
challenges in the IT environment.  In this paper, we 
introduce our new Cloud Computing governance 
model that represents a perspective combination of 
theoretical and practical implementation. We turn 
the Guo’s theoretical model to a practical model to 
enable applying it to the industry. We identify the 
gap using CCM, and then identify controls related to 
each process and its effect using CCM. We add, 
modify and update the missing corners in the model. 
We create a new governance framework. It is a five 
stages framework with a service feedback. Each 
stage has few processes. Each process contains 
controls. Each control has inputs, outputs, and tools 
to activate and measure it. The framework is suitable 
for all Cloud deployment models. In the future, we 
will apply the new governance model and 
framework to all Cloud models (SaaS, PaaS, and 
IaaS). We will specify inputs and outputs to each 
control.  We will define the RACI (Responsible, 
Accountable, Consulted, and Informed) Model and 
identify persons that must be informed and 
accountable based on the deployment model. In 
addition, we will extract and develop SLA from the 
new Cloud governance model. We will relate 
controls effect directly the SLA. 
REFERENCES 
Ahmad, R. and Janczewski, L. 2011. Governance Life 
Cycle Framework for Managing Security in Public 
Cloud: From User Perspective. pp. 372-379. 
Borgman, H. P., Bahli, B., Heier, H. and Schewski, F. 
2013. Cloudrise: Exploring Cloud Computing 
Adoption and Governance with the TOE Framework. 
pp. 4425-4435. 
Buyya, R., Broberg, J. and Goscinski, A. 2011. Cloud 
computing. Hoboken, N.J.: Wiley. 
Cloudsecurityalliance.org. 2011. Cloud Controls Matrix 
(CCM): Cloud Security Alliance. [online] Available at: 
https://Cloudsecurityalliance.org/research/ccm/. 
Cloudusecases.org. 2010. Cloud Computing Use Cases 
group. [online] Available at: http://Cloudusecases.org. 
Copie, A., Fortis, T., Munteanu, V. I. and Negru, V. 2013. 
From Cloud Governance to IoT Governance. pp. 
1229-1234. 
Enisa.europa.eu. 2014. Cloud Computing Risk Assessment 
— ENISA. [online] Available at: http:// 
www.enisa.europa.eu/activities/risk-management/files/ 
deliverables/Cloud-computing-risk-assessment. 
Foster, I., Zhao, Y., Raicu, I. and Lu, S. 2008. Cloud 
Computing and grid computing 360-degree compared. 
pp. 1-10. 
Furht, B. and Escalante, A. 2010. Handbook of Cloud 
computing. New York: Springer. 
Guidelines on Security and Privacy in Public Cloud 
Computing. 2011. [e-book] USA: NIST. Available 
through: 
http://csrc.nist.gov/publications/PubsSPs.html 
http://csrc.nist.gov/publications/nistpubs/800-
144/SP800-144.pdf. 
Guo, Z., Song, M. and Song, J. 2010. A governance model 
for Cloud computing. pp. 1-6. 
Heier, H., Borgman, H. P. and Bahli, B. 2012. Cloudrise: 
Opportunities and Challenges for IT Governance at the 
Dawn of Cloud Computing. pp. 4982-4991. 
IT Control Objectives for Cloud Computing: Controls and 
Assurance in the Cloud. 2011. [e-book] ISACA. 
http://www.isaca.org/Knowledge-Center/Research/ 
ResearchDeliverables/Pages/IT-Control-Objectives-
for-Cloud-Computing-Controls-and-Assurance-in-the-
Cloud.aspx. 
Li, J. Z., Chinneck, J., Woodside, M. and Litoiu, M. 2009. 
Deployment of services in a Cloud subject to memory 
and license constraints. pp. 33-40. 
Li, X., Zhou, L., Shi, Y. and Guo, Y. 2010. A trusted 
computing environment model in Cloud architecture. 6 
pp. 2843-2848. 
Mather, T., Kumaraswamy, S. and Latif, S. 2009. Cloud 
security and privacy. Beijing: O'Reilly. 
Mcwiliams, G. and White, J. 1999. Dell to derail: Get into 
gear online. Wall Street Journal. 
Mell, P. and Grance, T. 2011. The NIST definition of 
Cloud computing. Gaithersburg, MD: Computer 
Security Division, Information Technology 
Laboratory, National Institute of Standards and 
Technology. 
Morin, J., Aubert, J. and Gateau, B. 2012. Towards Cloud 
Computing SLA risk management: issues and 
challenges. pp. 5509-5514. 
Mukherjee, K. and Sahoo, G. 2010. Cloud Computing: 
Future Framework for e-Governance. International 
Journal of Computer Applications, 7 (7), pp. 31-34. 
NIST Cloud Computing Security Reference Architecture. 
2012. [e-book] USA: NIST. Available through: 
http://csrc.nist.gov/publications/PubsSPs.html, http:// 
collaborate.nist.gov/twiki-Cloud-computing/pub/ 
CloudComputing/CloudSecurity/NIST_Security_Refe
rence_Architecture_2013.05.15_v1.0.pdf. 
Popovic, K. and Hocenski, Z. 2010. Cloud Computing 
security issues and challenges. pp. 344-349. 
Sahibudin, S., Sharifi, M. and Ayat, M. 2008. Combining 
ITIL, COBIT and ISO/IEC 27002 in order to design a 
comprehensive IT framework in organizations. pp. 
749-753. 
Workshop 116, Security, Openness and Privacy – Cloud 
Governance. 2011. Internet Governance Forum. 
[online] Available at: http://igf.wgig.org/cms/ 
component/chronocontact/?chronoformname=WSProp
osals2011View&wspid=116. 
 
CLOSER2014-4thInternationalConferenceonCloudComputingandServicesScience
678