skip to main content
10.1145/3018896.3036394acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Cloud data governance maturity model

Published:22 March 2017Publication History

ABSTRACT

To ensure data governance in cloud computing, it is important to build-in data governance in the planning, strategy and the design phases of cloud computing and adapt a data governance program architecture which makes sure that regular and governance related tasks, are deployed correctly. Cloud data governance requirements must be linked to the business goals in organisations, when they adopt cloud computing. Cloud data governance is an executive level concern in many organisations today, but a method for credible, reliable, and cost-efficient cloud data governance maturity assessment has been lacking. In order to identify and explore the strength and weaknesses of a particular organization's data governance in cloud computing, this paper proposed as a cloud data governance maturity model and is intended as a tool to evaluate the ability of organizations to meet the objectives of data governance for cloud computing. The maturity model helps organisations understand their current level of data governance before and after adopting cloud computing based on key dimension for cloud data governance. More importantly, the cloud data governance maturity model can identify a path for future growth in, an organisation toward the ultimate goal which invariably follows an understood and established path. This paper will describe the cloud data governance maturity model and explains how organizations can leverage it to help them govern the use of data more effectively in the cloud environment.

References

  1. I. A. T. Hashem, I. Yaqoob, N. Badrul Anuar, S. Mokhtar, A. Gani, and S. Ullah Khan, "The rise of `Big Data' on cloud computing: Review and open research issues," Inf. Syst., vol. 47, pp. 98--115, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Badger, T. Grance, R. Patt Corner, and J. Voas, "Cloud Computing Synopsis and Recommendations," Recomm. Natl. Inst. Stand. Technol., vol. C O M P, p. 84, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Bannerman, "Cloud computing adoption risks: state of play," Governance, vol. 3, no. September, pp. 0--2, 2010.Google ScholarGoogle Scholar
  4. M. Al-Ruithe, E. Benkhelifa, and K. Hameed, "A conceptual framework for designing data governance for cloud computing," Procedia Comput. Sci., vol. 94, no. MobiSPC, pp. 160--167, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  5. R. K. L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B. S. Lee, "TrustCloud: A framework for accountability and trust in cloud computing," Proc. - 2011 IEEE World Congr. Serv. Serv. 2011, pp. 584--588, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing - The business perspective," Decis. Support Syst., vol. 51, pp. 176--189, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Mell and T. Grance, "The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology," Nist Spec. Publ., vol. 145, p. 7, 2011.Google ScholarGoogle Scholar
  8. H. Hint, "Data Governance," pp. 41--57, 2012.Google ScholarGoogle Scholar
  9. M. Felici, T. Koulouris, and S. Pearson, "Accountability for Data Governance in Cloud Ecosystems," 2013 IEEE 5th Int. Conf. Cloud Comput. Technol. Sci., pp. 327--332, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Ahmad and L. Janczewski, "Governance life cycle framework for managing security in Public Cloud: From user perspective," Proc. - 2011 IEEE 4th Int. Conf. Cloud Comput. CLOUD 2011, pp. 372--381, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Wende and B. Otto, "A contingency approach to data governance," Proceedings, 12th Int. Conf. Inf. Qual. (ICIQ-07), Cambridge, USA, p. 14, 2007.Google ScholarGoogle Scholar
  12. The Data Governance Institute, "Definitions of Data Governance," 2015. {Online}. Available: http://www.datagovernance.com/adg_data_governance_definition/. {Accessed: 16-Feb-2015}.Google ScholarGoogle Scholar
  13. K. Wende, "A Model for Data Governance - Organising Accountabilities for Data Quality Management," Corp. Gov., pp. 417--425, 2007.Google ScholarGoogle Scholar
  14. W. L. Ioisu, "Governance Model of Cloud Computing Service," Natl. Pingtung Univ. Sci. Technol., vol. 2, no. 7698, 2012.Google ScholarGoogle Scholar
  15. Cloud Security Alliance, "Cloud Data Governance Working Group," 2015. {Online}. Available: https://cloudsecurityalliance.org/group/cloud-data-governance/. {Accessed: 12-Jun-2015}.Google ScholarGoogle Scholar
  16. B. Mary, P. Mccarthy, and S. Hill, "Cloud Adoption Points to IT Risk and Data Governance Challenges," Directorship, no. September 2010, pp. 2011--2011, 2011.Google ScholarGoogle Scholar
  17. Al-ruithe, Majid; Benkhelifa, Elhadj; Hameed, Khawar "Key Dimensions for Cloud Data Governance," in The IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud 2016), 2016.Google ScholarGoogle Scholar
  18. R. Nolan, "Managing the computer resource: a stage hypothesis," Commun. ACM, vol. 16, no. 7, pp. 399--405, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. V. V. García, E. J. F. Vicente, and L. U. Aragonés, "Maturity Model for IT Service Outsourcing in Higher Education Institutions," Int. J. Adv. Comput. Sci. Appl. - IJACSA, vol. 4, no. 10, pp. 39--45, 2013.Google ScholarGoogle Scholar
  20. N. Frick, "Identification of Design Elements for a Maturity Model for Interorganizational Integration: a Comparative Analysis," Proc. 25th Bled eConference, eDependability, eProcesses Eser. Futur., pp. 185--196, 2012.Google ScholarGoogle Scholar
  21. M. Saleh, "Information Security Maturity Model," Int. J. Comput. Sci. Secur. ..., no. 5, pp. 316--337, 2011.Google ScholarGoogle Scholar
  22. F. Hamel and T. Herz, "IT evaluation in business groups: a maturity model," Proc. 28th ..., pp. 1410--1417, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Caralli, M. Knight, and A. Montgomery, "Maturity models 101: a primer for applying maturity models to smart grid security, resilience, and interoperability," no. November, pp. 1--10, 2012.Google ScholarGoogle Scholar
  24. A. Duarte and M. M. Da Silva, "Cloud maturity model," IEEE Int. Conf. Cloud Comput. CLOUD, pp. 606--613, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. Miguel, C. Saraiva, and E. Committee, "OpenSSL acceleration using Graphics Processing Units Thesis to obtain the Master of Science Degree in Information Systems and Computer Engineering," no. October, 2013.Google ScholarGoogle Scholar
  26. and D.-W. I. J. P. Becker, Jörg, Ralf Knackstedt, "Developing Maturity Models for IT Management - A Procedure Model and its Application," Bus. Inf. Syst. Eng., no. 1.3, pp. 213--222, 2009.Google ScholarGoogle Scholar
  27. D. Sprovieri and S. Vogler, "Combining Business Processes and Cloud Services: A Marketplace for Processlets," vol. 2015, pp. 1--12, 2015.Google ScholarGoogle Scholar
  28. Stanford_University, "Data Governance Maturity Model Guiding Questions for each Component-Dimension Foundational," 2011.Google ScholarGoogle Scholar
  29. Nascio, "Data Governance Part II : Maturity Models - A Path to Progress," NASCIO Gov. Ser., no. 859, pp. 1--30, 2009.Google ScholarGoogle Scholar
  30. IBM Institute for Business Value and IBM Strategy and Change, "The IBM Data Governance Council Maturity Model : Building a roadmap for effective data governance," Gov. An Int. J. Policy Adm., no. October, pp. 1--16, 2007.Google ScholarGoogle Scholar
  31. E. Nfuka and L. Rusu, "Critical Success Factors for Effective IT Governance in the Public Sector Organizations in a Developing Country: The Case of Tanzania," 18th Eur. Conf. Inf. Syst., 2010.Google ScholarGoogle Scholar
  32. D. Smits and J. van Hillergersberg, "IT Governance Maturity : Developing a Maturity Model using the Delphi Method," 48th Hawaii Int. Conf. Syst. Sci., pp. 4534--4544, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. R. S. Debreceny and G. L. Gray, "IT Governance and Process Maturity: A Multinational Field Study.," J. Inf. Syst., vol. 27, no. 1, pp. 157--188, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  34. T. Almarabeh and A. AbuAli, "A General Framework for E-Government : Definition Maturity Challenges, Opportunities, and Success," Eur. J. Sci. Res., vol. 39, no. 1, pp. 29--42, 2010.Google ScholarGoogle Scholar
  35. A. Fath-allah, L. Cheikhi, R. E. Al-qutaish, and A. Idri, "E-Government Maturity Models: A Comparative Study," Int. J. Softw. Eng. Appl. (IJSEA), May 2014, vol. 5, no. 3, pp. 71--91, 2014.Google ScholarGoogle Scholar
  36. DataFlux, "The Data Governance Maturity Model," DataFlux White Pap., vol. 44, no. 0, p. 11, 2007.Google ScholarGoogle Scholar
  37. H. Trivedi., "Cloud Adoption Model for Governments and Large Enterprises," Mit, no. May, p. 82, 2013.Google ScholarGoogle Scholar
  38. B. P. Rimal, A. Jukan, D. Katsaros, and Y. Goeleven, "Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach," J. Grid Comput., vol. 9, pp. 3--26, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. S. Groß and A. Schill, "Towards user centric data governance and control in the cloud," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7039 LNCS, pp. 132--144, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Yale; Wendy., "Is data governance in cloud computing still a mirage or do we have a vision we can trust," vol. 42.1, 2011.Google ScholarGoogle Scholar
  41. M. K. Sein, O. Henfridsson, and M. Rossi, "R Esearch E Ssay a Ction D Esign R Esearch 1," vol. 35, no. 1, pp. 37--56, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. W. Chen, "Kalido Data Governance Maturity Model," Kalido, no. September, 2010.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing
    March 2017
    1349 pages
    ISBN:9781450347747
    DOI:10.1145/3018896

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 22 March 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    ICC '17 Paper Acceptance Rate213of590submissions,36%Overall Acceptance Rate213of590submissions,36%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader