CFP last date
20 May 2026
Reseach Article

Cloud-based Learning Management Systems (LMS) Forensics

by Bright Osei Amankwatia, Jerome Ofori-Kyeremeh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 97
Year of Publication: 2026
Authors: Bright Osei Amankwatia, Jerome Ofori-Kyeremeh
10.5120/ijca1eec8fd576a4

Bright Osei Amankwatia, Jerome Ofori-Kyeremeh . Cloud-based Learning Management Systems (LMS) Forensics. International Journal of Computer Applications. 187, 97 ( Apr 2026), 50-55. DOI=10.5120/ijca1eec8fd576a4

@article{ 10.5120/ijca1eec8fd576a4,
author = { Bright Osei Amankwatia, Jerome Ofori-Kyeremeh },
title = { Cloud-based Learning Management Systems (LMS) Forensics },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2026 },
volume = { 187 },
number = { 97 },
month = { Apr },
year = { 2026 },
issn = { 0975-8887 },
pages = { 50-55 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number97/cloud-based-learning-management-systems-lms-forensics/ },
doi = { 10.5120/ijca1eec8fd576a4 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-04-28T21:29:11.901572+05:30
%A Bright Osei Amankwatia
%A Jerome Ofori-Kyeremeh
%T Cloud-based Learning Management Systems (LMS) Forensics
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 97
%P 50-55
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid expansion of cloud-based Learning Management Systems (LMS) has reshaped teaching, learning, and assessment practices in higher education by enabling scalable, flexible, and data-intensive educational services. However, this transformation has also increased institutional exposure to cybersecurity incidents, data breaches, and misuse of sensitive academic information. The distributed, virtualised, and service-provider–controlled nature of cloud infrastructures complicates digital forensic investigations, as conventional forensic methods were largely developed for systems under direct organisational control. As a result, higher education institutions cannot effectively identify, preserve, and analyse digital evidence following incidents within cloud-hosted LMS environments. This study proposes a Cloud LMS Forensics Framework that addresses these challenges by integrating forensic readiness, investigative processes, and incident response within a socio-technical systems perspective. The framework explicitly incorporates LMS-specific evidence sources, such as learning activity logs, assessment records, and user interaction traces, while accounting for human behaviour, organisational governance, and cloud service provider dependencies. It further considers legal and regulatory requirements for educational data protection, jurisdictional constraints, and evidentiary admissibility. By embedding forensic mechanisms into LMS operations before incident occurrence, the framework enables proactive evidence preservation, reduces investigative delays, and enhances the reliability of forensic outcomes. The proposed framework advances cloud digital forensics by contextualising forensic practice within educational systems and offers a structured foundation for strengthening institutional resilience, accountability, and trust in cloud-based learning environments.

References
  1. Alenezi, M., & Faisal, M. (2023). Cloud-based learning management systems: Adoption, security challenges, and future directions in higher education. Education and Information Technologies, 28(5), 6123–6142. https://doi.org/10.1007/s10639-022-11345-9
  2. Alqahtani, A., & Clarke, N. (2022). Forensic readiness in cloud-based educational systems: Requirements and challenges. Journal of Digital Forensics, Security and Law, 17(3), 45–63. https://doi.org/10.15394/jdfsl.2022.1820
  3. Alqahtani, F., & Clarke, N. (2022). Digital forensic challenges in cloud-based e-learning systems. Journal of Information Security and Applications, 66, 103147. https://doi.org/10.1016/j.jisa.2022.103147
  4. Baxter, G., & Sommerville, I. (2019). Socio-technical systems: From design methods to systems engineering. Interacting with Computers, 31(1), 4–17. https://doi.org/10.1093/iwc/iwz003
  5. Baxter, G., & Sommerville, I. (2021). Socio-technical systems: From design methods to systems engineering. ACM Computing Surveys, 54(4), 1–38. https://doi.org/10.1145/3451213
  6. Behl, A., & Behl, K. (2021). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
  7. Behl, A., & Behl, K. (2021). Cloud computing forensics: State-of-the-art and research challenges. Future Generation Computer Systems, 114, 485–500. https://doi.org/10.1016/j.future.2020.08.041
  8. Behl, A., & Behl, K. (2022). Cybersecurity and privacy governance in higher education institutions: Emerging risks and mitigation strategies. Journal of Information Security and Applications, 64, 103058. https://doi.org/10.1016/j.jisa.2021.103058
  9. Clegg, C. W., Waterson, P., & Carey, N. (2021). Human factors and socio-technical systems in complex organisational contexts. Applied Ergonomics, 95, 103434. https://doi.org/10.1016/j.apergo.2021.103434
  10. Egho-Promise, E., Idahosa, S., Asante, G., & Okungbowa, A. (2024). Digital forensic investigation standards in cloud computing. Universal Journal of Computer Sciences and Communications. https://doi.org/10.31586/ujcsc.2024.923
  11. Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419. https://doi.org/10.1016/j.jisa.2019.102419
  12. Haque, M. M., & Rahman, M. M. (2023). Forensic readiness in cloud-based educational systems: A practical perspective. Journal of Digital Forensics, Security and Law, 18(2), 1–19. https://doi.org/10.15394/jdfsl.2023.2036
  13. Karie, N. M., Venter, H. S., & Choo, K. K. R. (2021). Digital forensic process models: A comparative review. Forensic Science International: Digital Investigation, 36, 301–315. https://doi.org/10.1016/j.fsidi.2020.301002
  14. Karie, N. M., Venter, H. S., & Choo, K. K. R. (2021). Digital forensic readiness in the cloud: A systematic literature review. Journal of Network and Computer Applications, 174, 102886. https://doi.org/10.1016/j.jnca.2020.102886
  15. Kshetri, N., & Voas, J. (2020). Cybersecurity in higher education institutions. Computer, 53(6), 72–75. https://doi.org/10.1109/MC.2020.2983919
  16. Kumar, R., Singh, S., & Kaur, P. (2024). Cyber threats to cloud-based academic platforms: Evidence from learning management systems. Computers & Security, 134, 103372. https://doi.org/10.1016/j.cose.2023.103372
  17. Li, J., Xiao, W., & Zhang, C. (2023). Data security crisis in universities: Identification of key factors affecting data breach incidents. Humanities and Social Sciences Communications, 10, Article 270. https://doi.org/10.1038/s41599-023-01757-0
  18. Malele, V. (2023). Cybersecurity cloud-based online learning: A literature review approach. Journal of Information Systems and Informatics. https://doi.org/10.51519/journalisi.v5i4.583
  19. Malik, A. W., Bhatti, D. S., Park, T.-J., Ishtiaq, H. U., Ryou, J.-C., & Kim, K.-I. (2024). Cloud digital forensics: Beyond tools, techniques, and challenges. Sensors, 24(2), 433. https://doi.org/10.3390/s24020433
  20. Malik, M., Farooq, U., & Ahmed, S. (2024). Cloud forensic frameworks: Trends, challenges, and future directions. Computers & Security, 145, 104880. https://doi.org/10.1016/j.cose.2023.104880
  21. Malik, N., Khan, S., Hussain, M., & Raza, A. (2024). Cloud digital forensics: Challenges, solutions, and future research directions. Computers & Security, 136, 103610. https://doi.org/10.1016/j.cose.2023.103610
  22. Martini, B., & Choo, K. K. R. (2021). Cloud forensic readiness: Foundations, challenges, and future research directions. Digital Investigation, 36, 301–315. https://doi.org/10.1016/j.diin.2020.301002
  23. Martini, B., & Choo, K.-K. R. (2021). Cloud forensic readiness: A survey and framework. Digital Investigation, 37, 301177. https://doi.org/10.1016/j.diin.2021.301177
  24. National Institute of Standards and Technology. (2022). Cloud computing forensic science challenges. NIST Cybersecurity White Paper Series.
  25. Pooe, D., & Labuschagne, L. (2020). Digital forensic readiness in the cloud. Journal of Information Security and Applications, 55, 102651. https://doi.org/10.1016/j.jisa.2020.102651
  26. Quick, D., & Choo, K.-K. R. (2023). Big data analytics and digital forensics: Recent advances and future directions. Digital Investigation, 44, 301–314. https://doi.org/10.1016/j.diin.2023.301314
  27. Ruan, K., Carthy, J., Kechadi, M.-T., & Crosbie, M. (2020). Cloud forensic challenges: Legal, technical and privacy considerations. Future Generation Computer Systems, 108, 936–948. https://doi.org/10.1016/j.future.2020.02.012
  28. Ruan, K., Carthy, J., Kechadi, T., & Crosbie, M. (2020). Cloud forensics: An overview of challenges, solutions, and future directions. Digital Investigation, 33, 102–115. https://doi.org/10.1016/j.diin.2020.102897
  29. Sarker, S., Chatterjee, S., Xiao, X., & Elbanna, A. (2022). The sociotechnical axis of information systems development. MIS Quarterly, 46(3), 1573–1600. https://doi.org/10.25300/MISQ/2022/15892
  30. Sikarwar, P., Tiwari, A., Joshi, R., & Agrawal, J. (2025). Cloud computing in education: A revolution in learning management systems. Innovare Journal of Education. https://doi.org/10.22159/ijoe.2025v13i5.54161
  31. Zawoad, S., & Hasan, R. (2020). Digital forensics in the cloud: Challenges and approaches. ACM Computing Surveys, 53(6), 1–36. https://doi.org/10.1145/3417963
  32. Zawoad, S., & Hasan, R. (2020). Trustworthy digital forensics in the cloud. IEEE Cloud Computing, 7(2), 66–75. https://doi.org/10.1109/MCC.2019.2950017
  33. Zawoad, S., & Hasan, R. (2022). Cloud forensics: A meta-study of challenges, solutions, and future directions. ACM Computing Surveys, 55(2), 1–36. https://doi.org/10.1145/3485127
Index Terms

Computer Science
Information Sciences

Keywords

Cloud digital forensics; Learning Management Systems; forensic readiness; higher education cybersecurity; socio-technical systems; cloud security; educational data governance