Document 14120700

advertisement
International Research Journal of Computer Science and Information Systems (IRJCSIS) Vol. 2(2) pp. 18-24, March, 2013
Available online http://www.interesjournals.org/IRJCSIS
Copyright © 2013 International Research Journals
Review
Examining ubiquitous security-capital issues in
implementing a campus-system-as-a-service (CSaaS)
model in the cloud computing age: case study subsaharan region
1
Jameson Mbale, 1Kauna Mufeti and 2Victor Hamutenya
1
Centre of Excellence for Telecommunications and Information Technology (CoE), University of Namibia, Windhoek,
Namibia
2
Information Technology Department, Faculty of Telecommunications, University of Namibia, Namibia
*Corresponding Author E-mail: mbalej@yahoo.com
Accepted February 26, 2013
The system was envisioned as a benchmarked model to build Campus-System-as-a-Service (CSaaS) in
a cloud computing environment. The CSaaS architecture model demonstrated that building such a
system requires strong improvements in security which in turn insists upon a huge budget to
accomplish its objectives. The demand and acquisition of an exorbitant budget poses a challenge to the
sub-Saharan institutions due to scarcity of resources. Nevertheless, a solution was sought. The
concept of a consortium was put forth to combat their deficiencies. Some examples of these African
consortia are: the Partnership for Higher Education in Africa, involving eight (8) universities; The Higher
Education Institutions (HEIs) in Western and Central Africa comprising a hundred (100) institutions, the
initiatives for the formation of National Research and Education Network (NRENs), are but a few of such
organizations. All such assemblages demonstrated the capacity of sub-Saharan campuses to pool their
material, capital and human resources together in a way that would exploit technologies like cloud
computing. The CSaaS architecture model demonstrates how the underlying consortium campuses can
be connected through the CSaaS system to the cloud. Such a system would be capable of managing
Campus Management Systems which would include: student registration, examinations, student
results, students learning materials, library information, research, scholarships, admission information,
undergraduate and postgraduate programmes, student recreation, website, eLearning, internship,
alumina, timetable, campus strategic plan, institution estate, hostels, dining and kitchen, campus
clinic/hospital, staffing, administration, and etc. With such a huge range of applications, the consortium
members would only pay for the services on demand. They would not be responsible for the provision
of maintenance and services of hardware and software facilities.
Keywords: Campus-System-as-a-Service (CSaaS); CSaaS cloud architecture; cloud computing environment;
security; capital resource; consortium campuses; sub-Saharan region; CSaaS Model Convetor; model convertor
and campus cloud.
INTRODUCTION
The system was foreseen as a benchmarked model to
build Campus-System-as-a-Service (CSaaS) in a cloud
Mbale et al. 19
computing environment. The rationale of such a model
was to motivate sub-Saharan institutions to make use of
their resources and to embrace a promising new
technology. The CSaaS architecture demonstrates how
security concerns and affirmation of the budgets are
paramount to the building of the CSaaS system in the
cloud computing age. Managing security in such
environment demands a huge budget which poses a
challenge to the sub-Saharan campuses. In order to
overcome this hurdle, the institutions in that region were
encouraged to form a consortium, to bring their resources
to bear, to raise money and to continue paying for CSaaS
services.
The Statement of Problem
When a new technology arrives, whether the community
wants to embrace it or not, it will continue to exist as long
as it has dominant a value and will by pass those who
cannot adapt. Once the community has failed to adapt, it
remain stat the mercy of older and perhaps outdated
methodologies. By the time you realise that you needed
that technology, it may be too late to catch up with it and it
will likely be far more expensive to adapt it. With this in
mind, it is indeed true that the sub-Saharan region has
been bypassed by many of the new technologies that
evolved within recent history. Once the technology has
bypassed you it becomes very expensive to adjust to that
technology. In the case of ICT technology, educational
institutions in both the, public and private sectors would be
forced to overhaul a major part of their infrastructures in
order to be compliant with new equipment, software or
technology. This is especially devastating if each
institution was responsible for the care and maintenance
of its own technical infrastructure. Therefore, the subSaharan region must learn to embrace the new trends of
technologies in economical ways. Now that the cloud
computing has emerged as a new technology trend, the
learning institutions in the sub-Saharan region should join
all their ICT resources to build a strong CSaaS. By pooling
their resources, they may manage to overcome the lack of
ICT resources many are experiencing. Karanja G. (2006)
recommended the formation of a consortium to purchase
bandwidth as an obvious initiative for the immediate
future. This has proven to be a successful strategy, by
negotiating bulk discounts, this association has lowered
the price paid by some African HEIs for their bandwidth
from as much as US$15,000 per Mbps per month to
US$2,330. Of the fifty-one (51) HEIs included in this
survey of West and Central African HEIs, ten (10)
indicated that they were members of a bandwidth
consortium. Adopting a cloud computing model for CSaaS
would stand as a milestone in planning to achieve such
goals. This model would help the planners to focus upon
the two major concerns of cloud computing, security and
capital resources as demonstrated in Figure 1.
Literature review
First, the benefit of cloud computing has been discussed
extensively elsewhere Bisong A. at el., (2011), Bendandi
S. (2010), Kuyoro S. O. at el. (2011), Chow R. et al.
(2009), Archer J. et al. (2010), however the
disadvantages of security and capital resource issues
surrounding it has outweighed the advantages. Many
entrepreneurs and scholars have expressed severe
concerns about the security and resource issues affecting
the cloud computing technology. This section would look
at security and capital resource discussed by other
scholars.
Security Issues Surrounding Cloud Computing
Bisong A. et al., (2011) they stated that many enterprises
are seriously looking into cloud computing to save cost, in
the near future and cloud computing usage is expected to
skyrocket. They stressed that accompanying this
increased usage in cloud computing, vulnerability to
viruses, worms, hackers and cyber attacks will also
increase. They also mentioned that organized criminals,
terrorists and hostile nations would see this as a new
opportunity to steal private information, disrupt services
and cause harm to the enterprise. In response to these
threats, top security concerns were also raised Bendandi
S. (2010). Thus there is a strong need to improve security
practices and many cloud customers will buy into cloud
computing on the basis of the reputation for confidentiality,
integrity and the level of resilience of the security services
offered by a provider. He highlighted that some of these
services involve auditing and evidence gathering to
support the security of the cloud. He further pointed out
that the audit and evidence gathering where dedicated
pay-per-use forensic images of virtual machines by
certified professionals to assure security were employed.
Other approaches to security are available where large
cloud providers would offer a standardized, opened
interface to manage security thereby opening a market for
security services.
Kuyoro S. O. et al. (2011) they pointed out that security
20 Int. Res. J. Comput. Sci. Inform. Syst.
rity
pus
Cam
d
u
o
l
C
Cam
p
Clou us
d
Securi
Sec
u
y
Server
Server
us
mp
Ca ud
Clo
Sec
urit
y
y
urit
Sec
ty
Se
r it
cu
Server
Se
y
r it
u
c
Cl
ou
dP
IS
P'
s
IS
P'
s
ro
v id
C
e
a
ic
ers
mp
v
r
e
us
S
-Sy
-a
ste
-as
m
me
t
ass
y
S
a-S
su
erv
p
m
Ca Campus - System - as - a - Service ice
Campus 1
Campus 2
Campus 3
. . .
Campus n
Figure 1. CSaaS Cloud Architecture
Table 1. The Concerns of Cloud Computing
CHALLENGE
Security
Availability
Cost
Regulatory Requirements
issues in cloud computing had played a major role in
slowing down its acceptance, in fact security was ranked
first as the primary challenge of cloud computing. Table 1
lists some of their findings in ranked order:
They further emphasized that putting your data, and
running your software on someone else's hard disk, using
someone else's CPU, appears daunting to many. Wellknown security issues such as data loss, phishing, and
botnets, running remotely on a collection of machines,
posed serious threats to organization's data and software.
The other challenges they discussed were: costing
models, charging models, service level agreements,
deciding what to migrate, and cloud interoperability
PERCENTAGE
74.6 %
63.1 %
50.4 %
49.2%
issues. Though, on the other hand, they emphasized that
security could improve due to centralization of data and
increased security-focused resources.
Security threats according to Chow R. et al. (2009)
were categorized into three groups: (1) traditional, (2)
availability and (3) third party. They gave an explanation
that, traditional group concerns computer and network
intrusions or attacks that would be made possible or at
least easier by moving to the cloud. That category
involved the following parts: the VM-level attacks, cloud
provider vulnerabilities, the phishing cloud provider the
expanded network attack surface, authentication and
authorization. The availability group was concerned with
Mbale et al. 21
critical applications and data being available when
needed. The Third-party data control forms the third
group where the potential lack of control and
transparency when a third party holds the data is of
concern. This requires a high level of trust on the part of
a customer toward the provider.
Archer et al. (2010) they identified seven (7) top
threats of cloud computing and explained them as
follows: the first threat was the abuse and nefarious use
of cloud computing. Second was the insecure interfaces
and APIs. Cloud computing providers offer a set of
software interfaces or APIs that customers use to
manage and interact with cloud services. The third is the
malicious insider. The impact that malicious insiders can
have on an organization is considerable, given their level
of access and ability to infiltrate organizations and assets.
The fourth threat is shared technology issues such as
disk partitions, CPU caches, GPUs, and other shared
elements that were never designed for strong
compartmentalization. The fifth is the data loss or
leakage that could result from insufficient authentication,
authorization, and audit (AAA) controls. The sixth is
account or service hijacking, stolen credentials, etc.
Attackers can often access critical areas of deployed
cloud computing services permitting them to compromise
the confidentiality, integrity and availability of those
services. The seventh threat is the unknown risk profile
that could still linger when compliance of the
internal security procedures, configuration hardening,
patching, auditing, and logging have undetected
vulnerabilities.
Capital Resource Surrounding Cloud Computing
Echezona R. I. et al. (2010) discussed the University
roles as research, evaluation, information transfer, and
technology development are therefore critical to social
progress and economic growth. Therefore, University
strategic planning should pay special attention to the
challenge of accessing current scientific knowledge
(through journals, books, CD-ROM, On-Line resources)
at affordable cost. They further stated that many
initiatives have taken place to get Africa interconnected to
the “information super highway”. They also pointed out
that NGOs, telecommunication companies, philanthropic
organizations and some countries of the developed world
have extended their services to ICT development in
Africa. They narrated that the Partnership for Higher
Education in Africa (including the Ford, Macarthur, and
Rockefeller foundations) has helped an organization of
thirteen (13) African universities to cover connecting
costs. They also emphasized that some African countries
through their Universities have made appreciable efforts,
individually and collaboratively, at establishing affordable
ICT links which invariably improves Internet connectivity.
They went on to say most of the initiatives have been
realized through the formation of National Research and
Education Network (NRENs), and Regional Research
and Education Networks. Their financial positions have
limited their activities to acquisition of VSAT at an
affordable price through the economies of scale offered
by consortium formation.
According to Aluoch (2006) explained that connectivity
in Africa is poor, unreliable, scarce and very expensive,
and where available, is almost never dedicated and users
have to contend with frequent service outages conflated
with very slow speeds. The author also revealed the
result of the 2006 African Tertiary Institutions
Connectivity Survey (ATICS) which indicated that
Universities in Africa, on an average pay about US
$40.50 per kilobits per second (kbps) per month while
some institutions pay as much as US $36 kbps for
bandwidth. They also pointed out that these figures are
very high compared to users in North America who are
on megabit and Gigabit speeds and pay much less, that
is $10 per month for a 3 mbps Digital subscribers line
(DSL) link.
Communications costs in sub-Saharan Africa,
according to Juma et al. (2008) are the highest in the
world, and African universities face costs of internet
bandwidth that are over 20 times as high as those in
western universities. They also stated that monopoly
structure and the “low volume, high price” business
model of the investment has kept the price of internet
access beyond the reach of most universities. They
stressed that the cost to operators is estimated to be
about $2, 000/Mbps per month. But average prices are
estimated to be $13,000 per month and have reached
peak levels of $25,000 per month. As a result of the high
prices the cable’s capacity utilization is estimated to be a
meager 5%.
According to Juma et al. (2008), the report showed that the
HEIs in Western and Central Africa represent a total user base
of over hundred (100) institutions and 2.158 million users,
representing an estimated total bandwidth in 2008 of 266.261
Mbps (download) and a budget of US$9.528 million. The
authors suggested that by acting collectively, intervening more
directly into the supply chain, and taking advantage of the
new submarine cable and regional fibre optic networks
which will become available during the next five years
they will be able to
22 Int. Res. J. Comput. Sci. Inform. Syst.
meet their own requirements comparable to HEIs
elsewhere in the world.
The Bandwidth Task Force Secretariat (2003)
explained that in 2003 compiled a bandwidth utilization
report for the Partnership for Higher Education in Africa
showing total monthly costs for the involved eight (8)
Universities and these were: University of Dar es Salaam,
Makerere University, University of Ghana, Eduardo
Mondlane University, University of Ibadan, University of
Jos, Obafemi Awolowo University, and Bayero University.
The total monthly charge put together for these
Universities were approximately sixty nine thousand one
hundred and thirty one USA Dollars (US$ 69,131.00) and
monthly cost per kilobits per second were roughly one
hundred forty five USA Dollars and twelve shillings (US$
145.12).
Karanja G. (2006) discussed the 2006 Report, African
Tertiary Institutions Connectivity Survey (ATICS)
investigated the utilisation of bandwidth of African
Universities. The report gave the comparison of highest
monthly bandwidth costs as US$36.33/kbps reported in
the 2004 and US$33.26/kbps in 2006. He further showed
that put the monthly direct VSAT costs at US$7.13/kbps
were found on average to be much more expensive than
land-based connections which costUS$4.30/kbps. He
further said the report reasoned that although land-based
connectivity in most countries in Africa ultimately comes
in via VSAT, the land-based services are bought in
relatively larger volumes, and therefore the consortium is
able to negotiate lower costs than single institutions
buying VSAT services for themselves. The report also
gave the top nine (9) institutions with the most expensive
bandwidth to the sum total of one hundred and five USA
Dollars seventy four cents (US$105.74) for /kbps per
month.
institutions across the region. Previously, some
demonstration of consortia were reported such as
Partnership for Higher Education in Africa, involving eight
(8) universities, HEIs in Western and Central Africa
constituting approximately a hundred (100) institutions,
initiatives for formation of National Research and
Education Network (NRENs), to mention a few. These
assemblages demonstrated what could happen when
sub-Saharan campuses pool their capacities, merging
their material, capital and human resources together in
way that could harness the benefits offered by new
technologies such as cloud computing. The formation of
such a consortium by various campuses would manage
to share the load of paying the cloud computing providers
and their services.
The CSaaS System
In between the cloud and the underlying campuses there
was a CSaaS system which run institutional programs.
These programs interface to the cloud and the underlying
campuses, and their (programs) were tailored to provide
access to everyday campus information. Some of these
system programs would be the comprehensive Campus
Management Systems which would include: student
registration, examinations, student results, students
learning materials, library information, research,
scholarships, admission information, undergraduate and
postgraduate programmes, student recreation, website,
eLearning, internship, alumina, timetable, the campus
strategic plan, dining and kitchen, campus clinic/hospital,
staffing, administration, etc. The programs were run
within the cloud and the consortium would pay on
demand for the services. Also side-by-side were the
Information Service Providers (ISPs) who managed other
services such as bandwidth.
The CSaaS cloud architecture model
As discussed earlier, many of the concerns about cloud
computing dwells on security and capital resources. In this
regard Figure 1 demonstrates a (CSaaS) architecture
model build taking into consideration the need for
extensively strengthening security around the cloud and
hints at the parallel requirement for an a large budget.
Campuses of Different Institutions of sub-Saharan
Region
Underlying the architecture are campuses from different
The Cloud Infrastructure
On Figure 1 shows the Cloud architecture. At the top lies
the cloud, which is surrounded by a thick ream of
security. Inside the cloud are installed servers owned and
ran by the cloud providers. The clients who comprise the
consortium of campuses are relieved from the burden of
having to buy software and hardware since the cloud
servers and other resources are provided as part of the
contract. Further, the cost of maintaining, servicing and
upgrading the existing infrastructure is born by cloud
providers and not the client campuses of the consortium.
Mbale et al. 23
In
te Cl
ro ou
Is pe d
su ra
% es bili
ty
Model
Convertor
(MC)
Se
o
A rv
t t te
gr ic
a
ee e
h a
W igr
% me of
M %
nt
Othe
rs
%
Cost
ing
%
g
in
rg
a
Ch %
Figure 2. CSaaS Cloud Model Convertor
Cloud Providers
Thus it promises a cost-effective way to provide ICT
services.
A 24/7 CSaaS Cloud Multi-Security System
As shown in Figure 1, the cloud in that model was
surrounded by a thick ream of security, and as above
other entrepreneurs cited that security issues dominated
all others with seventy four point six percent (74.6%).
Indeed, from Figure 1, the thick security ream forms core
of this work. As the CSaaS would be on the cloud, it
would be vulnerable to security attack. Guarding against
all possible existing security attacks is very gigantic task
and very costly as well. To combat the most severe
security threats in such a model would require a massive
budget in order to provide a multi-security protection
system capable of alleviating these risks. These risks, of
course, involve a range perils which include cloud
provider vulnerabilities, authentication and authorization
issues, malicious software, insecure interfaces,
untrustworthy insiders, shared technologies, data loss or
leakage, account or service hijacking, , but to mention a
few. Building a model system of this kind would definitely
cost the cloud providers a large amount of money and
they would likely pass this cost on to the customer
which in this case would be the consortium.
Nevertheless, as mentioned previously, cited institutions
already spend a lot of money in paying for their
bandwidth resources. Therefore putting all those
capital expenditures together, the clients should
manage to pay for the charges of the security system.
The cloud providers are responsible for providing,
running and maintaining the infrastructure. They
purchase and install the required hardware and software.
They carry out the 24/7 service provision to the
consortium members. The cloud providers are also
responsible for developing the application programs for
the campus conglomerate. It is up to the group to choose
the preferred cloud provider, of course it would be one
that could meet their diverse requirements. .
CSaaS cloud model convertor (CSaaS-cmc)
One of the challenging issues was how much each
institutional member would contribute or pay. Some
institutions had more users and demanded a higher
usage of resources than others. In this case, each
campus will have to contribute more or less depending
upon its need. In that way, Figure 2, a CSaaS-CMC was
developed to calculate this amount. This work is referred
to as the “factors models (FM)” which considers the
various aspects of cloud operations. The components
were: the costing model, the charging model, the service
level agreement, what to migrate, and cloud
interoperability of each campus.
The CSaaS Cloud Model Convertor in Figure 2 had a
Model Convertor (MC), a component which calculated
values of various model charges of the different FM. The
variables used for calculation were: number of users in a
campus, number of the connected and working
equipment, and capacity of bandwidth utilization. Using
24 Int. Res. J. Comput. Sci. Inform. Syst.
these variables, the MC calculated the values of each FM
in percentages. After calculation, the percentage values
of each FM would appear on the CSaaS-CMC for each
FM. The campus with high percentages contributed or
paid more. The one with low percentages pays the least.
Not only was the system helpful to determine how much
each campus was to pay, but very useful to the cloud
providers in determining how to allocate resources. It also
calculated the charges of service on demand. Once a
campus ran the service, the system automatically
calculated the charges. The system determined the
operational costs, involving the security, bandwidth
management, and other service charges. The CSaaSCMC would then determine the service agreement, what
data to migrate, the interoperability of the data and the
system as whole. All these calculations would help to
come up with the overall charges given to the client.
CONCLUSION
The system was envisaged as a benchmarked model to
build Campus-System-as-a-Service in a cloud computing
environment. The building of such a system emphasizes
the importance and strength of the security aspect and
affirms the capital resource base. The system is very
vulnerable to security threats and its maintenance
demanded an excessive budget. Due to the need for
mammoth budgets, sub-Saharan institutions were
compelled to form campus consortia that would enable
them to pool their resources in order to pay for the
services the cloud offers. As discussed previously, a
number of initiatives to form such consortia were outlined
and the data collected encouraged the building of this
model. Underlying the model were the various campuses
forming the consortium. The CSaaS system interfaced
with the underlying campuses and the cloud. Whereas,
the cloud constituted the equipment that were operated,
maintained or serviced by the cloud providers. The
consortium campuses were only charged for service on
demand. The system had a CSaaS-CMC that calculated
the FM’s which overally determined how much each
campus was to contribute or pay. The CSaaS-CMC had
an inner component that did the actual calculations using
the variables and these were: number of users in a
campus, number of the connected and working
equipment, and capacity of bandwidth utilization.
.
REFERENCES
Aluoch AA (2006). The search for affordable quality Internet connectivity
for African universities,” AAU Newsletter 12 (3):8.
Archer J, Boehme A, Cullinane D, Kurtz P, Puhlmann N, Reavis J
(2010). Top Threats Security to Cloud Computing V1.0. Cloud
Security Alliance.
Bandwidth Task Force Secretariat (2003). More Bandwidth at Lower
Cost: An Investigation for the Partnership for Higher Education in
Africa.
Bendandi S (2009). Cloud computing: Benefits, risks and
recommendations for information security. Retrieved on March 15,
2010 from http://www.scribd.com/doc/23185511/Cloud-Computingbenefits-risks-and-recommendationsfor-information-security.
Bisong A, Rahman SM (2011). An Overview of the Security Concerns in
Enterprise Cloud Computing. International Journal of Network
Security and Its Applications (IJNSA), Vol.3, No.1.
Chow R., Golle P., Jakobsson M., Shi E., Staddon J., Masuoka R., and
Molina J (2009). Controlling Data in the Cloud: Outsourcing
Computation without Outsourcing Control. ACM Cloud Computing
Security Workshop (CCSW).
Echezona RI., Ugwuany CF (2010). African University Libraries and
Internet Connectivity: Challenges and the Way Forward. A Library
Philosophy
and
Practice,
http://unllib.unl.edu/LPP/echezonaugwuan,yi.htm.
Hamilton P, Ibrahim A, Kone T, Lishou C, Oumtanaga S, Sie OE,
Tonye E (2008). AAU Connectivity Survey: Addressing the Demand
for Connectivity of Higher Education Institutions (HEIs) in the West
and Central Africa Region.
Juma C, Moyer E (2008). High-Speed Internet Access for African
Universities: The Lifeline of Int. Res. Cooperat.; Presented at the
Special Session on “Science and Technology Collaboration between
Developed and Developing Countries” convened by the STS forum
on the occasion of the Fourth Tokyo International Conference on
African Development (TICAD IV) in Yokohama, Japan.
Karanja G (2006). 2006 Report: African Tertiary Institutions Connectivity
Survey (ATICS). Cyberplex Africa. Botswana.
Kuyoro SO, Ibikunle F, Awodele O (2011). Cloud Computing Security
Issues and Challenges. Int. J. Comput.Networks (IJCN), 3:(5).Aluoch
A. A (2006). The search for affordable quality Internet connectivity for
African universities,” AAU Newsletter 12 (3):8.
Download