11 ways to boost cloud adoption in government

The Brookings Institution seeks to improve cloud computing in public sector

The federal government has inconsistent policies across desktop, laptop, mobile and cloud computing platforms, which in some respects puts cloud applications at a disadvantage in current legal and procurement situations, according to a Brookings Institution report released today.

There are differences between the executive, legislative, and judicial branches of government, as well as in the level of privacy and security expected for various applications, writes Darrell West author of the report “Steps to Improve Cloud Computing in the Public Sector.”

“The public sector makes relatively little use of cloud computing even though the private sector has achieved excellent cost savings and studies have suggested substantial government savings from a migration to the cloud,” according to West, vice president and director of Governance Studies at Brookings.

West’s report "Saving Money Through the Cloud,” indicated that agencies could save as much as 50 percent in information technology costs by moving certain applications and services to the cloud. The cloud computing model allows organizations to access software, services, and data storage through remote file servers.


Related stories:

House panel questions cloud computing assumptions


But several aspects of the current computing environment impede the progress of cloud. With the considerable uncertainty that exists in regard to the reliability and security of information technology, officials need to think about how to instill greater confidence among consumers and taxpayers, the report states.

"There should be detailed conversations regarding the trade-offs between privacy and security," West wrote. In addition, the lack of uniformity in standards across nations has created a “Tower of Babel” atmosphere among cloud computing environments, he found.

His recommendations:

  1. Public officials should develop more consistent rules on computing across desktop, laptop, mobile, and cloud platforms.
  2. Policymakers should authorize video, collaboration, and social networking for congressional offices. This would make legislative branch policy consistent with that of the executive branch.
  3. Judicial branch computing should be modernized, with greater emphasis on cloud computing.
  4. There should be a more uniform certification process for federal agencies. Right now, each agency is responsible for certifying its own applications. It makes sense to have a joint authorization board with the power to review management services and certify particular products for use across the government.
  5. Congress should update the Electronic Communications Privacy Act to change the process by which law enforcement agents obtain electronic information. Instead of using a prosecutor’s subpoena, legislation should require a probable-cause search warrant that is approved by a judge. This would provide greater safeguards for online content, pictures, geolocation data, and e-mail messages.
  6. Privacy rights should be placed on the same footing regardless of whether a person is using desktop or cloud computing. It makes little sense to have weaker standards on one platform than another. Consumers and government decision-makers expect the same level of protection whether they are accessing information on a desktop, laptop, mobile, or cloud storage system.
  7. Congress should amend the Computer Fraud and Abuse Act to strengthen penalties for unwanted intrusion into computing systems. The law has inconsistent penalties and prosecutors have found that it is hard to prosecute cyber crimes.
  8. Apps.gov represents a big step forward and government organizations should use it more because it makes procurement easier and speeds public-sector innovation. It is a model of how the government can reinvent itself through digital technology in ways that improve efficiency and effectiveness.
  9. Countries need to harmonize their laws on cloud computing so as to reduce current inconsistencies in regard to privacy, data storage, security processes, and personnel training,
  10. There should be mechanisms for data exchange that encourage portability across platforms. We should avoid vendor lock-in that precludes data exchange.
  11. Data on uptime, downtime, recover time, archiving and maintenance schedules would help build public trust by providing information on computing performance.

About the Author

Rutrell Yasin is is a freelance technology writer for GCN.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Fri, Jul 23, 2010

You would hope that the security issues are resolved BEFORE the Court system uses cloud computing--otherwise we could have a divorce case sentencing you to 5 years in Folsom.

Thu, Jul 22, 2010

NHTSA has a methodology called the Readiness for Cloud Methodology (RCM) that helps them walk through a formal study on whether they are organizationally ready for using cloud services and what adjustments need to be made. The RCM helps them figure out if they have the right budgeting and provisioning processes, the right organizational model and performance plans for employees, and the right management decision making and reporting processes and capabilities to successfully transition to being a receiver of cloud services rather than a provider of infrastructure services.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group