Abstract
Not all that glitters is gold, not all who wander are lost, and equally as true, cloud computing is not the ultimate solution to educational computing problems. Although the possibility of utilizing cloud computing can appear to be a heaven-sent solution for educational applications, a more down to earth review of the possible drawbacks and limitations needs to be conducted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Bhukya, S., Pabboju, S., & Sharma, K. V. (2016). Data security in cloud computing and outsourced databases. Paper presented at the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. Paper presented at the International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012.
Chihi, H., Chainbi, W., & Ghdira, K. (2015). Cloud computing architecture and migration strategy for universities and higher education. Paper presented at the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.
DLA-Paper. (2017). Compare data protection laws around the world. Retrieved May 30, 2017, from https://www.dlapiperdataprotection.com/index.html.
González-MartÃnez, J. A., Bote-Lorenzo, M. L., Gómez-Sánchez, E., & Cano-Parra, R. (2015). Cloud computing and education: A state-of-the-art survey. Computers & Education, 80, 132–151.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Jaber, A. N., & Zolkipli, M. F. B. (2013). Use of cryptography in cloud computing. Paper presented at the 2013 IEEE International Conference on Control System, Computing and Engineering (ICCSCE).
Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology & Politics, 5(3), 269–283.
Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud computing. Paper presented at the IEEE International Conference on Cloud Computing, CLOUD’09, 2009.
Littman-Quinn, R., Chandra, A., Schwartz, A., Fadlelmola, F. M., Ghose, S., Luberti, A. A., … Steenhoff, A. (2011). mHealth applications for telemedicine and public health intervention in Botswana. Paper presented at the IST-Africa Conference Proceedings, 2011.
Maghrabi, L. A. (2014). The threats of data security over the cloud as perceived by experts and university students. Paper presented at the 2014 World Symposium on Computer Applications & Research (WSCAR).
Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36–39.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: Taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369–392.
Shabut, A. M., Lwin, K., & Hossain, M. (2016). Cyber attacks, countermeasures, and protection schemes—A state of the art survey. Paper presented at the 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA).
Švehla, Z. L., Sedinić, I., & Pauk, L. (2016). Going white hat: Security check by hacking employees using social engineering techniques. Paper presented at the 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
Weins, K. (2017, February 15). Cloud computing trends: 2017 State of the cloud survey from http://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2017-state-cloud-survey.
Where in the World May Personal Information Be Stored? (2015). Retrieved from CoreHealth Technologies website: https://corehealth.global/docs/default-source/default-document-library/corehealthwhitepaper-whereintheworldmaypersonalinfobestored.pdf.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Tortorella, R.A.W., Kinshuk, Chen, NS. (2018). Head in the Clouds: Some of the Possible Issues with Cloud Computing in Education. In: Spector, J., et al. Frontiers of Cyberlearning. Lecture Notes in Educational Technology. Springer, Singapore. https://doi.org/10.1007/978-981-13-0650-1_13
Download citation
DOI: https://doi.org/10.1007/978-981-13-0650-1_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0649-5
Online ISBN: 978-981-13-0650-1
eBook Packages: EducationEducation (R0)