out that public sector is a unique environment which
with its particular characteristics is considered to be
an ideal area for application of Cloud computing,
however, it accordingly creates particular challenges
(The Center for Digital Government, 2009). In order
to achieve the projected targets it is also important to
comprehend the risks involved as well as develop
appropriate plans that will help to reduce their
possibility. It is crucial for increased success and
appropriate return of investment (CISCO, 2010).
Risk management involves identifying and
assessing risks, and taking the necessary steps to
reduce them to an acceptable level. Throughout the
system lifecycle, all identified risks that are
identified must be carefully balanced against the
security and privacy controls available and the
expected benefits (See Table 1).
Table 1: Security controls and expected benefits.
Security controls available
• The characteristic system
complexity of a Cloud
computing environment, and
the dependency on the
correctness of these
components and the
interactions among them;
• The dependency on the
service provider to retain
logical separation in a
multi-tenant environment
(n.b., not unique to the
Cloud computing model);
• The necessity to ensure
that the organization will
retain an appropriate level
of control to achieve
situational awareness,
consider alternatives, set
priorities, and implement
changes in security and
privacy that are in the best
interest of the organization.
• The ability to concentrate
resources on areas of high
significance as more general
security services are assumed
by the Cloud provider;
• Potential platform
strength achieved by having
greater uniformity and
homogeneity, and resulting
improved information
assurance, security response,
system management,
reliability, and
maintainability;
• Improved resource
availability through
scalability, redundancy and
disaster recovery capabilities;
improved resilience to
unexpected level of service
demand;
• Improved backup and
recovery capabilities,
policies, procedures and
consistency;
• Ability to leverage
alternate Cloud services to
improve the overall security
condition, including that of
traditional data centers.
The privacy of data is the most significant and
important prerequisite. Although challenges in
public sector do not differ from private sector yet the
matters of supply and security in this field are more
pronounced. Government institutions are responsible
for the safety of personal information of citizens and
they must ensure high level of availability of critical
public infrastructure (Chandrasekaran and Kapoor,
2010). Eggers (2011) also points out that the greatest
limitation to extensive use of Cloud in local
governments is exactly security because the
information that contains personal data available to
the government has to be confidential (Eggers,
2011).
National and economic security of the country is
dependent on the strict and consequent approach to
IT security and data confidentiality. Political matters
and domestic conditions are additional factors that
present a question associated with actual physical
location of cloud-based resources (CISCO, 2010).
State authorities and local governments are at
times being reserved concerning Cloud strategy by
basing their concerns on requirements of security,
legal and regulative compliances (Hodgkinson,
2012).
Security has always been topical, however, the
security requirements and solutions have changed
with time, and they have to suit the requirements of
Cloud computing and system threats. Appropriate
security is crucial to success of Cloud application or
other solution on the operation of any government.
5 CONCLUSIONS
In conclusion it is important to point out that there is
no common solution that can be applied to all local
governments and state institutions, however, all
those that have implemented this solution early on,
have achieved significant and fortunate results.
Key security considerations include the need for
local governments to:
1. Be educated about the issues associated with
Cloud computing, specifically the
opportunities, risks and current best practice;
2. Accurately determine security requirements
during the initial planning stage at the start of
the systems development life cycle;
3. Determine the degree to which negotiated
service agreements are required to satisfy
security requirements; and the alternatives of
using negotiated service agreements or cloud
computing deployment models which offer
greater cleamess and control over security;
4. Assess the extent to which the server and
computing environment of business users and
consumers meets organizational security
requirements;
5. Continue to maintain security management
practices, controls, and accountability over the
security of data and applications; and to
improve data security for the infrastructure
services and users documents and improve
Local Governments and Cloud Computing Security
287