Professional Documents
Culture Documents
Abstract
In the current financial crisis and being challenged by growing needs, universities are facing
problems in providing necessary information technology (IT) support for educational, research and
development activities. The objective of this paper is to find alternatives to the use of IT, while
leading universities to improve agility and obtain savings. The research methodology consisted in a
rigorous analysis of the latest research on Cloud Computing as an alternative to IT provision,
management and security. It also took into account the best practices for Cloud Computing usage
within universities, plus the authors’ experience in IT and higher education. The article begins with
a brief introduction to Cloud Computing in universities, referring to the most important results
obtained so far. Further, a starting point for universities to use Cloud Computing is provided, by
proposing an adoption strategy. The strategy includes five stages, with emphasis on the evaluation
of data and processes/functions/applications from several major universities based on some key
criteria, while creating a correspondence between these aspects and the
models/services/applications that exist on the Cloud market. The results obtained are encouraging
and support the use of Cloud solutions in universities by improving knowledge in this field and
providing a practical guide adaptable to the university’s structure. In order to be applicable in
practice, the proposed model takes into account the university’s architecture and criteria such as
mission, availability and importance of applications and also the data’s mission, sensitivity,
confidentiality, integrity and availability.
Copyright © 2011 Marinela Mircea and Anca Ioana Andreescu. This is an open access article distributed under
the Creative Commons Attribution License unported 3.0, which permits unrestricted use, distribution, and
reproduction in any medium, provided that original work is properly cited. Contact author: Marinela Mir, e–
mail: mmircea@ase.ro
Communications of the IBIMA 2
Within the present economical context, the the IT leaders from higher education (from
use of Cloud Computing becomes a necessity 302 survey respondents) have considered
and not an option for many universities. This that improving IT services is the most
aspect is due to a multitude of factors such as important decision factor, while only 38%
costs increase, the pressure of income gave the same importance to costs reduction.
increase, students’ success, institutional
performance and competition in Main Benefits, Risks and Limitations
development (Sasikala and Prema, 2010).
Nevertheless, a recent study with respect to The use of Cloud Computing in higher
using Cloud Computing in higher education, education must be analyzed both from the
shows that universities may still be found in benefits point of view, as well as from that of
the phase of ”early adopters” next to other the risks and limitations (table 1). After the
sectors, such as commercial and analysis, one or more models of Cloud
governmental (Katz et al., 2010). The Computing may be chosen to be used. The
significant factors that influence the decision decision must take into account the real
of using Cloud Computing in higher needs and be aligned with the university
education differ a little from other sectors. strategy.
Thus, according to Katz et al (2010), 70% of
Table 1: Main Benefits and Limitations of Using Cloud Computing in Higher Education
Benefits Limitations
Access to applications from anywhere Not all applications run in cloud
Support for teaching and learning Risks related to data protection and security
and accounts management
Software free or pay per use Organizational support
24 hours access to infrastructure and Dissemination politics, intellectual property
content
Opening to business environment and Security and protection of sensitive data
advanced research
Protection of the environment by using Maturity of solutions
green technologies
Increased openness of students to new Lack of confidence
technologies
Increasing functional capabilities Standards adherence
Offline usage with further synchronization Speed/lack of Internet can affect work
opportunities methods
From the specific Cloud Computing types of mask or de-identify of the data;
risks (detailed in Catteddu and Hogben,
2009), we shall emphasize the security and firewalls;
data protection risks. The transfer of the
research results and the knowledge between encryption and key management;
cloud and networks and moving the
knowledge to external providers may federated identity management.
become an attractive target to attackers
(Tout et al., 2009). These aspects, according When choosing the data protection and
to a study conducted by EDUCAUSE based on security solution, the risks and costs on/non
372 member institutions (Goldstein, 2009), implementation must be taken into account,
are considered top barriers. Likewise, as well as the benefits of using the respective
approximately 75% of Chief Information solution. Data encryption is the simplest
Officer and IT specialists consider security as solution of data protection against the
being the number one risk (Jitterbit, 2009). unauthorized access in the cloud
The most important risks regarding security environment. Data may be encrypted at the
are: loss of governance, lock-in, isolation moment of their collection or before their
failure, compliance risks, management transfer in the cloud environment. Still, the
interface compromise, data protection, most adequate solution would be a
insecure or incomplete data deletion, and combination because options and do
malicious insider (Catteddu and Hogben, not address two important challenges
2009). Out of these, the protection of (Luther, 2009): the challenge of knowing
intellectual property and of the data in cloud where all your sensitive data resides and the
represents the main preoccupation of the reality that encrypted data must at some
clients According to Spínola (2009), the point be unencrypted.
protection of intellectual property and of the
data in cloud represents the main As a conclusion of the strong and weak
preoccupation of the clients. aspects of Cloud Computing in universities,
we may say that the payment per use model
With respect to data protection, special and the management policies of risks and
attention must be paid to the sensitive data security represent positive factors in taking
from the institution (for example, research the decision of using Cloud Computing.
results, students’ scholastic records, Moreover, Cloud Computing adds value with
employees’ accounts). The main options that small capital expenses, assuring at the same
may be taken regarding data are: time the protection of the environment. In
the end, universities may value the
- maintain the sensitive data within the opportunities offered by Cloud Computing
institution data centers and externalize the through researchers and students and thus
others with the risk of achieving a high leading to innovation.
latency for many applications and users;
Cloud Architecture for University
- externalize all the data in order to obtain
performance and maximum scalability Thinking, planning, and working in the cloud
with potential security risks. requires universities to cope with specific
challenges of cloud environment (Bristow et
Currently there are many solutions for al., 2010) such as uncertain definitions,
ensuring security and protection of sensitive privacy, contractual and jurisdictional issues,
data in cloud. Out of these, we mention risk and nonperformance, interoperability,
(Luther, 2009; Mcirvine, 2010; SafeNet, network capacity, rearchitecting, staff and
2010): perceptions. Also, the adoption of cloud
5 Communications of the IBIMA
architecture involves overcoming barriers, university CIOs may come to embrace a “get
such as: policy and control issues, new big or get out” ethos. Some will explore
services that will move above campus before becoming centers of excellence (and
older self-operated services, using an providers) for some elements of the IT
“accidental strategy” formed around portfolio, while sourcing other elements
consumer choice (Katz et al., 2009), elsewhere. Smaller IT operations are likely to
organizational culture and regulatory become consumers of cloud services.” The
considerations (Katz et al., 2010). architectural pattern of using Cloud
Computing in universities may be described
The adoption process of cloud architecture starting from the development and supply of
differs depending on the business segments. Cloud Computing services and the resources
According to Katz et al., 2010 “…Research offered to the university (figure 1).
With respect to cloud models, the main example, Panasas private cloud combined
differences between public and private in the with Amazon public cloud storage) as well as
educational environment are presented in community ones (for example Virginia
table 2. Hybrid models are also used (for Virtual Computing Lab).
The community models appeared due to the qualifications, employment rates on various
increase of pressure in the educational activity domains, results obtained by
environment (necessity of drawing up researchers. Creating reports and tendency
reports, monitoring educational, analysis (Mircea et al., 2010) shall lead to
demographic and financial information well-founded decisions with respect to
starting from the moment of registering disciplines included in the curricula,
students and until the end of the educational specialties from the institution level, creating
stage) and also due to the advantages offered and/or canceling some master programs
by collaboration (evaluating success on the based on the identified needs. The next
labor market, emphasizing the educational process illustrates the method in which a
quality, innovation). In some regions or service consumer (the student) may access
countries, information is aggregated in and modify information in a community
centralized recordings about the student’s cloud (figure 2).
Fig 2. Student Adds Information about Their Learning in the Community Cloud
The successful use of Cloud Computing in A Cloud Adoption Strategy for Higher
higher education presupposes the existence Education
of three key elements, namely virtualization,
the intelligence from the network and a Migrating towards cloud needs a well-
robust ecosystem (Bozzelli, 2009). These defined strategy that supports Cloud
offer the basis for obtaining operational Computing capabilities. Representing an
efficiency, security, activity continuance, important part of the organization IT
scalability, interoperability leading in the end strategy (Sheelvant, 2009), migration must
to innovation. In addition, a government be aligned to this. The success of the strategy
involvement in organizing a centralized implementation depends on the existence of
cloud at the level of higher education may a service-oriented architecture at the level of
stabilize the academic field (Sasikala and the institution that offers the necessary
Prema, 2010) and lead to fast results in infrastructure for cloud implementation.
research and innovation. Without SOA and BPM (Business Process
Management), migrating towards cloud has
no sense from the financial point of view
because it leads to high costs with re-
7 Communications of the IBIMA
a) Developing the knowledge base about Cloud progress, costs and benefits of the Cloud
Computing. The first step consists in Computing solution.
developing the knowledge base by
participating at seminaries, conferences, b) Evaluating the present stage of the
discussions with the suppliers and university from the point of view of the IT
consulting the most recent researches in needs, structure and usage. The first step
the field. The success of the phase depends consists in understanding the university IT
on the allocation of sufficient resources for infrastructure. The service oriented
research, for understanding how Cloud architecture represents the base for
Computing functions in different understanding the data, services, processes
organizational structures from universities and applications that may be migrated or
and between institutions (Wyld, 2009), the need to be maintained within the
benefits and risks, policies and the best university, so as to observe the security
usage practices of Cloud Computing. The policy. With respect to the IT needs, their
research is conducted by a team formed structure and usage, the analysis may start
mainly of IT staff who permanently from the categories of users who interact
communicates with the users of the with the present IT infrastructure (figure
solution regarding the objectives, the 4) and their necessities.
Communications of the IBIMA 8
Fig 5. Simplified Structure of the Main Users of IT Services in a Typical University Now Using
the Services of Cloud Computing
Students already use many of the cloud evaluation and management of the results).
technologies in their personal life (Ercan, Researchers will benefit from the advantage
2010). By using a cloud model and of using the latest technologies,
applications based on cloud, they obtain the experimenting the results and
advantage of the ability of working and communication, while paying for using this
communicating in the educational services.
environment without taking into account
space and time. The teaching staff shall Developers may design, build and test
benefit of support in preparing their teaching applications that are executed on the
portfolio (Thomas, 2009) (presentations of infrastructure of the cloud provider and
lessons, conferences, articles, etc.), in deliver those applications directly from the
teaching practice (methods and teaching servers of the provider to the final users
techniques, study materials, feedback) and in (Wyld, 2009). System administrators obtain
evaluating (methods and techniques of general processing, storage, database
9 Communications of the IBIMA
management and other resources and At present, the Cloud Computing market is
applications through the network. The rest of continuously growing (see the existent
the administrative staff will benefit from solutions in Brunette and Mogull, 2009). Out
services and infrastructure 24/24, from of the existent solutions of Cloud Computing,
everywhere at low costs. we enumerate a few of the most used
solutions in universities, grouped according
to the three supply models (figure 6).
c) Experimenting the Cloud Computing 2009). The maintenance of low costs for
solutions. The transition to cloud may be using the solution must be permanently
achieved gradually, starting from testing a taken into account.
pilot project in cloud and then externalizing
the applications chosen for cloud. The first d) Choosing the Cloud Computing solution.
step consists of settling some cloud targets, The first step consists of identifying the data
such as development and environment (figure 7) and applications, functions and
testing or storing some data inside the cloud. main processes within the university. These
The next step may consist of the daily may be grouped according to the three large
processing of the internal operations, categories of activities from the university:
addressing at the same time the components teaching, research and administrative
of public and private cloud in order to assure support for the first two activities.
the security and protection policies (Bozzelli,
Communications of the IBIMA 10
Step two is represented by the evaluation of to determine the candidate elements for
the elements identified in the first step cloud. As exemplification, we present an
according to several criteria, such as mission, evaluation of the main elements within the
importance within the university, sensitivity, university using an evaluation scale from 0 to
confidentiality, integrity, availability, in order 3, with the following meaning: 0 – none, 1-
low, 2 - medium and 3 - high (tables 3 and 4).
Applications shall be grouped and evaluated the university (the educational activity and
starting with the main activities specific to support activities).
11 Communications of the IBIMA
The last step consists of choosing the Cloud that most organizations use hybrid patterns
model (private, public, community, and of Cloud, maintaining key elements from
hybrid) for each of the functions, processes their infrastructure in house, under direct
and applications identified. The main control and externalizing less sensitive
identification criteria of the candidate components, a strategic analysis must be
applications to Cloud are considered the conducted in order to choose the
mission and importance of business practices implementation solution regarding the
(Spínola, 2009) (table 5). Considering the fact decisions of integration/migration.
Based on the observations from tables 3-5 implementing various cloud solutions, we
and the experience of universities in propose the approach depicted in figure 8.
Communications of the IBIMA 12
choosing a cloud model that should take into Ercan, T. (2010). “Effective Use of Cloud
account the special security requirements of Computing in Educational Institutions,”
higher education and the available cloud Procedia Social and Behavioral Sciences, 2,
solutions as well. Future research will 938–942;
include a study regarding the level of
acceptance and the implementation effects of Golden, B. (2010). “What Cloud Computing
Cloud Computing in Romanian universities. Can Do for Higher Education,” CXO Media Inc.
News_and_Media/News_and_Media_Items/2
010/
SafeNet Solutions Secure_Cloud_Computing_
Deployments.aspx