International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 161 - Issue 6 |
Published: Mar 2017 |
Authors: Khalil H. A. Al-Shqeerat, Faiz M. A. Al-Shrouf, Mohammad R. Hassan, Hassen Fajraoui |
![]() |
Khalil H. A. Al-Shqeerat, Faiz M. A. Al-Shrouf, Mohammad R. Hassan, Hassen Fajraoui . Cloud Computing Security Challenges in Higher Educational Institutions - A Survey. International Journal of Computer Applications. 161, 6 (Mar 2017), 22-29. DOI=10.5120/ijca2017913217
@article{ 10.5120/ijca2017913217, author = { Khalil H. A. Al-Shqeerat,Faiz M. A. Al-Shrouf,Mohammad R. Hassan,Hassen Fajraoui }, title = { Cloud Computing Security Challenges in Higher Educational Institutions - A Survey }, journal = { International Journal of Computer Applications }, year = { 2017 }, volume = { 161 }, number = { 6 }, pages = { 22-29 }, doi = { 10.5120/ijca2017913217 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A Khalil H. A. Al-Shqeerat %A Faiz M. A. Al-Shrouf %A Mohammad R. Hassan %A Hassen Fajraoui %T Cloud Computing Security Challenges in Higher Educational Institutions - A Survey%T %J International Journal of Computer Applications %V 161 %N 6 %P 22-29 %R 10.5120/ijca2017913217 %I Foundation of Computer Science (FCS), NY, USA
Cloud computing brings for higher educational institution a wide range of benefits with new capabilities to incorporate in the educational process. However, the cloud services are vulnerable to a variety of security challenges. One of the key challenges that educational institutions face in adopting cloud computing technologies is a provisioning of a secure cloud infrastructure. In this paper, the authors discover some cloud benefits in the education sector and discuss limitations of main cloud services as well as highlight security challenges that institutions face when utilizing cloud technologies. The survey was conducted in variety educational institutions to study the views of stakeholders on the cloud security vulnerabilities and approaches used to overcome. Finally, this paper provides baseline recommendations to avoid security risks efficiently when adopting cloud computing in institutions of higher education.