Skip Navigation Links.
Collapse <span class="m110 colortj mt20 fontw700">Volume 12 (2024)</span>Volume 12 (2024)
Issue 3, Volume 12, 2024
Issue 2, Volume 12, 2024
Issue 1, Volume 12, 2024
Collapse <span class="m110 colortj mt20 fontw700">Volume 11 (2023)</span>Volume 11 (2023)
Issue 6, Volume 11, 2023
Issue 5, Volume 11, 2023
Issue 4, Volume 11, 2023
Issue 3, Volume 11, 2023
Issue 2, Volume 11, 2023
Issue 1, Volume 11, 2023
Collapse <span class="m110 colortj mt20 fontw700">Volume 10 (2022)</span>Volume 10 (2022)
Issue 4, Volume 10, 2022
Issue 3, Volume 10, 2022
Issue 2, Volume 10, 2022
Issue 1, Volume 10, 2022
Collapse <span class="m110 colortj mt20 fontw700">Volume 9 (2021)</span>Volume 9 (2021)
Issue 4, Volume 9, 2021
Issue 3, Volume 9, 2021
Issue 2, Volume 9, 2021
Issue 1, Volume 9, 2021
Collapse <span class="m110 colortj mt20 fontw700">Volume 8 (2020)</span>Volume 8 (2020)
Issue 3, Volume 8, 2020
Issue 2, Volume 8, 2020
Issue 1, Volume 8, 2020
Collapse <span class="m110 colortj mt20 fontw700">Volume 7 (2019)</span>Volume 7 (2019)
Issue 3, Volume 7, 2019
Issue 2, Volume 7, 2019
Issue 1, Volume 7, 2019
Collapse <span class="m110 colortj mt20 fontw700">Volume 6 (2018)</span>Volume 6 (2018)
Issue 4, Volume 6, 2018
Issue 3, Volume 6, 2018
Issue 2, Volume 6, 2018
Issue 1, Volume 6, 2018
Collapse <span class="m110 colortj mt20 fontw700">Volume 5 (2017)</span>Volume 5 (2017)
Issue 4, Volume 5, 2017
Issue 3, Volume 5, 2017
Issue 2, Volume 5, 2017
Issue 1, Volume 5, 2017
Collapse <span class="m110 colortj mt20 fontw700">Volume 4 (2016)</span>Volume 4 (2016)
Issue 6, Volume 4, 2016
Issue 5, Volume 4, 2016
Issue 4, Volume 4, 2016
Issue 3, Volume 4, 2016
Issue 2, Volume 4, 2016
Issue 1, Volume 4, 2016
Collapse <span class="m110 colortj mt20 fontw700">Volume 3 (2015)</span>Volume 3 (2015)
Issue 5, Volume 3, 2015
Issue 4, Volume 3, 2015
Issue 3, Volume 3, 2015
Issue 2, Volume 3, 2015
Issue 1, Volume 3, 2015
Collapse <span class="m110 colortj mt20 fontw700">Volume 2 (2014)</span>Volume 2 (2014)
Issue 6, Volume 2, 2014
Issue 5, Volume 2, 2014
Issue 3A, Volume 2, 2014
Issue 4, Volume 2, 2014
Issue 3, Volume 2, 2014
Issue 2, Volume 2, 2014
Issue 1, Volume 2, 2014
Collapse <span class="m110 colortj mt20 fontw700">Volume 1 (2013)</span>Volume 1 (2013)
Issue 6, Volume 1, 2013
Issue 5, Volume 1, 2013
Issue 4, Volume 1, 2013
Issue 3, Volume 1, 2013
Issue 2, Volume 1, 2013
Issue 1, Volume 1, 2013
Journal of Business and Management Sciences. 2022, 10(3), 131-137
DOI: 10.12691/JBMS-10-3-4
Literature Review

Security Issues and Challenges in Cloud Computing among Public Institutions in Africa

Gladwell Murigi1, and Morrisson Mutuku1

1Department of Management Science, School of Business, Kenyatta University

Pub. Date: July 17, 2022

Cite this paper

Gladwell Murigi and Morrisson Mutuku. Security Issues and Challenges in Cloud Computing among Public Institutions in Africa. Journal of Business and Management Sciences. 2022; 10(3):131-137. doi: 10.12691/JBMS-10-3-4

Abstract

The idea of storing and managing data on virtualized servers has been brought to life by cloud computing technology allowing apps, individuals and organizations all over the world to connect to data and computing resources anywhere and at any time. Users of cloud computing can share processing power, storage space, bandwidth, memory and software. Because cloud computing is so simple to use, consumers no longer need to invest much in IT infrastructure. However, cloud computing comes with its own challenges with cloud security and privacy being the biggest concerns. Many organizations are uncomfortable with storing their data and applications on systems they do not control. In addition, since cloud services are accessed via internet, there is risk of attack by hackers. It was therefore important to assess security issues and challenges in cloud computing among public institutions in Africa. This study adopted a systematic review of literature. During the selection of studies to be used in a systematic review, the search for empirical studies was done in an extensive manner. Multiple or numerous sources, both printed and computerized were searched.. This study selected studies that were less than 5 years old. In addition, the study selected studies conducted in Kenya, other countries in Africa and around the world. To ensure the quality of the studies, the study selected studies with abstract, introduction, objectives, methods, results/findings and conclusions. The study concludes that challenges and security issues in cloud computing among public institutions include data breach, account hijacking, data loss, denial of service attacks, cloud abuse, malicious insiders, phishing attacks, portability restrictions, backdoor channel attacks, cloud malware injection attacks, shared technology vulnerabilities and lack of confidentiality of corporate data. The researcher therefore recommends that the governments should come up policies to govern and improve cloud computing adoption among public institutions. In addition, the study recommends development of policies to protect data from external hackers and malicious individuals. Policy makers should develop clear policies that require the cloud service providers to safeguard privacy and also security of data they are managing on behalf of institutions. Moreover, the policy makers should come up with policies that guide the provision of penalties to security failures. Also, public institutions should establish an information and communication technology department to come up with strategies to protect data in their organizations.

Keywords

cloud computing, public institutions, security issues

Copyright

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References

[1]  Tyagi, A. (2017). A Review Paper on Cloud Computing. International Journal of Engineering Research & Technology, 5(23), 1-2.
 
[2]  Alemu, M., & Omer, A. M. (2014). Cloud Computing Conceptual Security Framework for Banking Industry. Journal of Emerging Trends in Computing and Information Science, 5(12), 921-930.
 
[3]  IBM (2021). IaaS vs PaaS vs Saas. Available at https://www.ibm.com/cloud/learn/iaas-paas-saas. Retrieved 12 March, 2022.
 
[4]  Omwansa, T. (2014). Cloud Computing in Kenya: A baseline survey.
 
[5]  IBM (2018).Benefits of Cloud Computing. Available at https://www.ibm.com/cloud/learn/benefits-of-cloud-computing?msclkid=8ad1aa2fb0ef11ecaaa37a7c8f09b44d. Retrieved 10 March, 2022.
 
[6]  Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58
 
[7]  Ceccagnoli, M., Forman, C., Huang, P. & Wu, D. (2012). Co-creation of value in a platform ecosystem: the case of enterprise software. MIS Quarterly, 36(1), 263-290.
 
[8]  Statista (2021). Cloud computing in Europe - Statistics & Facts. Available at https://www.statista.com/topics/8472/cloud-computing-in-europe/?msclkid=57bc9224b0f211ec8b98de0407c0e724. Retrieved 29 March, 2022.
 
[9]  Mckinsey & Co. (2018). Public Cloud in China.Big Challenges, big upside. Available at https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/public-cloud-in-china-big-challenges-big-upside. Retrieved 30 March, 2022.
 
[10]  M'Rhaouarh, I., Elachkar, I., Chafiq, N. & Namir, A. (2020). Adoption of Cloud Computing by Enterprises in Morocco: A survey. International Journal of Scientific &Engineering Research, 11(11), 2229-5518.
 
[11]  Osei-Opoku, E., Regaieg, R. & Koubaa, M. (2020). Review on Cloud Computing Security Challenges. European Scientific Journal, 16, 63-76.
 
[12]  Chinyemba, M. K. & Phiri, J. (2018). An Investigation into Information Security Threats from Insiders and how to Mitigate them: A Case Study of Zambian Public Sector. Journal of Computer Science, 14, 1389-1400.
 
[13]  Iwuchukwu, U., Atimati, E., Ndukwe, C.I. & Iwuamadi, O. (2017). The State of Cloud Computing in Nigeria. IOSR Journal of Electrical and Electronics Engineering, 12, 84-93.
 
[14]  Sithole, S. & Ruhode, E. (2021). Cloud Computing Adoption: Opportunities and Challenges for Small, Medium and Micro Enterprises in South Africa. Journal of Could Computing, 23, 89-102.
 
[15]  Khanda, M. & Doss, S. (2018). SME Cloud Adoption in Botswana: Its Challenges and Successes. International Journal of Advanced Computer Science and Applications, 9(10), 468-478.
 
[16]  Wainaina, F. (2020). Harnessing the Power of Cloud Computing in Kenya. Available at https://www.itnewsafrica.com/2020/09/harnessing-the-power-of-cloud-computing-in-kenya/?msclkid=5d626771b0d011ecb4630edb6af2f003. Retrieved March 25, 2022.
 
[17]  Kabudi, K. (2017). The application of Cloud Computing in the Tanzania Education Sector: Case study of Ministry of Education, Science and Technology (MoEST). Journal of Computer Science and Applications, 12, 90-112.
 
[18]  Demissie, S. (2017). Cloud-Computing: Adoption Issues for Ethiopian Public and Private Enterprises. Electronic Journal of Information Systems in Developing Countries, 78, 1-14.
 
[19]  Mugyenyi, R. (2018). Adoption of Cloud Computing Services for Sustainable Development of Commercial Banks in Uganda. Global Journal of Computer Science and Technology, 18(1), 12-34.
 
[20]  NIST (2011). Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-45.pd.
 
[21]  Niu, J. (2020). Diffusion and adoption of research data management services. Global Knowledge, Memory and Communication, 69(3), 117-133.
 
[22]  Rogers, E. (2003). Diffusion of Innovations, 5th Edition. New York: Simon and Schuster.
 
[23]  Mannan, B., & Haleem, A. (2017) Understanding major dimensions and determinants that help in diffusion & adoption of product innovation: using AHP approach. J Glob Entrepr Res. 7, 12, 1-24.
 
[24]  Kunyoria, O. J., Wagude, A., & Onditi, L. A. (2018). Technology Adoption and Lean Manufacturing: A Case of Sony Sugar Company, Awendo, Kenya. International Journal of Novel Research in Humanity and Social Sciences, 5(6), 20-29.
 
[25]  Venkatesh, V., Thong, J. L. & Xu, X. (2016). Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead. Journal of the Association for Information Systems, 17(5), 23-45.
 
[26]  Mütterlein, J., Kunz, R.E. & Baier, D. (2019). Effects of lead-usership on the acceptance of media innovations: A mobile augmented reality case. Technological Forecasting and Social Change, 145, 113-124.
 
[27]  Wu, M., Yu, P., & Weng, Y. (2012). A study on user behavior for I Pass by UTAUT: Using Taiwan’s MRT as an example. Asia Pacific Management Review, 17(1), 91-111.
 
[28]  Delavari, V., Shaban, E. & Hassanzadeh, A. (2020). Thematic mapping of cloud computing based on a systematic review: a tertiary study. Journal of Enterprise Information Management, 33(1), 161-190.
 
[29]  Mehrtak, M. & Seyed, A. S. (2021). Security challenges and solutions using healthcare cloud computing. Journal of Medicine and Life, 2(3), 29-89.
 
[30]  Hussam, A. S., Laith, M. K. & Yazan, A. A. (2017). A Review of Challenges and Security Risks of Cloud Computing. Journal of Telecommunication, Electronic and Computer Engineering, 9, 87-91.
 
[31]  Al-Issa, Y., Ottom, N.A. & Tamrawi, A. (2019). eHealth Cloud Security Challenges: A Survey. Journal of Healthcare Engineering, 23, 1-15.
 
[32]  Jones, S., Irani, Z. & Sivarajah, U. (2017). Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies. Inf Syst Front, 21, 359-382.
 
[33]  Tshepho, M., Lungile, L.. & Olefhile, M. (2019). Implications of cloud-computing services in records management in Africa: Achilles heels of the digital era? South African Journal of Information Management, 21(1), 1-12.
 
[34]  Panhwar, A.M., Khuhro, S.A. Shehram, S.M. & Saddar, S. (2020). Investigation of Security Issues in Mobile Cloud Computing. PalArch’s Journal of Archaeology of Egypt, 7(6), 2330-2340.
 
[35]  Abdallah, N. (2020). Issues in Cloud Computing: Challenges, Threats and Security Concerns. Al Dar Research Journal for Sustainability, 4(2), 3-64.
 
[36]  Bediako-Kyeremeh, K., Duorinaa, E. & Agyemang, S. (2019). Cloud Computing in Industrial SMEs: Identification of Barriers to Its Adoption and Benefits of Its Application in Ghana. Stu International Journal of Technology, 1(7), 1-28.
 
[37]  Suleiman, M.M., Sa’id, P. & Shu'aibu, R.B. (2021). Privacy and Security Concerns in the Adoption of Cloud Computing Technology. Journal of Applied Sciences, Information and Computing, 2(1), 33-45.
 
[38]  Moloja, D. & Ruhode, E. (2020). Factors affecting Cloud Computing adoption in Higher Learning Institutions in South Africa: A case of Matjhabeng TVET Colleges. Conference on Higher Education Advances, 12, 1261-1272.
 
[39]  Saidu, A. & Kwadan, S.M. (2020). Factors Challenging the Adoption of Cloud Computing Application in E-Learning among Polytechnics in Northeastern Nigeria. European Journal of Computer Science and Information Technology, 8(2), 38-49.
 
[40]  Rupra, S. (2020). A Descriptive Research on the Security Challenges of Cloud Computing Among Selected SMEs in Kenya. International Journal of Innovative Science and Research Technology, 5, 588-598.
 
[41]  Babbie, E. R. (2017). The basics of social research. Boston: Cengage Learning.
 
[42]  Dar, A. A. (2018) Cloud Computing-Positive Impacts and Challenges in Business Perspective. J Comput Sci Syst Biol, 12, 15-18.
 
[43]  Dearing, J. W. & Cox, J. G. (2018). Diffusion Of Innovations Theory, Principles, And Practice. Health Affairs. 37. 183-190.
 
[44]  Venkatesh, V.; Morris, M. G.; Davis, G. B. & Davis, F. D. (2003). “User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly. 27(3): 425-478.