EduCrypt: A Secure File Data Sharing Platform using Hybrid Encryption for Cloud-Based E-Learning

Andi Arniaty Arsyad(1), Riri Safitri(2), Lambda Sangkala Murbawisesa(3),


(1) Universitas Al-Azhar Indonesia
(2) Universitas Al-Azhar Indonesia
(3) Universitas Al-Azhar Indonesia
(*) Corresponding Author

Abstract


The rise of cloud-based learning environments has transformed education but has also exposed vulnerabilities in data security. Learning Management Systems (LMSs) often handle sensitive academic data without adequate protection, leaving it vulnerable to unauthorized access and data breaches. This study introduces EduCrypt, a secure file-sharing platform that uses hybrid encryption, combining AES for fast data encryption and RSA for secure key exchange. In this research, a Hybrid Waterfall–Iterative method was used as the overarching research methodology to guide requirements analysis, architectural design, system implementation, and evaluation. EduCrypt integrates seamlessly with Moodle LMS via token- and credential-based authentication. Its architecture includes asynchronous RabbitMQ workers for efficient synchronization and a user-friendly web interface for secure file operations. Benchmark tests demonstrate stable encryption and decryption times under 300 ms for files up to 30 MB, showcasing both scalability and efficiency. Security evaluations confirm that EduCrypt effectively mitigates brute-force attacks, SQL injection, and man-in-the-middle attacks. This research resulted in a validated enhancement in file security practices for LMS through the implementation of a hybrid cryptographic model. Furthermore, the outcome includes a fully functional EduCrypt prototype integrated with Moodle, along with performance and security evaluation results.

Keywords - Data Security, Hybrid encryption, File sharing, E-learning, Cloud computing.


Full Text:

PDF

References


G. Singh and M. Garg, “Enhanced cloud security using hybrid mechanism of RSA, AES, and Blowfish data encryption with secure OTP” International Journal of Computers & Technology, vol. 18, pp. 7364–7380, 2018, doi 10.24297/ijct.v18i0.7898

C. Susmitha, S. Srineeharika, K. S. Laasya, S. K. Kannaiah, and S. Bulla, “Hybrid cryptography for secure file storage,” in Proc. 7th Int. Conf. on Computing Methodologies and Communication (ICCMC), 2023, pp. 1151–1156.

R. S. Durge and V. M. Deshmukh, “Securing cloud data: A hybrid encryption approach with RSA and AES for enhanced security and performance,” Journal of Integrated Science and Technology, vol. 13, no. 3, pp. 1060–1068, 2025, doi 10.62110/sciencein.jist.2025.v13.1060.

Y. M. A. Abualkas and D. L. Bhaskari, “Hybrid Approach to Cloud Storage Security Using ECC-AES Encryption and Key Management Techniques,” International Journal of Engineering Trends and Technology, vol. 72, no. 4, pp. 92–100, Apr. 2024, doi https://doi.org/10.24017/science.2025.1.5.

A. S. Al-Bayati, Enhancing Performance of Hybrid AES, RSA and Quantum Encryption Algorithm. Ph.D. dissertation, Anglia Ruskin Research Online (ARRO), 2023. https://hdl.handle.net/10779/aru.23768127.

R. A. Fathima and S. Arumugam, “A novel data transmission model using hybrid encryption scheme for preserving data integrity,” Advances in Technology and Innovation, vol. 9, no. 2, p. 14114, 2024, doi https://doi.org/10.46604/aiti.2024.14114.

R. Saini and N. Sainis, “Cryptographic hybrid model—An advancement in cloud computing security: A survey,” International Journal of Engineering Research and Technology, vol. 11, no. 6, 2022, doi 10.17577/IJERTV11IS060145.

R. S. Pressman, Software Engineering: A Practitioner’s Approach. Palgrave Macmillan, 2005.

R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978, doi https://doi.org/10.1145/359340.359342.

P. Shayan, R. Rondinelli, M. van Zaanen, and M. Atzmueller, “Multi-level analysis of learning management systems’ user acceptance exemplified in two system case studies,” Data, vol. 8, no. 3, p. 45, Feb. 2023. doi: 10.3390/data8030045.

P. Chatterjee, R. Bose, S. Banerjee, and S. Roy, “Enhancing data security of cloud-based LMS,” Wireless Personal Communications, vol. 130, no. 2, pp. 1123–1139, 2023, doi 10.1007/s11277-023-10323-5.

M. Anghel and G. C. Pereteanu, “Cyber security approaches in e-learning,” in Proc. INTED2020 Conf., 2020, pp. 4820–4825, IATED.

R. I. Akter, M. A. Khan, F. A. Rahman, S. J. Soheli, and N. J. Suha, “RSA and AES-based hybrid encryption technique for enhancing data security in cloud computing,” International Journal of Computational and Applied Mathematics & Computer Science, vol. 3, pp. 60–71, Oct. 2023, doi 10.37394/232028.2023.3.8.

P. Ghiya, TypeScript Microservices: Build, deploy, and secure Microservices using TypeScript combined with Node.js. Birmingham, UK: Packt Publishing Ltd, 2018.

S. Kumar and D. Kumar, “Securing of cloud storage data using hybrid AES–ECC cryptographic approach,” Journal of Mobile Multimedia, vol. 19, no. 2, pp. 363–388, Mar. 2023, doi https://doi.org/10.13052/jmm1550-4646.1921.

S. S. Nair, “Securing against advanced cyber threats: a comprehensive guide to phishing, XSS, and SQL injection defense,” Journal of Computer Science and Technology Studies, vol. 6, no. 1, pp. 76–93, Jan. 2024. doi: 10.32996/jcsts.2024.6.1.9.

E. AR, M. G., and D. T., “Enhancing security in data exchange: mitigating risks solutions in Base64 encoding and JSON Web Tokens,” in Proc. 2024 Int. Symp. on Electronics and Telecommunications (ISETC), Nov. 2024, pp. 1–4.

K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernández, “An analysis of security issues for cloud computing,” Journal of Internet Services and Applications, vol. 4, pp. 1–13, Dec. 2013, doi 1186/1869-0238-4-5.




DOI: http://dx.doi.org/10.36722/sst.v11i1.5086

Refbacks

  • There are currently no refbacks.


LP2M (Lembaga Penelitian dan Pengembangan Masyarakat)

Universitas AL-AZHAR INDONESIA, Lt.2 Ruang 207

Kompleks Masjid Agung Al Azhar

Jl. Sisingamangaraja, Kebayoran Baru

Jakarta Selatan 12110

Visitor

 This work is licensed under CC BY 4.0