Page 1115 - Cloud computing: From paradigm to operation
P. 1115
Assisting developing countries 8
• [ITU-T X.1258] "Enhanced entity authentication based on aggregated attributes"; aggregating
attributes from multiple attribute authorities may be needed in order to enable a relying party to
enhance its trust in the identity of a party. The aggregation can be regarded as having to deal with
a collection of globally unique identifiers, which is common across all attribute authorities.
All ICT stakeholders have a role to play in making cloud computing services more trusted in developing
countries. There could be some aspects that may differ from country to country but a common framework
could be provided to make it easier for stakeholders to accept them.
It is believed that the more trust issues are handled, the more CSCs will take up cloud computing services.
9 Challenges of cloud computing adoption
The regulation of cloud computing services is not properly defined in most developing countries which greatly
inhibits the adoption of cloud services in these countries. The main challenges that have affected the
adoption of cloud computing in developing countries include:
9.1 Lack of regulatory framework for cloud computing services
Developing counties lack the regulatory framework to govern the provision and consumption of cloud
computing services.
9.2 Security and privacy concerns
Data security and privacy are the most salient challenges associated with the adoption of cloud computing
services in developing countries. CSCs tend to be sceptical about handing over their data to a third party.
There are concerns of confidentiality of company information, the likelihood of corruption of data and the
fate of CSC's data when there is a switch over to another service provider or after termination of the contract.
CSPs have a responsibility to demonstrate their credibility as well as to improve awareness on the safety of
cloud computing services.
A lot of speculation has been raised on the geographical location of the data centres. CSCs feel they lose
control of their data once it is in a location outside their jurisdiction. The local authorities may also not have
control over such data. CSCs get concerned regarding how they could be protected in such instances or
indeed what each country's strategy could be in this regard.
9.3 Infrastructure needs
Some CSPs highlighted the need to invest more in infrastructure that could provide a broader diversity of
cloud computing services as well as increase the capacity of providers to serve more users. This includes the
need to deploy data centres, Internet exchange points (IXP) and robust electricity infrastructure sources.
9.4 Capacity building
CSPs highlighted the need for capacity building initiatives on the use, regulation and implementation of cloud
computing services as well as the development of cloud computing applications that will create new
opportunities for cloud services. The capacity building interventions could be targeted at corporate
organizations as well as embedded in the curriculum for schools and tertiary institutions.
9.5 Quality of service
The provision of cloud computing services relies on good quality and reliable Internet services. There has
been a general concern from the CSPs and CSCs about the unreliable and low internet connection speed over
which cloud services are provided. The lack of IXPs has also resulted in users paying high international
bandwidth prices thereby negatively affecting cloud service provision and uptake of cloud services in most
developing countries.
1107