
discussions. It also reviews the previous work for the 
development  framework  and  proposes  the 
requirements for the next phase, CCAF Version 2. 
4  CONCLUSION AND FUTRUE 
WORK 
This  paper  provides  a  strategic  overview  and 
direction  for  the  improved  Cloud  Computing 
Adoption  Framework  update  1  (CCAF  1.1),  in 
which  the  emphasis  is  on  the  update  on  security 
policy,  technologies  and  techniques  used.  The 
security  recommendation  and  updates  can  help 
organizations building  and  offering better  protected 
services.  Different  types  of  technologies  and 
techniques have been  discussed. The  proposed Fine 
Grained  Security  Model  (FGSM)  offers  multi-
layered  security  and  is  a  suitable  solution  in  the 
deployment  of  Cloud  Computing  services,  since 
each  single  solution  has  its  weakness.  The  core 
technology  in  each  layer  of  FGSM  have  been 
described and justified, which includes the firewall, 
the identity management and convergent encryption. 
The combination of three main security solutions in 
FGSM can enforce security service. 
The FGSM prototype will be developed and then 
thoroughly  tested  in  the  laboratory  conditions.  We 
plan  to  use  ethical  hacking  and  penetration  testing 
approached  to  test  the  robustness  of  our  FGSM 
security.  This  will  be  fully  implemented  in  our 
CCAF  and  eventually  the  development  of  Resilient 
Computing.  If  the  results  are  positively  in  favor  of 
our  prototype  and  security  strategy,  we  will  update 
our  recommendation,  results  and  guidelines,  which 
will be developed into CCAF Version 2. 
REFERENCES 
Armbrust, M.,  Fox,  A.,  Griffith, R.,  Joseph, A. D.,  Katz, 
R., Konwinski, A., ... & Zaharia, M., 2010. A view of 
cloud computing. Communications of the ACM, 53(4), 
50-58. 
Chang,  V.,  2014  a.  Cloud  Computing  for  brain 
segmentation – a perspective from the technology and 
evaluations.  International  Journal  of  Big  Data 
Intelligence, 1, (4), 192-204.  
Chang, V., 2014 b. The business intelligence as a service 
in  the  cloud. Future Generation Computer 
Systems, 37, 512-534. 
Chang, V., 2015. A Proposed Cloud Computing Business 
Framework,  ISBNs:  9781634820172  (print),  Nova 
Science Publisher. 
Chang, V., Li, C. S., De Roure, D., Wills, G., Walters, R. 
J.,  &  Chee,  C.,  2012.  The  financial  clouds  review. 
Cloud  Computing  Advancements  in  Design, 
Implementation, and Technologies, 125. 
Chang,  V.,  Walters,  R.  J.  &  Wills,  G.,  2013  a.  The 
development  that  leads  to  the  Cloud  Computing 
Business  Framework.  International  Journal  of 
Information Management, June, 33, (3), 524-538. 
Chang,  V.,  Walters,  R.  J.  &  Wills,  G.,  2013  b.  Cloud 
Storage  and  Bioinformatics  in  a  private  cloud 
deployment:  Lessons  for  Data  Intensive  research.  In, 
Cloud  Computing  and  Service  Science,  Springer 
Lecture Notes Series, Springer Book. 
Chang, V. & Ramachandran, M.,  Towards achieving Big 
Data  Security  with  the  Cloud  Computing  Adoption 
Framework,  IEEE  Transactions  on  Services 
Computing, forthcoming. 
DataLossDB.org  survey,  2013,  accessible  on 
http://datalossdb.org/us_states in 2013.  
IBM,  2010.  Defining  a  framework  for  cloud  adoption, 
technical report.  
Khajeh-Hosseini,  A.,  Greenwood,  D.,  &  Sommerville,  I., 
2010,  July.  Cloud  migration:  A  case  study  of 
migrating  an  enterprise  it  system  to  iaas.  In  Cloud 
Computing  (CLOUD),  2010  IEEE  3rd  International 
Conference on (pp. 450-457). 
Li,  C.  S,  2014.  Resilient  Computing,  technical  report, 
IBM.  
Low,  C.,  Chen,  Y.,  &  Wu,  M.,  2011.  Understanding  the 
determinants  of  cloud  computing  adoption. Industrial 
management & data systems, 111(7), 1006-1023. 
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & 
Ghalsasi,  A.,  2011.  Cloud  computing—The  business 
perspective. Decision Support Systems,51(1), 176-189. 
Parducci,  B.,  Lockhart,  H.,  Levinson,  R.,  2013.  OASIS 
eXtensible  Access  Control  Markup  Language 
(XACML)  TC,  technical  report,  accessible  on 
https://www.oasis-
open.org/committees/tc_home.php?wg_abbrev=xacml. 
Ramachandran, M., & Chang, V. 2014. Financial Software 
as  a  Service–A  Paradigm  for  Risk  Modelling  and 
Analytics.  International Journal of Organizational 
and Collective Intelligence 4(3). 
Velte,  T.,  Velte,  A.,  &  Elsenpeter,  R.,  2009. Cloud 
computing, a practical approach. McGraw-Hill, Inc. 
Weinhardt,  C.,  Anandasivam,  D.  I.  W.  A.,  Blau,  B., 
Borissov, D. I. N., Meinl, D. M. T., Michalk, D. I. W. 
W.,  &  Stößer,  J.,  2009.  Cloud  computing–a 
classification,  business  models,  and  research 
directions. Business  &  Information  Systems 
Engineering, 1(5), 391-399. 
TheImprovedCloudComputingAdoptionFrameworktoDeliverSecureServices
79