Transforming Higher Education systems architectures through adoption of secure overlay blockchain technologies

Foysal Miah, Samuel Onalo, Eckhard Pfluegel

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    The adoption of Distributed Ledger Technology (DLT) has been growing tremendously in recent years following the introduction of Bitcoin in 2009. However, the usefulness of DLT is not limited to the financial sector, and this paper investigates the viability of DLT architectures for use in Higher Education (HE). This sector faces challenging financial constraints, and one way to address this problem is to adopt emerging DLT technologies as architectures for HE systems. This article presents the ASTER Open Source system, a hybrid DLT integration within the context of a student submission system for assignment grading purposes. ASTER addresses many concerns of traditional system architectures such as centralisation, system downtime, and decoupling; all of which are mitigated through the use of blockchain technology. The advantages and drawbacks of such a new approach are discussed, including the aspect of security concerns relating to student work being submitted to a public ledger.
    Original languageEnglish
    Title of host publicationPublished in: (2021) Jahankhani H., Jamal A., Lawson S. (eds) Cybersecurity, Privacy and Freedom Protection in the Connected World, pp. 343-355. ISBN 9783030685331. Advanced Sciences and Technologies for Security Applications
    DOIs
    Publication statusPublished - Jan 2021

    Bibliographical note

    Note: Published in: (2021) Jahankhani H., Jamal A., Lawson S. (eds) Cybersecurity, Privacy and Freedom Protection in the Connected World, pp. 343-355. ISBN 9783030685331. Advanced Sciences and Technologies for Security Applications

    Keywords

    • Computer science and informatics

    Fingerprint

    Dive into the research topics of 'Transforming Higher Education systems architectures through adoption of secure overlay blockchain technologies'. Together they form a unique fingerprint.

    Cite this