scholarly journals Use of Cloud Computing In Higher Education of Pakistan

Cloud computing is an internet-based service of delivering technology to users and an important technological facility where mutual resources are delivered on demand. Usage of cloud computing in educational Institutions provides students as well as administrative staff an opportunity to access various applications and knowledge swiftly. Its simplicity, upfront-cost, reduced downtime and less management effort make this service acceptable for all fragments of society particularly students and teachers. Despite the fact that the cloud computing technology is very useful, such as ease of access, cost effective. It has various issues like security violations, data confidentiality, data integrity, regional and geographical restrictions over the data. Safe cloud services are required to protect its users from different external threats such as disclosure or loss of data and compromising of users’ accounts. Users’ understanding about the cloud computing’s advantages, disadvantages and security issues can protect them from potential threats while ensuring its optimal usage in education. In this paper, a survey has been conducted to identify students understanding about the advantages, disadvantages and security issues regarding cloud computing in the educational sector. A sample of 212 respondents from graduate and undergraduate programs was taken to obtain required information. The findings reveal a lack of awareness about the use of cloud computing, its benefits, and security concerns and the implications of this deficiency are critical as multiple issues like outflow of personal data and its loss is faced by its users which may have adverse social, emotional and professional effects on student’s life. Considering the usefulness as well as the sensitivity of cloud computing in educational institutions, Authors propose maximum utilization of cloud computing in educational sector while ensuring the security of its users.

Author(s):  
Tetiana Zatonatska ◽  
Oleksandr Dluhopolskyi

The article describes the main characteristics, types and properties of cloud computing. The most widespread cloud technologies in Ukraine are analyzed. It is identified that the largest share among users of cloud technologies in Ukraine currently belong to large holdings, IT companies, commercial enterprises and banks, but other sectors of business are also involved in the development of these services. The aim of the article is to develop the methodology for evaluating the efficiency of cloud technologies implementation at enterprises and its experimental verification. The economic component of the cloud computing implementation at enterprises (expenditures and revenues of both cloud technology owners and users) is considered. The efficiency of using cloud computing at enterprises is proved. It is found that organizations usually do not use the power of their personal data centers to a full extent. This leads to idle equipment, extra cost on maintenance and servicing of hardware, amortization, staff salaries and etc. The feasibility of transition of enterprises to cloud computing in such situations has been proved, which considerably reduce the costs of the enterprise due to the absence of need for hardware and necessary staff to support the operation of information systems. Usability of the methodology of total cost of ownership in evaluating the effectiveness of using services for the enterprise has been proved. The proposed methodology compares the main costs of using personal data centers and the cost of using cloud computing. It is experimentally proven that in most cases, the cost of maintaining personal data center (PDC) is higher than the cost of cloud services. It is also proved that the efficiency of cloud technology operation depends on the internal structure and organization of computing processes inside the systems, as well as on external factors such as the size of enterprises-clients, industries, costs for the organization of data centers, etc. Cloud computing is an advanced technology which has future prospects and is cost-effective for both enterprise users and provider organizations.


Cloud computing is an innovation for dynamic resources to be used over the internet. Though cloud computing is cost effective and easy to use, security is often an area of concern. Sharing of sensitive information and running critical applications on public and/or shared cloud environments require high degree of security. Amount of data stored and processed is increasing enormously requiring cloud environments to resize to larger capacities. Cloud environments have both pros and cons concerning the security of data of the consumers using cloud services. This chapter discusses the main security issues faced by cloud computing environments. The main focus of this chapter is to describe the issues faced during building cross-domain collaborations over the internet and usage of cloud services and its security. This chapter also identifies the security at various levels of cloud computing and, based on cloud architecture, categorizes the security issues.


Author(s):  
SS Chakravarthi ◽  
RJ Kannan

Cloud computing has paved an excellent platform for the emergence of cost-effective technological solutions. However, security and privacy issues still remain as a stringent challenge during service catering. Explicitly, the service utility anomalies are liable to cause severe privacy and security issues in cloud service delivery. So, the overall performance of cloud service consumption and end-user applications’ service levels utility is degraded. The open access and distributed nature of the cloud computing is the major reason for its vulnerability to intruders. The security and privacy in cloud services have many challenges and problems still open for research. This paper proposes an intrusion detection method capable of detecting nine categories of attacks in two stages. This paper focuses on establishing a network-based intrusion detection mechanism using machine learning techniques. A model will be constructed with a supervised learning methodology using historical network flowdata and flowdata collected from the Internet.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Author(s):  
Advokat Lars Perhard

Cloud Sweden is a story about how a group of experienced IT-people from different sectors of the industry came together and discussed a relatively new phenomenon called the Cloud; or what is today labelled as Cloud computing. And they realised there was a tremendous momentum and potential prosperity connected to it. They also concluded that in order to support potential users and to promote Sweden as an IT-oriented country in the forefront of the development there was a need for information – organisations considering migrating their IT functions to the Cloud should at least be able to make an informed decision. There are significant advantages with this new technology, but also a number of pitfalls that any user should be aware of. There were for example critical security issues at hand before when the servers were placed within the four walls of the office and there still are critical security issues relating to the Cloud. However, the issues to solve are different. Cloud Sweden was founded and the different branches of the group have produced a number of documents published on its website. Cloud Sweden has apart from a number of members working actively in the steering and competence groups several thousand members from the industry in a Linkedin network. In this article you will find a sample of what the legal group of Cloud Sweden has produced – a primer of legal issues that a migrant shall pay attention to before the leap into the Cloud. 


Author(s):  
Parkavi R ◽  
Priyanka C ◽  
Sujitha S. ◽  
Sheik Abdullah A

Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry ring words and a major conversation thread in the IT world with an explosive development of the mobile applications and emerging of cloud computing idea, the MCC has become a possible technology for the mobile service users. The concepts of Cloud computing are naturally meshed with mobile devices to allow on-the-go functionalities and benefits. The mobile cloud computing is emerging as one of the most important branches of cloud computing and it is expected to expand the mobile ecosystems. As more mobile devices enter the market and evolve, certainly security issues will grow as well. Also, enormous growth in the variety of devices connected to the Internet will further drive security needs. MCC provides a platform where mobile users make use of cloud services on mobile devices. The use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing environment.


Author(s):  
Shailendra Singh ◽  
Sunita Gond

As this is the age of technology and every day we are receiving the news about growing popularity of internet and its applications. Cloud computing is an emerging paradigm of today that is rapidly accepted by the industry/organizations/educational institutions etc. for various applications and purpose. As computing is related to distributed and parallel computing which are from a very long time in the market, but today is the world of cloud computing that reduces the cost of computing by focusing on personal computing to data center computing. Cloud computing architecture and standard provide a unique way for delivering computation services to cloud users. It is having a simple API (Application Platform Interface) to users for accessing storage, platform and hardware by paying-as-per-use basis. Services provided by cloud computing is as same as other utility oriented services like electricity bill, water, telephone etc. over shared network. There are many cloud services providers in the market for providing services like Google, Microsoft, Manjrasoft Aneka, etc.


Author(s):  
Ihssan Alkadi

There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to moving services to external clouds (Public). With cloud computing, data are stored and delivered across the Internet. The owner of the data does not have control or even know where their data are being stored. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Unfortunately, to develop a security algorithm that outlines and maps out the enforcement of a security policy and procedure can be a daunting task. A good security algorithm presents a strategy to counter the vulnerabilities in a cloud system. This chapter covers the complete overview, comparative analysis of security methods in Cloud Applications in STEM Education and the introduction of a new methodology that will enforce cloud computing security against breaches and intrusions. Much light will be shed on existing methodologies of security on servers used for cloud applications in STEM education and storage of data, and several methods will be presented in addition to the newly developed method of security in cloud-based servers, such as the MIST (Alkadi). Not only can cloud networks be used to gather sensitive information on multiple platforms, also there are needs to prevent common attacks through weak password recovery, retrieval, authentication, and hardening systems; otherwise hackers will spread cyber mayhem. Discussion of current security issues and algorithms in a real world will be presented. Different technologies are being created and in constant competition to meet the demands of users who are generally “busy”. The selling point of these technologies is the ability to address these demands without adding more to any workloads. One of the demands often discussed is that users want to have their digital information accessible from anywhere at any time. This information includes documents, audio libraries, and more. Users also demand the ability to manage, edit and update this information regardless of physical location. Somewhat recently, mobile devices such as laptops, tablets, and smartphones have provided these abilities. This is no small feat as vendors and providers have reduced the size of these devices to increase mobility. However, as the amount of personal information that users are wanting to access has grown exponentially, manipulation and storage of it require more capable devices. To meet increased demands, increasing the capabilities of mobile devices may be impractical. Making mobile devices more powerful without technological advancement would require that the device be larger and use more resources such as battery life and processing power to function properly. Storing all of a user's information on a mobile device that travels everywhere also adds vulnerability risks. The best technical solution to having a user's information accessible is some sort of online storage where there is the convenience to store, manipulate and retrieve data. This is one of the most practical applications for the concept of cloud computing in STEM education. As storage capabilities and Internet bandwidth has increased, so has the amount of personal data that users store online. And today, the average user has billions of bytes of data online. Access is everywhere and whenever is needed. As everyone started doing so, people want their data safe and secure to maintain their privacy. As the user base grew in size, the number of security issues of the personal data started to become increasingly important. As soon as someone's data are in the remote server, unwanted users or “hackers” can have many opportunities to compromise the data. As the online server needs to be up and running all the time, the only way to secure the cloud server is by using better passwords by every user. By the same token, the flaws in the password authentication and protection system can also help unwanted users to get their way to other people's personal data. Thus, the password authentication system should also be free from any loopholes and vulnerabilities.


Author(s):  
Mohammed Banu Ali

Universities worldwide are starting to turn to cloud computing. The quality characteristics, which include access to a wider network of computing resources, pay-as-you-go services, self-services, agile services, and resource centralisation provide a convincing argument for HEIs to adopt cloud services. However, the risks leading to non-adoption range from security issues to a lack of cloud vendor support. The findings suggest that security, privacy, and trust are the key determinants to non-adoption as stakeholders felt that the cloud cannot fully guarantee the safeguarding of sensitive information. Key determinants to cloud adoption include improving relationships between students and teachers via collaborative tools and proposing cloud apps for mobile devices for accessing virtual learning materials and email securely off-campus. In conclusion, university stakeholders are still unconvinced about adopting cloud services, but future advances of the cloud may help to steer their decision to adopt this innovative technology given its overwhelming potential.


Sign in / Sign up

Export Citation Format

Share Document