenberg, J. (ed.) Metadata and Semantics Research, vol. 390, pp. 225–233. Springer International Publishing, (ISBN: 978-3-319-03436-2). (2013). Retrieved from
  2. 2.
    Seanosky, J., Boulanger, D., Kumar, V.: Unfolding learning analytics for big data. In: Emerging Issues in Smart Learning, pp. 377–384. Springer, Berlin (2015)Google Scholar
  3. 3.
    Boulanger, D., Seanosky, J., Kumar, V., Panneerselvam, K., Somasundaram, T.S.: Smart learning analytics. In: Emerging Issues in Smart Learning, pp. 289–296. Springer, Berlin (2015)Google Scholar
  4. 4.
    Kumar, V., Boulanger, D., Seanosky, J., Panneerselvam, K., Somasundaram, T.S.: Competence analytics. J. Comput. Educ. 1(4), 251–270 (2014)CrossRefGoogle Scholar
  5. 5.
    Boulanger, D., Seanosky, J., Pinnell, C., Bell, J., Kumar, V.: SCALE: a competence analytics framework. In: State-of-the-Art and Future Directions of Smart Learning, pp. 19–30. Springer Singapore (2016)Google Scholar
  6. 6.
    Boulanger, D., Seanosky, J., Baddeley, M., Kumar, V., Kinshuk.: Learning analytics in the energy Industry: measuring competences in emergency procedures. In: 2014 IEEE Sixth International Conference on Technology for Education (T4E), pp. 148–155. (2014)Google Scholar
  7. 7.
    Wagner, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: The Second USENIX Workshop on Electronic Commerce Proceedings, pp. 29–40 (1996)Google Scholar
  8. 8.
    Sarkar, P.G., Fitzgerald, S.: Attacks on SSL a comprehensive study of beast, crime, time, breach, lucky 13 and RC4 biases (2013). Internet: (2014)
  9. 9.
    Prado, A., Harris, N., Gluck, Y.: SSL, gone in 30 seconds. Breach attack (2013). Internet:
  10. 10.
    Jarmoc, J., Unit, D.S.C.T.: SSL/TLS interception proxies and transitive trust. Black Hat Europe (2012). Internet:
  11. 11.
  12. 12.
    Nobori, D.: Design and Implementation of SoftEther VPN. Unpublished master’s thesis, Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba, Japan (2011). Retrieved from
  13. 13.
  14. 14.
    Senevitane, O., Kagal, L.: Addressing data reuse issues at the protocol level. In 2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 141–144 (2011)Google Scholar
  15. 15.
    Seneviratne, O., Kagal, L.: HTTPa: accountable HTTP. In: IAB/w3C internet privacy workshop (2010)Google Scholar
  16. 16.
    Seneviratne, O.W.: Augmenting the web with accountability. In: Proceedings of the 21st International Conference Companion on World Wide Web, pp. 185–190. ACM (2012)Google Scholar
  17. 17.
    Seneviratne, O., Kagal, L.: Enabling privacy through transparency. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST), pp. 121–128. IEEE (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Jeremie Seanosky
    • 1
    Email author
  • Daniel Jacques
    • 1
  • Vive Kumar
    • 1
  • Kinshuk
    • 1
  1. 1.School of Computing and Information SystemsAthabasca UniversityAthabascaCanada

Personalised recommendations