Skip to main content

Head in the Clouds: Some of the Possible Issues with Cloud Computing in Education

  • Chapter
  • First Online:
Frontiers of Cyberlearning

Abstract

Not all that glitters is gold, not all who wander are lost, and equally as true, cloud computing is not the ultimate solution to educational computing problems. Although the possibility of utilizing cloud computing can appear to be a heaven-sent solution for educational applications, a more down to earth review of the possible drawbacks and limitations needs to be conducted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

  • Bhukya, S., Pabboju, S., & Sharma, K. V. (2016). Data security in cloud computing and outsourced databases. Paper presented at the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

    Google Scholar 

  • Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. Paper presented at the International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012.

    Google Scholar 

  • Chihi, H., Chainbi, W., & Ghdira, K. (2015). Cloud computing architecture and migration strategy for universities and higher education. Paper presented at the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

    Google Scholar 

  • Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.

    Article  Google Scholar 

  • DLA-Paper. (2017). Compare data protection laws around the world. Retrieved May 30, 2017, from https://www.dlapiperdataprotection.com/index.html.

  • González-Martínez, J. A., Bote-Lorenzo, M. L., Gómez-Sánchez, E., & Cano-Parra, R. (2015). Cloud computing and education: A state-of-the-art survey. Computers & Education, 80, 132–151.

    Article  Google Scholar 

  • Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.

    Article  Google Scholar 

  • Jaber, A. N., & Zolkipli, M. F. B. (2013). Use of cryptography in cloud computing. Paper presented at the 2013 IEEE International Conference on Control System, Computing and Engineering (ICCSCE).

    Google Scholar 

  • Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology & Politics, 5(3), 269–283.

    Article  Google Scholar 

  • Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud computing. Paper presented at the IEEE International Conference on Cloud Computing, CLOUD’09, 2009.

    Google Scholar 

  • Littman-Quinn, R., Chandra, A., Schwartz, A., Fadlelmola, F. M., Ghose, S., Luberti, A. A., … Steenhoff, A. (2011). mHealth applications for telemedicine and public health intervention in Botswana. Paper presented at the IST-Africa Conference Proceedings, 2011.

    Google Scholar 

  • Maghrabi, L. A. (2014). The threats of data security over the cloud as perceived by experts and university students. Paper presented at the 2014 World Symposium on Computer Applications & Research (WSCAR).

    Google Scholar 

  • Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36–39.

    Google Scholar 

  • Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: Taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369–392.

    Article  Google Scholar 

  • Shabut, A. M., Lwin, K., & Hossain, M. (2016). Cyber attacks, countermeasures, and protection schemes—A state of the art survey. Paper presented at the 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA).

    Google Scholar 

  • Å vehla, Z. L., Sedinić, I., & Pauk, L. (2016). Going white hat: Security check by hacking employees using social engineering techniques. Paper presented at the 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

    Google Scholar 

  • Weins, K. (2017, February 15). Cloud computing trends: 2017 State of the cloud survey from http://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2017-state-cloud-survey.

  • Where in the World May Personal Information Be Stored? (2015). Retrieved from CoreHealth Technologies website: https://corehealth.global/docs/default-source/default-document-library/corehealthwhitepaper-whereintheworldmaypersonalinfobestored.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard A. W. Tortorella .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tortorella, R.A.W., Kinshuk, Chen, NS. (2018). Head in the Clouds: Some of the Possible Issues with Cloud Computing in Education. In: Spector, J., et al. Frontiers of Cyberlearning. Lecture Notes in Educational Technology. Springer, Singapore. https://doi.org/10.1007/978-981-13-0650-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0650-1_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0649-5

  • Online ISBN: 978-981-13-0650-1

  • eBook Packages: EducationEducation (R0)

Publish with us

Policies and ethics