5 CONCLUSIONS
In this paper we have defined and addressed prob-
lems associated with the so-called ToS threat. The
ToS threat is not exclusive to cloud services, but is
highlighted by the ubiquitousness and proliferation of
cloud based services. The ToS threat is mostly seen
as a threat towards unpaid and publicly available ser-
vices, but the threat is in principle generic.
Our Umbrella Architecture is very much work-
in-progress. The concept seems sound enough, but
more analysis is needed both in terms of services to
be provided and the general usability of the concept.
Clearly, the effectiveness and the efficiency of the ap-
proach must be investigated too. The basic PLaSM
seems feasible and useful, but scalability with respect
to use on multiple platforms must be investigated.
The PoMA and ReMA seems in principle to be inter-
esting and reasonable schemes, but it must be verified
how useful and precise these schemes are in practice.
So we conclude optimistically that we consider
the Umbrella Architecture to be an interesting and
feasible approach, but that it is at a very early stage of
development. Only further study can determine how
practical and useful the architecture really is.
REFERENCES
Bernsmed, K., Jaatun, M., Meland, P., and Undheim, A.
(2011). Security slas for federated cloud services.
In Availability, Reliability and Security (ARES), 2011
Sixth International Conference on, pages 202–209.
Binmore, K. (2007). Playing for real: a text on game the-
ory. Oxford University Press, USA.
Bowers, K. D., Juels, A., and Oprea, A. (2009). Hail: a
high-availability and integrity layer for cloud storage.
In Proceedings of the 16th ACM conference on Com-
puter and communications security, CCS ’09, pages
187–198, New York, NY, USA. ACM.
Braman, S. and Roberts, S. (2003). Advantage isp: Terms of
service as media law. New media & society, 5(3):422–
448.
Burgess, H. and Burgess, G. M. (1997). Encyclopedia of
conflict resolution. Abc-Clio Santa B´arbaraˆ eCalifor-
nia California.
Camerer, C. F. (2011). Behavioral game theory: Exper-
iments in strategic interaction. Princeton University
Press.
Dhingra, M., Lakshmi, J., and Nandy, S. K. (2012). Re-
source usage monitoring in clouds. In Grid Comput-
ing (GRID), 2012 ACM/IEEE 13th International Con-
ference on, pages 184–191.
Emeakaroha, V., Ferreto, T., Netto, M., Brandic, I., and
De Rose, C. (July). Casvid: Application level mon-
itoring for sla violation detection in clouds. In Com-
puter Software and Applications Conference (COMP-
SAC), 2012 IEEE 36th Annual, pages 499–508.
Grandison, T. and Sloman, M. (2000). A survey of trust
in internet applications. Communications Surveys &
Tutorials, IEEE, 3(4):2–16.
HP (2010). HP ProtectTools Security Software; technical
white paper.
ISO/IEC 7498-1 (1994). Information technology – Open
Systems Interconnection – Basic Reference Model:
The Basic Model. In ISO/IEC 7498-1:1994. ISO,
Geneva, Switzerland.
ISO/IEC 9576-1 (1995). Information technology – Open
Systems Interconnection – Connectionless Presenta-
tion protocol: Protocol specification. In ISO/IEC
7498-1:1994. ISO, Geneva, Switzerland.
Jøsang, A. (2010). Subjective logic. CA: University of Oslo.
Jøsang, A., Ismail, R., and Boyd, C. (2007). A survey of
trust and reputation systems for online service provi-
sion. Decision support systems, 43(2):618–644.
Juels, A. and Oprea, A. (2013). New approaches to secu-
rity and availability for cloud data. Commun. ACM,
56(2):64–73.
Køien, G. M. (2011). Reflections on trust in devices: An
informal survey of human trust in an internet-of-things
context. Wireless Personal Communications, 61:495–
510.
Meng, S. and Liu, L. (2012). Enhanced monitoring-as-a-
service for effective cloud management.
Oleshchuk, V. A.and Køien, G. M. (2011). Security and pri-
vacy in the cloud a long-term view. In Wireless Com-
munication, Vehicular Technology, Information The-
ory and Aerospace & Electronic Systems Technology
(Wireless VITAE), 2011 2nd International Conference
on, pages 1–5. IEEE.
Pelechrinis, K., Zadorozhny, V., and Oleshchuk, V. (2011).
Automatic evaluation of information provider reliabil-
ity and expertise. SIS-2011-04-TELE-001-Technical
report.
Rajbhandari, L. and Snekkenes, E. (2012). Intended ac-
tions: Risk is conflicting incentives. In Gollmann, D.
and Freiling, F., editors, Information Security, volume
7483 of Lecture Notes in Computer Science, pages
370–386. Springer Berlin Heidelberg.
Schneier, B. (2013). Terms of service as a security threat.
Subashini, S. and Kavitha, V. (2011). A survey on secu-
rity issues in service delivery models of cloud comput-
ing. Journal of Network and Computer Applications,
34(1):1 – 11.
Thomson, I. (2012). Instagram back-pedals in face of user
outrage.
TrueCrypt Developers Association (2013). Free open-
source disk encryption software.
Zhao, G., Rong, C., Jaatun, M., and Sandnes, F.-E. (2010).
Deployment models: Towards eliminating security
concerns from cloud computing. In High Perfor-
mance Computing and Simulation (HPCS), 2010 In-
ternational Conference on, pages 189–195.
AddressingtheTerms-of-ServiceThreat-Client-sideSecurityandPolicyControlforFreeFileStorageServices
569