Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Cloud Computing Security Challenges in Higher Educational Institutions - A Survey

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Khalil H. A. Al-Shqeerat, Faiz M. A. Al-Shrouf, Mohammad R. Hassan, Hassen Fajraoui

Khalil H A Al-Shqeerat, Faiz M A Al-Shrouf, Mohammad R Hassan and Hassen Fajraoui. Cloud Computing Security Challenges in Higher Educational Institutions - A Survey. International Journal of Computer Applications 161(6):22-29, March 2017. BibTeX

	author = {Khalil H. A. Al-Shqeerat and Faiz M. A. Al-Shrouf and Mohammad R. Hassan and Hassen Fajraoui},
	title = {Cloud Computing Security Challenges in Higher Educational Institutions - A Survey},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {6},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {22-29},
	numpages = {8},
	url = {},
	doi = {10.5120/ijca2017913217},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Cloud computing brings for higher educational institution a wide range of benefits with new capabilities to incorporate in the educational process. However, the cloud services are vulnerable to a variety of security challenges.

One of the key challenges that educational institutions face in adopting cloud computing technologies is a provisioning of a secure cloud infrastructure.

In this paper, the authors discover some cloud benefits in the education sector and discuss limitations of main cloud services as well as highlight security challenges that institutions face when utilizing cloud technologies.

The survey was conducted in variety educational institutions to study the views of stakeholders on the cloud security vulnerabilities and approaches used to overcome.

Finally, this paper provides baseline recommendations to avoid security risks efficiently when adopting cloud computing in institutions of higher education.


  1. Khalil H. A. Al-Shqeerat, Mohammad Ali A. Hammoudeh, Mohammad Ijaz Abbasi. (2016). Design and Analysis of an Effective Secure Cloud System at Qassim University. International Journal of Computer Science and Information Security (IJCSIS). 14 (8), August 2016, pp.
  2. R. Velumadhava Raoa, K. Selvamanib. (2015). Data Security Challenges and Its Solutions in Cloud Computing, in Proc. International Conference on Intelligent Computing, Communication & Convergence (ICCC), Bhubaneswar, Odisha, India, 2015, pp. 204-209.
  3. Mell, P and Grance, T. (2011). The NIST Definition of Cloud Computing. NIST, USA. Available:
  4. Kiran Yadav. (2014). Role of Cloud Computing in Education. International Journal of Innovative Research in Computer and Communication Engineering. 2 (2), pp. 3108-3112.
  5. Niall Sclater. (2010). Cloud Computing in Education. Published by the UNESCO Institute for Information Technologies in Education. Available:
  6. Atif Ishaq, M.N. Brohi. (2015). Literature Review of Cloud Computing in Education Sector: A survey with respect to Qatar. International Journal of Computer Applications. 132 (17), pp. 9-14.
  7. Poonam R.Maskare, Sarika R. Sulke. (2014). Review Paper on E-learning Using Cloud Computing. International Journal of Computer Science and Mobile Computing. 3 (5), pp. 1281-1287.
  8. Algirdas A, Jean-Claude L, Brian R, Carl L. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing. 1(1), pp. 11-33.
  9. A.M.Mansuri, Manish Verma, Pradeep Laxkar. (2014). Benefit of Cloud Computing for Educational Institutions and Online Marketing. Information Security and Computer Fraud. 2(1), pp. 5-9.
  10. Amjad Mehmood, Muhammad Roman, M. Munir Umar, Houbing Song. (2015). Cloud Computing Security: A Survey. International Journal of Computer Science and Information Security. 13(7), pp. 20-28.
  11. Dimitrios Zissis, Dimitrios Lekkas. (2010). Addressing cloud computing security issues. Future Generation Computer Systems. 28 (2012) pp. 583–592.
  12. Harshit Srivastava, Sathish Alampalayam Kumar. (2015). Control Framework for Secure Cloud Computing. Journal of Information Security. 6, pp. 12-23.
  13. Devki Gaurav Pal, Ravi Krishna, Prashant Srivastava, Sushil Kumar, Monark Bag, Vrijendra Singh. (2012). A Novel Open Security Framework for Cloud Computing. International Journal of Cloud Computing and Services Science. 1(2), pp. 45-52.
  14. Yaser Ghanam, Jennifer Ferreira, Frank Maurer. (2012). Emerging Issues & Challenges in Cloud Computing - A Hybrid Approach. Journal of Software Engineering and Applications. 5, pp. 923-937.
  15. Abdulrahman Alharthi, Fara Yahya, Robert J Walters and Gary B Wills. (2015). An Overview of Cloud Services Adoption Challenges in Higher Education Institutions. In proc. Emerging Software as a Service and Analytics, (ESaaSA 2015), Lisbon, 2015, pp. 102-109.
  16. D. Sudha Devi, L.Yamuna Devi, K.Thilagavathy, P.Aruna, N.Priya, S. Vasantha. (2013). Private Cloud in Educational Institutions: An Implementation using UEC. International Journal of Computer Applications. 78(1), pp. 8-12.
  17. Karl van der Schyff, Kirstin E.M. Krauss. (2014). Higher education cloud computing in South Africa: Towards understanding trust and adoption issues. South African Computer Journal. 55, pp. 40-55.
  18. E. Krelja Kurelović, S. Rako, J. Tomljanović. Cloud Computing in Education and Student's Needs. In proc. 36th International Convention on Information & Communication Technology Electronics & Microelectronics (MIPRO), Opatija, Croatia, 2013, pp. 726-731.
  19. AlAlaa N. Tashkandi, Ibrahim M. Al-Jabri. (2015). Cloud computing adoption by higher education institutions in Saudi Arabia: an exploratory study. Cluster Computing.18(4), pp 1527–1537.
  20. Hongyu Pei Breivold and Ivica Crnkovic. Cloud Computing Education Strategies. In Proc. IEEE 27th Conference on Software Engineering Education and Training (CSEE&T), 2014, pp. 29-38.
  21. Ying Xie, Ken Hoganson. Computing Education on Cloud. In Proc. The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. Las Vegas, 2013, pp. 479-482.
  22. Mahmoud Odeh, Kevin Warwick, Alexeis Garcia-Perez. (2015). The Impacts of Cloud Computing Adoption at Higher Education Institutions: A SWOT Analysis. International Journal of Computer Applications. 127(4), pp. 15-21.
  23. Vaishali H Pardeshi. Cloud Computing for Higher Education Institutes: Architecture, Strategy and Recommendations for Effective Adaptation. In Proc. Symbiosis Institute of Management Studies Annual Research Conference (SIMSARC13). India 2013, pp. 589-599.
  24. S. Subashini, V.Kavitha. (2011). A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications. 34, pp. 1-11.
  25. Rajarshi Roy Chowdhury. (2014). Security in Cloud Computing. International Journal of Computer Applications. 96(15), pp. 24-30.
  26. Chetan M Bulla1, Satish S Bhojannavar, Vishal M Danawade. (2013). Cloud Computing: Research Activities and Challenges. International Journal of Emerging Trends & Technology in Computer Science. 2(5), pp. 206-214.
  27. Wesam Dawoud, Ibrahim Takouna, Christoph Meinel. Infrastructure as a Service Security: Challenges and Solutions. In Proc. The 7th International Conference on Informatics and Systems (INFOS), 2010, pp. 1-8.
  28. Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem. (2014). Cloud Computing Security: A Survey. Computers. 3, pp. 1-35.
  29. Mariana Carroll, Alta van der Merwe, Paula Kotzé. Secure Cloud Computing Benefits, Risks and Controls. In Proc. Information Security for South Africa. 2011, pp. 1-9.
  30. Sarang V. Hatwar, R. K. Chavan. (2015). Cloud Computing Security Aspects, Vulnerabilities and Countermeasures. International Journal of Computer Applications. 119(17), pp. 46-53.
  31. Xiangyang Luo, Lin Yang, Linru Ma, Shanming Chu, Hao Dai. Virtualization Security Risks and Solutions of Cloud Computing via Divide-Conquer Strategy. In Proc. Third International Conference on Multimedia Information Networking and Security. 2011, pp. 637-641.
  32. Lee Garber. (2012). The Challenges of Securing the Virtualized Environment. Computer. 45(1), pp. 17-20.
  33. Ahmed Albugmi, Madini O. Alassafi, Robert Walters, Gary Wills. Data Security in Cloud Computing. In Proc. Fifth International Conference on Future Generation Communication Technologies (FGCT). 2016, pp. 55-59.


Cloud Services, Deployment models, Benefits, Challenges, Risks