Student Privacy and Cloud Computing at the District Level: Next Steps and Key Issues

2014 ◽  
Author(s):  
Alicia Solow-Niederman ◽  
Leah Plunkett ◽  
Urs Gasser
Author(s):  
Darshan M. Tank

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. Mobile Cloud Computing (MCC) integrates mobile computing and cloud computing aiming to extend mobile devices capabilities. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. There is huge market for mobile based e-Commerce applications across the globe. Security and privacy are the key issues for mobile cloud computing applications. The limited processing power and memory of a mobile device dependent on inherently unreliable wireless channel for communication and battery for power leaves little scope for a reliable security layer. Thus there is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices. The security and privacy protection services can be achieved with the help of secure mobile-cloud application services.


2017 ◽  
Vol 121 ◽  
pp. 115-122 ◽  
Author(s):  
Teófilo Branco ◽  
Filipe de Sá-Soares ◽  
Alfonso Lopez Rivero
Keyword(s):  

Author(s):  
S. Suganya ◽  
Mrs. U. Hemamalini

Cloud computing has received increasing interest from enterprises since its inception. With its innovative information technology (IT) services delivery model, cloud computing could add technical and strategic business value to enterprises. However, cloud computing poses highly concerning internal (e.g., Top management and experience) and external issues (e.g., regulations and standards). This paper presents a systematic literature review to explore the current key issues related to cloud computing adoption. This is achieved by reviewing 15 articles published about cloud computing adoption. Using the grounded theory approach, articles are classified into eight main categories: internal, external, evaluation, proof of concept, adoption decision, implementation and integration, IT governance, and confirmation. Then, the eight categories are divided into two abstract categories: cloud computing adoption factors and processes, where the former affects the latter. The results of this review indicate that enterprises face serious issues before they decide to adopt cloud computing. Based on the findings, the paper provides a future information system (research agenda to explore the previously under-investigated areas regarding cloud computing adoption factors and processes. This paper calls for further theoretical, methodological, and empirical contributions to the research area of cloud computing adoption by enterprise.


2016 ◽  
pp. 79-99
Author(s):  
Darshan M. Tank

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. Mobile Cloud Computing (MCC) integrates mobile computing and cloud computing aiming to extend mobile devices capabilities. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. There is huge market for mobile based e-Commerce applications across the globe. Security and privacy are the key issues for mobile cloud computing applications. The limited processing power and memory of a mobile device dependent on inherently unreliable wireless channel for communication and battery for power leaves little scope for a reliable security layer. Thus there is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices. The security and privacy protection services can be achieved with the help of secure mobile-cloud application services.


Author(s):  
Niall Sclater

The procurement of cloud computing services involves a wide range of issues and risks for educational institutions. The technologies and services available are rapidly evolving, differ greatly between providers, and are subject to complex contractual arrangements with potentially serious legal and business implications. There is no specific cloud computing legislation, but the area is subject to a wide and growing range of laws relating to Internet-based services, some written decades ago (Baker, 2009). Resolution of the new issues relating to security, privacy, and regulation in the cloud will take many years (Kaufman, 2009). This chapter outlines the key issues institutions need to investigate when considering the deployment of services in the cloud to students, faculty, and staff.


Author(s):  
S. Swetha ◽  
Dr. V. Divya

Cloud computing have high interest from companies .since ,its inception With its services delivery model, cloud computing add technical and strategic business value to companies. This paper presents a systematic literature review to explore the current key issues related to cloud computing adoption.


Author(s):  
Steven C. White ◽  
Sahra Sedigh ◽  
Ali R. Hurson

Computer security is a complex undertaking within the traditional client-server architecture. As services and data are moved to the Cloud, security requirements change and become even more complex. Existing client-server security practices can be extended to address challenges specific to the Cloud environment. In this chapter, a contrast is made between traditional client-server environment with a Cloud environment - in terms of security challenges and solutions. In addition to enumerating and contrasting traditional challenges and solutions, the authors describe security challenges and solutions particular to the Cloud computing environment. The chapter describes, in terms of the pillars of security, key issues that should be addressed by an organization as it migrates to Cloud environments and propose solutions to these issues.


Author(s):  
Dapeng Wang ◽  
Jinsong Wu

This chapter discusses and surveys the concepts, demands, requirements, solutions, opportunities, challenges, and future perspectives and potential of Carrier Grade Cloud Computing (CGCC). This chapter also introduces a carrier grade distributed cloud computing architecture and discusses the benefits and advantages of carrier grade distributed cloud computing. Unlike independent cloud service providers, telecommunication operators may integrate their conventional communications networking capabilities with the new cloud infrastructure services to provide inexpensive and high quality cloud services together with their deep understandings of, and strong relationships with, individual and enterprise customers. The relevant design requirements and challenges may include the performance, scalability, service-level agreement management, security, network optimization, and unified management. The relevant key issues in CGCC designs may include cost effective hardware and software configurations, distributed infrastructure deployment models, and operation processes.


Sign in / Sign up

Export Citation Format

Share Document