Securing e-Government and e-Voting with an open cloud computing architecture

Abstract The idea, the concept, and the term, that is cloud computing, has recently passed into common currency and the academic lexicon in an ambiguous manner, as cloud dust is being sprinkled on an excess of emerging products. Exorcising complexity and protecting against the caprice of the moment, this paper explores the notion behind the hype of cloud computing and evaluates its relevance to electronic government and electronic voting information systems. This paper explores increasing participation and sophistication of electronic government services, through implementing a cloud computing architecture. From an Information and Communication Security perspective, a structured analysis is adopted to identify vulnerabilities, involved in the digitalization of government transactions and the electoral process, exploring the notion of trust and transparency within this context. In turn, adopting a cloud computing approach for electronic government and electronic voting solutions is investigated, reviewing the architecture within the previously described context. Taking a step further, this paper proposes a high level electronic governance and electronic voting solution, supported by cloud computing architecture and cryptographic technologies, additionally identifying issues that require further research.

[1]  Paul T. Jaeger,et al.  The endless wire: e-government as global phenomenon , 2003, Gov. Inf. Q..

[2]  Joe Mohen,et al.  The case for internet voting , 2001, CACM.

[3]  William C. Barker Guideline for Identifying an Information System as a National Security System , 2003 .

[4]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[5]  Richard Heeks Information Systems and Public Sector Accountability , 2004 .

[6]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[7]  Jorge Marcelo Montagna,et al.  A framework for the assessment and analysis of electronic government proposals , 2005, Electron. Commer. Res. Appl..

[8]  Lorrie Faith Cranor,et al.  In Search of the Perfect Voting Technology: No Easy Answers , 2003, Secure Electronic Voting.

[9]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[10]  Richard Heeks Understanding e-Governance for Development , 2001 .

[11]  Thomas M. Buchsbaum E-Voting: International Developments and Lessons Learnt , 2004, Electronic Voting in Europe.

[12]  Karen A. Scarfone,et al.  SP 800-46 Rev. 1. Guide to Enterprise Telework and Remote Access Security , 2009 .

[13]  William C. Barker,et al.  Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories , 2008 .

[14]  Victor Bekkers,et al.  Electronic Service Delivery in Public Administration: Some Trends and Issues , 1999 .

[15]  Regina Bernhaupt,et al.  Broadening eParticipation: Rethinking ICTs and Participation , 2006 .

[16]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[17]  Richard Heeks,et al.  Building e-Governance for Development: A Framework for National and Donor Action , 2001 .

[18]  John Carlo Bertot,et al.  The chief information officer (CIO): assessing its impact , 2000, Gov. Inf. Q..

[19]  Dimitris Gritzali,et al.  Principles and requirements for a secure e-voting system , 2002, Comput. Secur..

[20]  Merle S. King,et al.  Implementing voting systems: the Georgia method , 2004, CACM.

[21]  B. Obama,et al.  Office of the Press Secretary , 2009 .

[22]  Gino Verleye,et al.  User-centered E-Government in practice: A comprehensive model for measuring user satisfaction , 2009, Gov. Inf. Q..

[23]  Marianne M. Swanson,et al.  Recommended Security Controls for Federal Information Systems , 2005 .

[24]  Danny Williams,et al.  Cloud Application Architectures: Building Applications and Infrastructure in the Cloud , 2009 .

[25]  Jeremy Rose,et al.  Characterizing eParticipation , 2007, Int. J. Inf. Manag..

[26]  Andreu Riera,et al.  Bringing Confidence to Electronic Voting , 2003 .

[27]  Unpan Benchmarking E-government: A Global Perspective , 2022 .

[28]  D. Jefferson,et al.  Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .

[29]  Ann Macintosh,et al.  Procedural security in electronic voting , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[30]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality of Delivering Computing as the 5th Utility , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[31]  K. Deutsch The nerves of government : models of political communication and control , 1965 .

[32]  Maria Wimmer,et al.  Integrated Service Modeling for Online One-stop Government , 2002, Electron. Mark..

[33]  Mete Yildiz,et al.  E-government research: Reviewing the literature, limitations, and ways forward , 2007, Gov. Inf. Q..