Privacy, security and legality in educational solutions based on Blockchain: A Systematic Literature Review
DOI:
https://doi.org/10.5944/ried.23.2.26388Keywords:
privacy and security for personal and educational data, education technology, confidentiality, data protection lawsAbstract
Learning Analytics processes student data, even for students under 18. The analytical cycle consists of collecting data, storing it for long periods and using it for analysis and visualization. The more data, the better the analysis. This analysis can be descriptive, predictive and, even, prescriptive, which involves the management, processing and use of personal data. The educational context is, thus, very sensitive, unlike individual contexts where analysis is used at will. It is not clear how student data are being used by technology companies serving education and who is actually benefiting, how this will affect students in the short and long-term future, or what level of privacy or security is applied to protect student data. Therefore, and in relation to the above, analyzing educational data implies a sensitive and fragile context in the management and analysis of personal data of students, including minors, in which precautions must be maximized. This systematic review of the literature explores the importance of personal data protection and security in the field of education through the emerging promises of those interested in using blockchain technology. The results show that it is important to understand the implications and risks derived from the use of emerging technologies in education, their relationship with society and the current legislation.
Downloads
References
Al-Zaben, N., Onik, M. M. H., Yang, J., Lee, N. Y., & Kim, C. S. (2019). General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management. Proceedings - 2018 International Conference on Computing, Electronics and Communications Engineering, ICCECE 2018, 77–82. https://doi.org/10.1109/iCCECOME.2018.8658586
Amo, D. (2018). Tesis Daniel Amo Filvà - Revisión Sistemática Literatura. Retrieved from https://lasalleuniversities-my.sharepoint.com/:x:/g/personal/daniel_amo_salle_url_edu/EQoQGKr7zuBIpYkA0gB4mGoBEP7NCufbBjhkURpKOAklyQ?e=0cjvVO
Amo, D., & Santiago, R. (2017). Learning Analytics: la narración del aprendizaje a través de los datos. Editorial UOC. Barcelona: UOC.
Apostolaki, M., Zohar, A., & Vanbever, L. (2017). Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. Proceedings - IEEE Symposium on Security and Privacy, 375–392. https://doi.org/10.1109/SP.2017.29
Arenas, R., & Fernandez, P. (2018). CredenceLedger: A Permissioned Blockchain for Verifiable Academic Credentials. 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings, 1–6. https://doi.org/10.1109/ICE.2018.8436324
Bacon, J., Michels, J. D., Millard, C., & Singh, J. (2018). Blockchain Demystified: a technical and legal introduction to distributed and centralised ledgers. Richmond Journal of Law & Technology, XXV(1), 1–106. Retrieved from https://jolt.richmond.edu/files/2018/11/Michelsetal-Final-1.pdf
Bdiwi, R., Runz, C. de, Faiz, S., & Cherif, A. A. (2017). Towards a New Ubiquitous Learning Environment Based on Blockchain Technology. 2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT), 101–102. https://doi.org/10.1109/ICALT.2017.37
Bore, N., Karumba, S., Mutahi, J., Darnell, S. S., Wayua, C., & Weldemariam, K. (2017). Towards Blockchain-enabled school information hub. ACM International Conference Proceeding Series, Part F1320, 1–4. https://doi.org/10.1145/3136560.3136584
Chatti, M. A., Dyckhoff, A. L., Schroeder, U., & Thüs, H. (2012). A reference model for learning analytics. International Journal of Technology Enhanced Learning, 4(5–6), 318–331. https://doi.org/10.1504/IJTEL.2012.051815
Chen, G., Xu, B., Lu, M., & Chen, N.-S. (2018). Exploring blockchain technology and its potential applications for education. Smart Learning Environments, 5(1), 1-FALTA PÁG FINAL. https://doi.org/10.1186/s40561-017-0050-x
Conti, M., Sandeep, K. E., Lal, C., & Ruj, S. (2018). A survey on security and privacy issues of bitcoin. IEEE Communications Surveys and Tutorials, 20(4), 3416–3452. https://doi.org/10.1109/COMST.2018.2842460
Cruz-Benito, J., García-Peñalvo, F. J., & Therón, R. (2019). Analyzing the software architectures supporting HCI/HMI processes through a systematic review of the literature. Telematics and Informatics, 38, 118–132. https://doi.org/10.1016/j.tele.2018.09.006
Dai, F., Shi, Y., Meng, N., Wei, L., & Ye, Z. (2017). From Bitcoin to cybersecurity: A comparative study of blockchain application and security issues. 2017 4th International Conference on Systems and Informatics (ICSAI), 975–979. https://doi.org/10.1109/ICSAI.2017.8248427
Dima, G. A., Jitariu, A. G., Pisa, C., & Bianchi, G. (2018). Scholarium: Supporting Identity Claims Through a Permissioned Blockchain. IEEE 4th International Forum on Research and Technologies for Society and Industry, RTSI 2018 - Proceedings, 1–6. https://doi.org/10.1109/RTSI.2018.8548407
Drescher, D. (2017). Blockchain Basics. Apress.
Duan, B., Zhong, Y., & Liu, D. (2018). Education application of blockchain technology: Learning outcome and meta-diploma. Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, 2017-Decem, 814–817. https://doi.org/10.1109/ICPADS.2017.00114
Farah, J. C., Vozniuk, A., Rodriguez-Triana, M. J., & Gillet, D. (2018). A blueprint for a blockchain-based architecture to power a distributed network of tamper-evident learning trace repositories. Proceedings - IEEE 18th International Conference on Advanced Learning Technologies, ICALT, 218–222. https://doi.org/10.1109/ICALT.2018.00059
Flanagan, B., & Ogata, H. (2018). Learning analytics platform in higher education in Japan. Knowledge Management and E-Learning, 10(4), 469–484.
Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Čapkun, S. (2016). On the security and performance of Proof of Work blockchains. Proceedings of the ACM Conference on Computer and Communications Security, 24-28-Octo, 3–16. https://doi.org/10.1145/2976749.2978341
Gilda, S., & Mehrotra, M. (2018). Blockchain for Student Data Privacy and Consent. 2018 International Conference on Computer Communication and Informatics, ICCCI 2018, 1–5. https://doi.org/10.1109/ICCCI.2018.8441445
Gong, X., Liu, X., Jing, S., Xiong, G., & Zhou, J. (2019). Parallel-Education-Blockchain Driven Smart Education: Challenges and Issues. Proceedings 2018 Chinese Automation Congress, CAC 2018, 2390–2395. https://doi.org/10.1109/CAC.2018.8623198
Han, M., Wu, D., Li, Z., Xie, Y., He, J. S., & Baba, A. (2018). A novel blockchain-based education records verification solution. SIGITE 2018 - Proceedings of the 19th Annual SIG Conference on Information Technology Education, 178–183. https://doi.org/10.1145/3241815.3241870
Herold, B. (2014). InBloom to Shut Down Amid Growing Data-Privacy Concerns. Retrieved June 21, 2018, from Education Week website: http://blogs.edweek.org/edweek/DigitalEducation/2014/04/inbloom_to_shut_down_amid_growing_data_privacy_concerns.html
Joshi, A. P., Han, M., & Wang, Y. (2018). A survey on security and privacy issues of blockchain technology. Mathematical Foundations of Computing, 1(2), 121–147.
Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. Technical Report, Ver. 2.3 EBSE Technical Report. EBSE, EBSE-2007-(School of Computer Science and Mathematics), 65. Retrieved from https://www.elsevier.com/__data/promis_misc/525444systematicreviewsguide.pdf
Mense, A., & Flatscher, M. (2018). Security Vulnerabilities in Ethereum Smart Contracts. Proceedings of the 20th International Conference on Information Integration and Web-Based Applications & Services, 375–380.
Millard, C. (2018). Blockchain and law: Incompatible codes? Computer Law & Security Review, 34(4), 843–846.
Moher, D., Liberati, A., Tetzlaff, J., & Altman, D. G. (2009). Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. PLoS Medicine, 6(7), e1000097. https://doi.org/10.1371/journal.pmed.1000097
Moubarak, J., Filiol, E., & Chamoun, M. (2018). On blockchain security and relevant attacks. 2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, 1–6. https://doi.org/10.1109/MENACOMM.2018.8371010
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. 1–9. Retrieved from https://www.bitcoincash.org/bitcoin.pdf
Neiva, F. W., David, J. M. N., Braga, R., & Campos, F. (2016). Towards pragmatic interoperability to support collaboration: A systematic review and mapping of the literature. Information and Software Technology, 72, 137–150. https://doi.org/10.1016/j.infsof.2015.12.013
Ocheja, P., Flanagan, B., & Ogata, H. (2018). Connecting decentralized learning records: a blockchain based learning analytics platform. Proceedings of the 8th International Conference on Learning Analytics and Knowledge, 265–269. https://doi.org/10.1145/3170358.3170365
Pagallo, U., Bassi, E., Crepaldia, M., & Durante, M. (2018). Chronicle of a clash foretold: Blockchains and the GDPR’s right to erasure. Frontiers in Artificial Intelligence and Applications, 313, 81–90. https://doi.org/10.3233/978-1-61499-935-5-81
Petticrew, M., & Roberts, H. (2008). Systematic Reviews in the Social Sciences: A Practical Guide. In Systematic Reviews in the Social Sciences: A Practical Guide. https://doi.org/10.1002/9780470754887
Soni, A., & Maheshwari, S. (2018). A Survey of Attacks on the Bitcoin System. 2018 IEEE International Students’ Conference on Electrical, Electronics and Computer Science, SCEECS 2018, 1–5. https://doi.org/10.1109/SCEECS.2018.8546925
Soomro, A. B., Salleh, N., Mendes, E., Grundy, J., Burch, G., & Nordin, A. (2016). The effect of software engineers’ personality traits on team climate and performance: A Systematic Literature Review. Information and Software Technology, 73, 52–65. https://doi.org/10.1016/j.infsof.2016.01.006
Srivastava, A., Bhattacharya, P., Singh, A., Mathur, A., Prakash, O., & Pradhan, R. (2019). A Distributed Credit Transfer Educational Framework based on Blockchain. Proceedings - 2018 2nd International Conference on Advances in Computing, Control and Communication Technology, IAC3T 2018, 54–59. https://doi.org/10.1109/IAC3T.2018.8674023
Sun, H., Wang, X., & Wang, X. (2018). Application of Blockchain Technology in Online Education. International Journal of Emerging Technologies in Learning (IJET), 13(10), 252-FALTA PÁG. https://doi.org/10.3991/ijet.v13i10.9455
Turcu, C., Turcu, C., & Chiuchișan, I. (2018). Blockchain and its Potential in Education. International Conference on Virtual Learning - ICVL, Alba Iulia.
Turkanović, M., Hölbl, M., Košič, K., Heričko, M., & Kamišalić, A. (2018). EduCTX: A blockchain-based higher education credit platform. IEEE Access, 6, 5112–5127. https://doi.org/10.1109/ACCESS.2018.2789929
Williamson, B. (2017). Decoding ClassDojo: psycho-policy, social-emotional learning and persuasive educational technologies. Learning, Media and Technology, 42(4), 440–453. https://doi.org/10.1080/17439884.2017.1278020
Xu, Y., Zhao, S., Kong, L., Zheng, Y., Zhang, S., & Li, Q. (2017). ECBC: A high performance educational certificate blockchain with efficient query. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Vol. 10580 LNCS, 288–304. https://doi.org/10.1007/978-3-319-67729-3_17
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 RIED. Revista Iberoamericana de Educación a Distancia

This work is licensed under a Creative Commons Attribution 4.0 International License.
The articles that are published in this journal are subject to the following terms:
1. The authors grant the exploitation rights of the work accepted for publication to RIED, guarantee to the journal the right to be the first publication of research understaken and permit the journal to distribute the work published under the license indicated in point 2.
2. The articles are published in the electronic edition of the journal under a Creative Commons Attribution 4.0 International (CC BY 4.0) license. You can copy and redistribute the material in any medium or format, adapt, remix, transform, and build upon the material for any purpose, even commercially. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
3. Conditions for self-archiving. Authors are encouraged to disseminate electronically the OnlineFirst version (assessed version and accepted for publication) of its articles before publication, always with reference to its publication by RIED, favoring its circulation and dissemination earlier and with this a possible increase in its citation and reach among the academic community.

