Kenyan universities are being compelled by the government within the framework of Kenya Vision 2030 to introduce e-learning and blended learning as an alternative delivery system to increase accessibility to higher education in Kenya (NESC, 2007). Mobile devices are being used today to perform most tasks that a desktop or laptop computer could be used for. On this premise, mobile devices are also used to connect to the resources of cloud computing hence, mobile cloud computing (MCC). The seemingly ubiquitous and pervasive nature of most mobile devices has made it acceptable and adequate to match the ubiquitous and pervasive nature of cloud computing. Mobile cloud computing is said to have increased the challenges known to cloud computing due to the security loop holes that most mobile devices have (Olayinka, Hani, & Silas, 2015). A recent survey by Euro stats found out that four out of ten enterprises (Thirty Nine Percent) using the cloud reported the risk of a security breach as the main limiting factor in the use of cloud computing services while a similar proportion (Forty Two Percent) of those not using the cloud reported insufficient knowledge of cloud computing as the main factor that prevented them from using it (ENISA, 2010). Mobile cloud computing technology is growing rapidly among the users and at the same time it introduces the new security threats. In recent years, hacking and malware applications have been targeting mobile devices and are found abundantly with applications downloaded in various categories such as entertainment, health, games, business, social 4 networking, travel and news. The popularity of these are easily available through mobile App-download centers such as Apple‘s iTunes, Nokia‘s Ovi suite and Android Google Play Store. This presents an added level of risk because essential services are often outsourced to a third party in Mobile Cloud, thus making it harder to maintain data security and privacy, support data and service availability, and Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing concept has raised questions about the reliability and privacy of devices in E-Learning. This paper investigates current challenges that affect the security of mobile cloud environment to E-Learning users, their network platform and data stored on the mobile devices with regard to issues of privacy, data ownership and concerns about device access and security. A total of 153 respondents from Kenyan universities participated in this survey. The results show that there is need to come up with a comprehensive secure solution for mobile cloud computing environment. This study is significant because it will help in research for a secure framework and enable organizations to secure their mobile cloud environment.
[1]
Mahadev Satyanarayanan,et al.
Mobile computing: the next decade
,
2010,
MCS '10.
[2]
Taro Yamane.
Statistics: An Introductory Analysis
,
1965
.
[3]
Nabil Sultan,et al.
loud computing for education : A new dawn ?
,
2009
.
[4]
Felix C. Freiling,et al.
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
,
2011,
2011 IEEE Symposium on Security and Privacy.
[5]
V. Kavitha,et al.
A survey on security issues in service delivery models of cloud computing
,
2011,
J. Netw. Comput. Appl..
[6]
Samee Ullah Khan,et al.
Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey
,
2022
.
[7]
Danco Davcev,et al.
Mobile Cloud Computing Environment as a Support for Mobile Learning
,
2012,
CLOUD 2012.
[8]
N. Mallikharjuna Rao,et al.
Cloud Computing Through Mobile-Learning
,
2012,
ArXiv.
[9]
John W. Rittinghouse,et al.
Cloud Computing: Implementation, Management, and Security
,
2009
.
[10]
Olayinka Olafare,et al.
A New Secure Mobile Cloud Architecture
,
2015,
ArXiv.
[11]
C. Clement,et al.
Barriers to the Introduction of ICT into Education in Developing Countries: The Example of Bangladesh
,
2012
.
[12]
Benjamin Hirsch,et al.
Education beyond the cloud: Anytime-anywhere learning in a smart campus environment
,
2011,
2011 International Conference for Internet Technology and Secured Transactions.
[13]
Norman E. Wallen,et al.
How to Design and Evaluate Research in Education
,
1990
.
[14]
Chonho Lee,et al.
A survey of mobile cloud computing: architecture, applications, and approaches
,
2013,
Wirel. Commun. Mob. Comput..
[15]
Abinisha Sapanny,et al.
Cloud Security Challenges and Recommended Solutions
,
2015
.
[16]
Qijun Gu,et al.
Secure Mobile Cloud Computing and Security Issues
,
2014
.
[17]
Marian Petre,et al.
A gentle guide to research methods
,
2006
.
[18]
Nancy R. Mead,et al.
Software Security Engineering: A Guide for Project Managers
,
2004
.
[19]
Dongho Won,et al.
A Practical Analysis of Smartphone Security
,
2011,
HCI.
[20]
Rajkumar Buyya,et al.
Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility
,
2022
.
[21]
U. Sekaran,et al.
Research Methods for Business : A Skill Building Approach (5th Edition)
,
1992
.
[22]
Ryan Palmer,et al.
Distance Learning in the Cloud: Using 3G Enabled Mobile Computing to Support Rural Medical Education
,
2011
.