challenges in the IT environment. In this paper, we
introduce our new Cloud Computing governance
model that represents a perspective combination of
theoretical and practical implementation. We turn
the Guo’s theoretical model to a practical model to
enable applying it to the industry. We identify the
gap using CCM, and then identify controls related to
each process and its effect using CCM. We add,
modify and update the missing corners in the model.
We create a new governance framework. It is a five
stages framework with a service feedback. Each
stage has few processes. Each process contains
controls. Each control has inputs, outputs, and tools
to activate and measure it. The framework is suitable
for all Cloud deployment models. In the future, we
will apply the new governance model and
framework to all Cloud models (SaaS, PaaS, and
IaaS). We will specify inputs and outputs to each
control. We will define the RACI (Responsible,
Accountable, Consulted, and Informed) Model and
identify persons that must be informed and
accountable based on the deployment model. In
addition, we will extract and develop SLA from the
new Cloud governance model. We will relate
controls effect directly the SLA.
REFERENCES
Ahmad, R. and Janczewski, L. 2011. Governance Life
Cycle Framework for Managing Security in Public
Cloud: From User Perspective. pp. 372-379.
Borgman, H. P., Bahli, B., Heier, H. and Schewski, F.
2013. Cloudrise: Exploring Cloud Computing
Adoption and Governance with the TOE Framework.
pp. 4425-4435.
Buyya, R., Broberg, J. and Goscinski, A. 2011. Cloud
computing. Hoboken, N.J.: Wiley.
Cloudsecurityalliance.org. 2011. Cloud Controls Matrix
(CCM): Cloud Security Alliance. [online] Available at:
https://Cloudsecurityalliance.org/research/ccm/.
Cloudusecases.org. 2010. Cloud Computing Use Cases
group. [online] Available at: http://Cloudusecases.org.
Copie, A., Fortis, T., Munteanu, V. I. and Negru, V. 2013.
From Cloud Governance to IoT Governance. pp.
1229-1234.
Enisa.europa.eu. 2014. Cloud Computing Risk Assessment
— ENISA. [online] Available at: http://
www.enisa.europa.eu/activities/risk-management/files/
deliverables/Cloud-computing-risk-assessment.
Foster, I., Zhao, Y., Raicu, I. and Lu, S. 2008. Cloud
Computing and grid computing 360-degree compared.
pp. 1-10.
Furht, B. and Escalante, A. 2010. Handbook of Cloud
computing. New York: Springer.
Guidelines on Security and Privacy in Public Cloud
Computing. 2011. [e-book] USA: NIST. Available
through:
http://csrc.nist.gov/publications/PubsSPs.html
http://csrc.nist.gov/publications/nistpubs/800-
144/SP800-144.pdf.
Guo, Z., Song, M. and Song, J. 2010. A governance model
for Cloud computing. pp. 1-6.
Heier, H., Borgman, H. P. and Bahli, B. 2012. Cloudrise:
Opportunities and Challenges for IT Governance at the
Dawn of Cloud Computing. pp. 4982-4991.
IT Control Objectives for Cloud Computing: Controls and
Assurance in the Cloud. 2011. [e-book] ISACA.
http://www.isaca.org/Knowledge-Center/Research/
ResearchDeliverables/Pages/IT-Control-Objectives-
for-Cloud-Computing-Controls-and-Assurance-in-the-
Cloud.aspx.
Li, J. Z., Chinneck, J., Woodside, M. and Litoiu, M. 2009.
Deployment of services in a Cloud subject to memory
and license constraints. pp. 33-40.
Li, X., Zhou, L., Shi, Y. and Guo, Y. 2010. A trusted
computing environment model in Cloud architecture. 6
pp. 2843-2848.
Mather, T., Kumaraswamy, S. and Latif, S. 2009. Cloud
security and privacy. Beijing: O'Reilly.
Mcwiliams, G. and White, J. 1999. Dell to derail: Get into
gear online. Wall Street Journal.
Mell, P. and Grance, T. 2011. The NIST definition of
Cloud computing. Gaithersburg, MD: Computer
Security Division, Information Technology
Laboratory, National Institute of Standards and
Technology.
Morin, J., Aubert, J. and Gateau, B. 2012. Towards Cloud
Computing SLA risk management: issues and
challenges. pp. 5509-5514.
Mukherjee, K. and Sahoo, G. 2010. Cloud Computing:
Future Framework for e-Governance. International
Journal of Computer Applications, 7 (7), pp. 31-34.
NIST Cloud Computing Security Reference Architecture.
2012. [e-book] USA: NIST. Available through:
http://csrc.nist.gov/publications/PubsSPs.html, http://
collaborate.nist.gov/twiki-Cloud-computing/pub/
CloudComputing/CloudSecurity/NIST_Security_Refe
rence_Architecture_2013.05.15_v1.0.pdf.
Popovic, K. and Hocenski, Z. 2010. Cloud Computing
security issues and challenges. pp. 344-349.
Sahibudin, S., Sharifi, M. and Ayat, M. 2008. Combining
ITIL, COBIT and ISO/IEC 27002 in order to design a
comprehensive IT framework in organizations. pp.
749-753.
Workshop 116, Security, Openness and Privacy – Cloud
Governance. 2011. Internet Governance Forum.
[online] Available at: http://igf.wgig.org/cms/
component/chronocontact/?chronoformname=WSProp
osals2011View&wspid=116.
CLOSER2014-4thInternationalConferenceonCloudComputingandServicesScience
678