Implementation of Zero Trust Architecture in Online Examination Systems to Prevent Cheating
Keywords:
Zero Trust Architecture, Online Exams, Cybersecurity, Academic Integrity, Continuous AuthenticationAbstract
The increasing use of online exam systems (e-exams) in the post-pandemic cyberlearning ecosystem presents critical challenges to academic integrity, particularly related to vulnerabilities to increasingly sophisticated technical fraud such as the use of virtual machines, remote desktops, and even artificial intelligence-based identity manipulation. Traditional perimeter-based security models—verifying only the initial login—have proven inadequate in detecting dynamic threats that occur during exam sessions. This research proposes the implementation of Zero Trust Architecture (ZTA) with the core principle of "Never Trust, Always Verify" as a comprehensive solution for securing online exams. The methodology used is Research and Development (R&D), which includes designing a security architecture based on the five main pillars of Zero Trust: identity, device, network, application, and data. The developed system implements a Continuous Authentication mechanism through periodic facial biometric validation and a Device Health Check feature to ensure the integrity of the devices used by participants. Through a micro-segmentation approach, user access is strictly limited to authorized exam resources. The research results are expected to demonstrate that implementing a Zero Trust model can improve the effectiveness of real-time fraud detection and block unauthorized access without significantly compromising system performance. This research provides an important contribution to educational institutions in building a digital examination infrastructure that is independent, transparent, and able to minimize dependence on manual proctor supervision.
References
Rose, S., Borchert, Oliver., Mitchell, S., & Connelly, S. (2020). NIST Special Publication 800-207: Zero Trust Architecture. National Institute of Standards and Technology. (Sumber Utama ZTA).
Wylde, T. (2021). "The End of the Perimeter: Moving to Zero Trust." Network Security Journal.
Kindervag, J. (2010). "Build Security Into Your Network's DNA: The Zero Trust Network Architecture." Forrester Research.
Buck, C., et al. (2021). "Never Trust, Always Verify: A Multi-Case Study on Zero Trust Adoption." Communications of the Association for Information Systems.
Teerakanok, S., et al. (2022). "Migrating to Zero Trust Architecture: Reviews and Challenges." IEEE Access.
Sarkar, S., et al. (2023). "Zero Trust Architecture for Cyber-Physical Systems." IEEE Internet of Things Journal.
Wardle, P. (2023). "Implementation of Zero Trust in Cloud-Native Environments." Journal of Cyber Security Technology.
Garbis, J., & Chapman, J. (2021). Zero Trust Networks: Provisioning Trust in an Untrustworthy World. O'Reilly Media.
Dixon, M. (2022). "Continuous Authentication as a Pillar of Zero Trust." Information Security Journal: A Global Perspective.
Syed, N. F., et al. (2022). "Zero Trust Security Model: A Survey on Applications and Challenges." Computers & Security.
Dendir, S., & Maxwell, R. S. (2020). "Cheating in online exams: Is it becoming more common?" Cognitive Systems Research.
Holden, O. L., et al. (2021). "Academic Integrity in Online Assessment: A Research Review." Frontiers in Education.
Lancaster, T., & Cotarlan, C. (2021). "Contract cheating by STEM students through a file-sharing website." Computers & Education.
Bilen, E., & Matros, A. (2021). "Online cheating amid COVID-19." Journal of Economic Behavior & Organization.
Reedy, A., et al. (2021). "Rethinking use of online invigilation for university exams." Postdigital Science and Education.
Chirumamilla, A., et al. (2020). "Cheating in e-exams and paper exams: the perceptions of engineering students." Computers & Education.
Joshi, A., et al. (2022). "A survey of online proctoring systems: Methods, tools, and challenges." Journal of Educational Computing Research.
Dawson, P. (2021). "Strategies for managing the academic integrity of online exams." Higher Education Research & Development.
Kimmins, J. (2024). "AI and the future of online exam integrity." International Journal for Educational Integrity.
Gamage, K. A., et al. (2020). "Academic Integrity in the Post-Pandemic Period." Education Sciences.
Tariq, N., et al. (2023). "Continuous biometrics-based authentication in e-learning systems." IEEE Transactions on Learning Technologies.
Hajra, R., et al. (2022). "Face Recognition for Online Exam Proctoring using Deep Learning." Proceedings of International Conference on AI.
Salloum, S. A., et al. (2021). "Exploring the social media adoption in e-learning: A case study of UAE." Education and Information Technologies.
Abasaltian, A., et al. (2023). "Blockchain and Zero Trust for Secure E-Exam Systems." Journal of Information Security and Applications.
Al-Ansi, A. (2022). "Advanced Encryption Standard in Securing Online Examination Systems." International Journal of Computer Science Research.
Liu, S., et al. (2021). "Anti-cheating detection in online exams based on head pose estimation." IEEE Access.
Kumar, G., et al. (2022). "Multimodal Biometric Authentication for Secure E-Learning." Springer Nature.
Vatavu, R. D. (2023). "User Behavior Analytics for Continuous Verification in Online Platforms." Human-Computer Interaction.
Patel, A., et al. (2022). "Deep Learning for Real-time Object Detection in Proctoring." Expert Systems with Applications.
Chen, Y., & Zhao, X. (2023). "Identity verification in e-learning using keystroke dynamics." Journal of Network and Computer Applications.
Siemens, G., et al. (2022). "Learning Analytics: The State of the Discipline." Journal of Learning Analytics.
Bates, A. W. (2021). Teaching in a Digital Age: Guidelines for designing teaching and learning. Tony Bates Associates Ltd.
Selwyn, N. (2020). "Digital Education: Issues and Policy." Routledge.
Ally, M. (2020). "Competency profile of the digital teacher." International Journal of Educational Technology in Higher Education.
Weller, M. (2020). "25 Years of EdTech." Athabasca University Press.
Bond, M., et al. (2020). "Mapping digital health in education: A systematic review." International Journal of Educational Technology.
Means, B., et al. (2021). "The effectiveness of online learning: A meta-analysis." U.S. Department of Education.
Hrastinski, S. (2022). "Asynchronous and Synchronous E-Learning." Educause Review.
Pardo, A., & Siemens, G. (2021). "Ethical and Privacy Issues in Learning Analytics." British Journal of Educational Technology.
Zawacki-Richter, O., et al. (2023). "Systematic Reviews in Health Education and E-Learning." Springer.
Published
Issue
Section
License
Copyright (c) 2026 CyTEd: Journal of Cyber Learning, Teknolinguistics and Educational Games

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
CC Attribution-NonCommercial-ShareAlike 4.0 (CC BY-NC-SA 4.0)
By submitting their work, Authors agree to license it under the CC BY-NC-SA 4.0 International License.
1. User Permissions
Readers are free to Share (copy/redistribute) and Adapt (remix/build upon) the material, provided they follow these conditions:
2. Required Conditions
-
Attribution (BY): Users must credit the original author and source (the journal) and provide a link to the license.
-
NonCommercial (NC): The work may not be used for primary commercial purposes or monetary gain.
-
ShareAlike (SA): Any derivative work created must be distributed under the same CC BY-NC-SA 4.0 license.
3. Copyright and Publishing
-
Copyright: Remains with the Author(s).
-
Journal Right: The Journal is granted the First Non-Exclusive Publishing Right under the CC BY-NC-SA 4.0 license.
-
Self-Archiving: Authors may re-use or deposit the final published version elsewhere, provided they maintain the original license and link back to the journal.



