CFP last date
15 October 2024
Call for Paper
November Edition
IJAIS solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 15 October 2024

Submit your paper
Know more
Reseach Article

Using Cloud Computing in Higher Education: A Strategy to Address Trust Issues in Adoption of Cloud Services in Kenyan Public and Private Universities

by Daniel O. Onyango, Elijah I. Omwenga
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 7
Year of Publication: 2016
Authors: Daniel O. Onyango, Elijah I. Omwenga
10.5120/ijais2016451630

Daniel O. Onyango, Elijah I. Omwenga . Using Cloud Computing in Higher Education: A Strategy to Address Trust Issues in Adoption of Cloud Services in Kenyan Public and Private Universities. International Journal of Applied Information Systems. 11, 7 ( Dec 2016), 46-53. DOI=10.5120/ijais2016451630

@article{ 10.5120/ijais2016451630,
author = { Daniel O. Onyango, Elijah I. Omwenga },
title = { Using Cloud Computing in Higher Education: A Strategy to Address Trust Issues in Adoption of Cloud Services in Kenyan Public and Private Universities },
journal = { International Journal of Applied Information Systems },
issue_date = { Dec 2016 },
volume = { 11 },
number = { 7 },
month = { Dec },
year = { 2016 },
issn = { 2249-0868 },
pages = { 46-53 },
numpages = {9},
url = { https://www.ijais.org/archives/volume11/number7/955-2016451630/ },
doi = { 10.5120/ijais2016451630 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:04:30.916026+05:30
%A Daniel O. Onyango
%A Elijah I. Omwenga
%T Using Cloud Computing in Higher Education: A Strategy to Address Trust Issues in Adoption of Cloud Services in Kenyan Public and Private Universities
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 11
%N 7
%P 46-53
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is fast gaining significant ground as a solution to offer institutions with competitive advantage compared to the old traditional IT. Nevertheless, many institutions are still clenched to the traditional IT where legacy IT systems or applications are hosted in-house and hence administration of the systems or services is local or on premise. This has resulted in high IT expenditures on both hardware and software due to increased storage demands as well as investing on high skilled resources to administer the existing systems or applications which might not be viable in the long run. Despite the potential benefits that is associated with cloud computing which includes reduction of total costs of acquisition or ownership (TCO) of hardware, software and skilled resources, adoption level of cloud services is still very low in higher institutions of learning due to matters security especially trust issue which remains a major concern over cloud solutions. A case study was carried out in selected public and private universities to determine the reason for the low cloud uptake by the key stakeholders in higher institution of learning. An adoption strategy was recommended with reference to the resources, confidentiality, integrity and availability. The focus was on how key stakeholders view cloud services in the context of unique operational efficiency.

References
  1. Pearson, S & Benameur, A 2010, Privacy, Security and Trust issues arising from cloud computing, 2nd IEEE international conference on Cloud Computing Technology and Science.
  2. Mell, P. & Grance, T. (2011). The NIST definition of cloud computing. NIST Special Publication 800-145, September 2011.
  3. Armbrust, M. Fox, A, Griffith, R. Joseph, D. A. Katz, R. Konwinski, (2009) A. Above the clouds: A Berkeley View of cloud computing.
  4. B. P. Rimal, E. Choi, and I. Lumb, “A taxonomy and survey of cloud computing systems,” in Proceedings of 5th International Joint Conference on INC, IMS and IDC (NCM'09), Seoul, Korea, 2009, pp. 44-51.
  5. http://cloudtweaks.com/2012/09/effective-ways-cloud-computing-can-contribute-to-education-success/
  6. Agarwal, A. and Agarwal, A. (2011). The Security Risks Associated with Cloud Computing. International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS), 257-259
  7. G. Reese, Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, in: Theory in Practice, O’Reilly Media, 2009.
  8. Pathan A.-S.K., Mohammed M.M.Z.E, (2015) “Building Customer Trust in Cloud Computing with ICT-Enabled Regulatory Body”.
  9. Cloud Security Alliance, (2011). “Security Guidance for Critical Areas of Focus in Cloud ComputingV3.0”.http://www.cloudsecurityalliance.org/guidance /csaguide V3.0.pdf
  10. Durani, H & Bhatt, N (2015), “Cloud Computing in Higher Education: Gujarat State
  11. Bisong, A. and Rahman, S.S.M. (2011). An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, 3(1), 30-45.doi:10.5121/ijnsa.2011.3103
  12. Hashizume et al. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), 1-13.
  13. Khan, M & Malluhi, Q, 2010, Establishing trust in cloud computing, IT Professional Magazine, 12(5), 20-27.
  14. Teneyuca, D. (2011). Internet cloud security: The illusion of inclusion. Information Security Technical Report, 16, 102-107. doi:10.1016/j.istr. 2011.08.005.
  15. Awadallah, N (2015), “Security threats of cloud computing.” Available at: http://www.ijritcc.org/download/1431252391.pdf
  16. Khorshed, T.M., Ali, A.B.M.S. and Wasimi, S.A. (2012). A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Computer Systems, 28, 833–851. doi:10.1016/j.future.2012.01.006
  17. Cartes Secure Connexions, Cloud computing press release October, 2014; “Towards Secure Cloud Use.”
  18. Abbadi, I.M. and Martin, A. (2011). Trust in the Cloud. Information Security Technical Report, 16, 108-114.doi:10.1016/j.istr.2011.08.006
  19. Ryan, P. and Falvey, S. (2012). Trust in the clouds. Computer Law and Security Reviews, 28, 513-521. http://dx.doi.org/10.1016/j.clsr.2012.07.002
  20. Roberts, J & Al-Hamdani, W 2011, “Who CanYou Trust in the Cloud? A Review of Security Issues within Cloud Computing”, Information Security Curriculum Development Conference 2011, ACM, 15-19.
  21. Sun, D, Chang, G, Sun, L, & Wang, X, 2011, Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments, Procedia Engineering, 15, 2852-2856, 2011.
  22. Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou “Security and Privacy in Cloud Computing: A Survey” in IEEE 2010.
  23. W. J. Brown, V. Anderson, and Q. Tan, “Multitenancy-security risks and countermeasures,” in Proceedings of 2012 15th International Conference on Network-Based Information Systems (NBiS), Melbourne, Australia, 2012, pp. 7-13
  24. N Vijaykumar, “Role of ICT in e-governance: Impact of Cloud Computing in Driving New initiatives”, SETLABS Briefings, Vol9 No2, 2011
  25. Grossman, R.L. (2009). The Case for Cloud Computing. IT Professional [Electronic], 11(2), pp.23–27. Available: IEEEXplore/doi:10.1109/MITP.2009.40, [3 Feb 2016
  26. Cisco (2011) white paper: Cloud Computing Advantages in the Public Sector.
  27. Shelton, T 2013, Business models for the social mobile cloud, John Wiley & Sons.
  28. Anuradha, T and Janaka, I.W. (2014). Security Challenges of Cloud Computing
  29. YOO, C. S. (2011): "Cloud computing: Architectural and policy implications", Review of Industrial Organization, vol. 38: 405-421.
  30. Weinman, J 2012, Cloudonomics: The business value of cloud computing. New York: John Wiley & Sons.
  31. https://cloudsecurityalliance.org/group/ cloudtrust/Strategy&, Formerly Booz & Company; Cloud computing, "An information security perspective."
  32. Murdoch, N. (2010): "The White Choice: Should you Head into the Cloud?" Proctor 24: 24.
  33. Schyff, K & Krauss, 2014, Higher education cloud computing in South Africa: Towards understanding trust and adoption issues, SACJ, 55, 40-54
  34. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A. (2011). Cloud computing - The business perspective. Decision Support Systems, 51, 176–189. doi:10.1016/j.dss. 2010.12.006
  35. R.C. Mayer, J.H. Davis, and F.D. Schoorman, “An Integrative Model of Organizational Trust,” Academy of Management Review, Vol. 20, 1995, p. 709-734.
  36. Huang and Nicol, Journal of Cloud Computing: Advances, Systems and Applications 2013, 2:9.
  37. Creswell, J, & Clark, V 2007, Designing and conducting mixed methods research. Thousand Oaks: Sage Publications.
  38. Mugenda, O. M. and Mugenda, A. G. (2003). Research methods: quantitative and qualitative approaches. Nairobi. Acts press.
  39. Mugenda, O. M. and Mugenda, A. G. (2008). Research methods: quantitative and qualitative approaches. Nairobi. Acts press
  40. Wiehe, Bryman, Awino (2011). Business research methods. Third edition Oxford: Oxford University Press.
  41. Mircea, M. & Andreescu, A. J. (2011). “Using Cloud Computing in Higher Education: A strategy to improve agility in the current financial crisis”, Academy of Economic Studies, Bucharest, Romania.
  42. Wang, C.; Ren, K.; Lou, W. & Li, J. (2010): Toward publicly auditable secure cloud data storage services. Network, IEEE, vol. 24, 19-24.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Traditional IT Trust Higher Education Operational Efficiency Adoption Strategy