Identifying the security risks associated with governmental use of cloud computing

https://doi.org/10.1016/j.giq.2010.01.002Get rights and content

Abstract

Cloud computing, which refers to an emerging computing model where machines in large data centers can be used to deliver services in a scalable manner, has become popular for corporations in need of inexpensive, large scale computing. Recently, the United States government has begun to utilize cloud computing architectures, platforms, and applications to deliver services and meet the needs of their constituents. Surrounding the use of cloud computing are many risks that can have major impacts on the information and services supported by this technology. This paper discusses the current use of cloud computing in government, and the risks–tangible and intangible–associated with its use. Examining specific cases of government cloud computing, this paper explores the level of understanding of the risks by the departments and agencies that implement this technology. This paper argues that a defined risk management program focused on cloud computing is an essential part of the government IT environment.

Introduction

Cloud computing, which allows for highly scalable computing applications, storage, and platforms, is increasing in importance throughout government information technology (IT) strategy. Cloud computing providers offer a variety of services to individuals, companies, and government agencies, with users employing cloud computing for storing and sharing information, database management and mining, and deploying web services, which can range from processing vast datasets for complicated scientific problems to using clouds to manage and provide access to medical records (Hand, 2007). Recently, President Barack Obama and Chief Technology Officer (CTO) Vivek Kundra have both expressed the vision to explore the cloud as a key component in the federal IT transformation, and therefore agency use of cloud computing capabilities has increased (Jackson, 2009, Miller, 2009b).

Although many benefits are reported in cloud computing use, a great deal of risk is associated with the implementation, management, and use of cloud computing technologies. In a government context, both tangible risks (such as the risk of unauthorized access, infrastructure failure, or unavailability) and intangible risks (such as confidence in the technologies capabilities, and public access) are introduced along with the functionality and benefits provided by cloud applications. The government's ability to manage these risks will be a key determinant in the success of cloud computing.

This paper discusses the nature of cloud computing and risk management in a governmental context. The risks associated with cloud computing are identified, focusing on both the tangible and intangible risks which can present challenges for IT management. We argue that much evidence exists that cloud computing has become a strategic direction for many government agencies and is already employed in critical areas of the government's IT infrastructure. However, a prudent and in-depth risk management program must accompany the use of this new technology in order to prevent unwanted technical consequences, and even greater problems from a government information management perspective.

Section snippets

The nature of risk and risk management

The word “risk” is derived from the Italian risicare, which translates to English as “to dare.” At the origin of the word is the implication that risk is not a fate, but a choice individuals make depending on internal or personal factors, and the environment in which we live (Bernstein, 1998). Others define risk as the possible impact or result of an event on assets of an organization, and the corresponding consequences that occur (Stoneburner, Goguen & Feringa, 2004). Risk is not defined or

What is cloud computing

Cloud computing refers to an emerging model of computing where machines in large data centers can be dynamically provisioned, configured, and reconfigured to deliver services in a scalable manner, for needs ranging from scientific research to video sharing to e-mail (Wyld, 2009). While usually described as a single entity, cloud computing can comprise several components at once: cloud infrastructure, cloud platform, and cloud application. Cloud infrastructure is the provision of a computer

Government use of cloud computing

Governments, and in particular the United States federal government, have begun to incorporate cloud computing infrastructures into the work of various departments and agencies. Under the leadership of CTO Vivek Kundra, cloud computing is used as a tool to facilitate information sharing, applications processing, and as a cost saving measure from traditional technological architectures. The following section examines the current level of adoption by the federal government, including examples of

Risks specific to government use of cloud computing

The introduction of any new technology to an organization brings many risks associated with the implementation and use. As mentioned in the previous section on risk management, it is important to not only recognize the risks associated with any new or implemented technologies, but to create a strategy that allows organizations to better manage and mitigate these risks. Prior to signing the first contract or agreement, it is vital to have in place a proper risk management program that can

Conclusions

Given the relatively undeveloped and unproven state of federal cloud policies and the widespread unknowns that weave into the question of whether the federal government can successfully identify and manage the risks of working in a cloud environment, proceeding with caution until policies, standards, and technical proficiency are addressed will help the government avoid any unwanted risks. The conventional wisdom at this point suggests that without deliberate planning in scope, deployment,

References (74)

  • D. Beizer

    USA.gov will move to cloud computing

    (2009)
  • P.L. Bernstein

    Against the gods: The remarkable story of risk

    (1998)
  • J. Bertot et al.

    Reconciling government documents and e-Government: Government information in policy, librarianship, and education

    Government Information Quarterly

    (2010)
  • J. Brodkin

    Loss of customer data spurs closure of online storage service “the link up”

    (2008)
  • R. Buyya et al.

    Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities

  • Y.-C. Chen et al.

    Outsourcing for e-Government: managing for success

    Public Performance and Management Review

    (2003)
  • T.D. Clarke et al.

    The outsourcing of information services: transforming the nature of business in the information industry

    Journal of Information Technology

    (1995)
  • R. Cohen

    The U.S. federal government defines cloud computing

    Cloud Computing Journal

    (2009)
  • S. Condon

    Experts: policy could make, break cloud computing

    (2009)
  • M. Cooney

    Lots of excuses, little use of encryption on government mobile computers

    (2008)
  • R. Crandall et al.

    Who pays for universal service?

    (2000)
  • M. Crouhy et al.

    The essentials of risk management

    (2006)
  • N. Cubrilovic

    Letting data die a natural death

    (2009)
  • M. Daconta

    Cloud computing and five other IT fads that aren't always right for government

    (2009)
  • J. Dibbern et al.

    Information systems outsourcing: a survey of analysis of the literature

    The DATABASE for Advances in Information Systems

    (2004)
  • D. Gabel

    Broadband and universal service

    Telecommunications Policy

    (2007)
  • B. Goodwin

    Social networks and government

    (2008)
  • B. Gourley

    Wall Street crisis, enterprise technology and cloud computing

    (2008)
  • A. Greenberg

    If the clouds burst

    (2009)
  • T.H. Grubesic

    The spatial taxonomy of broadband providers in the United States: 1999-2004

    Telecommunications policy

    (2006)
  • E. Hand

    Head in the clouds

    Nature

    (2007)
  • R. Harbick et al.

    Cloud computing: myth or reality?

    (2009)
  • D. Harris

    DISA CIO: Cloud computing “something we absolutely have to do”

    (2008)
  • K. Hart

    Tech firms seek to get agencies on board with cloud computing

    Washington Post

    (2009)
  • J.N. Hoover

    GSA backs away from federal cloud CTO appointment

    (2009)
  • J.B. Horrigan

    Use of cloud computing applications and services

    (2008)
  • J. Jackson

    Agencies tap online channels to spread the word on swine flu outbreak

    (2009)
  • Cited by (251)

    • The adoption of remote work platforms after the Covid-19 lockdown: New approach, new evidence

      2023, Journal of Business Research
      Citation Excerpt :

      This study furthermore extended the applicability of the UTAUT model which is the latest in the IS/IT acceptance area (Maruping et al., 2017) by providing a supplementary validation from an additional field. Prior literature has described the disadvantages remote work technologies such as cloud computing services present, including compromised security and limited privacy on sharing (Chu et al., 2013; Paquette, Jaeger & Wilson 2010; Rong, Nguyen & Jaatun 2013) which negatively affect their perceived values. Although privacy, security, and confidentiality are recognized as key determining factors (Gupta, Seetharaman & Raj, 2013), security and confidentiality are not factors in the adoption of remote work platforms in this case study.

    • A systematic literature Review: Risk analysis in cloud migration

      2022, Journal of King Saud University - Computer and Information Sciences
    View all citing articles on Scopus
    View full text