we intend to include historical monitoring and
remediation data to perform broader threat analysis.
ACKNOWLEDGEMENTS
The research was partially supported by the grant
FP7-ICT-2013-11-610795 (SPECS).
REFERENCES
Addis, B., Ardagna, D., Panicucci, B., Zhang, L., 2010.
Autonomic management of cloud service centers with
availability guarantees. In CLOUD'10, Proceedings of
the 2010 IEEE 3
rd
International Conference on Cloud
Computing, IEEE.
Albeshri, A., Boyd, C., Gonzáles Nieto, J., 2014.
Enhanced GeoProof: Improved geographic assurance
for data in the cloud. International Journal of
Information Security 13(2):191-198.
Arcieri T., 2013. What's wrong with in-browser
cryptography. http://tonyarcieri.com/whats-wrong-
with-webcrypto.
Ateniese, G., Burns, R., Curtmola, R., Herring, J., 2007.
Provable data possession at untrusted stores. In
CCS'07, Proceedings of the 14
th
ACM Conference on
Computer and Communications Security, ACM.
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan,
O., Kissner, L., Peterson, Z., Song, D., 2011. Remote
data checking using provable data possessions.
Transactions in Information and System Security
14(1):1-34, ACM.
Badidi, E., 2013. A cloud service broker for SLA-based
SaaS provisioning. In Proceedings of the 2013
International Conference on Information Society,
IEEE.
Bonvin, N., Papaioannou, T. G., Aberer, K., 2011.
Autonomic SLA-driven provisioning for cloud
applications. In CCGRID'11, Proceedings of the 2011
11
th
IEEE/ACM International Symposium on Cluster,
Cloud and Grid Computing, IEEE.
Bowers, K. D., Juels, A., Oprea, A., 2009. Proofs of
Retrievability: Theory and implementation. In
CCSW'09, Proceedings of the 2009 ACM Workshop on
Cloud Computing Security, ACM.
Brandic, I., Emeakaroha, V. C., Maurer, M., Dustard, S.,
Acs, S., Kertesz, A., Kecskemeti, G., 2010. LAYSI: A
layered approach for SLA-violation propagation in
self-manageable cloud infrastructures. In
COMPSACW'10, Proceedings of the 2010 IEEE 34
th
Annual Computer Software and Applications
Conference Workshop, IEEE.
Brickell, E. F., Camenisch, J., Chen, L., 2004. Direct
anonymous attestation. In CCS'04, Proceedings of the
11
th
ACM Conference on Computer and
Communications Security, ACM.
Chef, 2008. Chef Software web site. https://www.chef.io/.
Cloud Standards Customer Council, 2015. Practical guide
to cloud service agreement version 2.0.
Emeakaroha, V. C., Netto, M. A. S., Calheiros, R. N.,
Brandic, I., Buyya, R., De Rose, C. A. F., 2012.
Towards autonomic detection of SLA violations in
cloud infrastructure. Future Generation Computer
Systems 28(7):1017-1029.
Erway, C. C., Küpcü, A., Papamanthou, C., Tamassia, R.,
2015. Dynamic provable data possession.
Transactions on Information and System Security,
17(4):1-29, ACM.
European Commission, 2014. Cloud service level
agreement standardisation guidelines, C-SIG SLA
2014.
Feng, J., Chen, Y., Summerville, D., Ku, W. S., Su, Z.,
2011. Enhancing cloud storage security against roll-
back attacks with a new fair multiparty non-
repudiation protocol. In CCNC’11, Proceedings of the
IEEE Consumer Communications and Networking
Conference, IEEE.
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.,
2011. Proofs of ownership in remote storage systems.
In CCS'11, Proceedings of the 18
th
ACM Conference
on Computer and Communications Security, ACM.
ISO/IEC, 2014. Information technology -- Cloud
computing -- Service level agreement (SLA)
framework and technology (Draft), ISO/IEC 19086.
Juels, A., Kaliski Jr., B. S., 2007. PORs: Proofs of
retrievability for large files. In CCS'07, Proceedings of
the 14
th
ACM Conference on Computer and
Communications Security, ACM.
Kaaniche, N., El Moustaine, E., Laurent, M., 2014. A
Novel zero-knowledge scheme for proof of data
possession in cloud storage applications. In
CCGrid'14, Proceedings of 14
th
IEEE/ACM
International Symposium on Cluster, Cloud and Grid
Computing, IEEE/AMC.
Katz-Bassett, E., John, P. J., Ksishnamurthy, A.,
Wetherall, D., Anderson, T., Chawathe, Y., 2006.
Towards IP geoolocation using delay and topology
measurements. In IMC'06, Proceedings of the 6
th
ACM
SIGCOMM Conference on Internet Measurement,
ACM.
Leitner, P., Michlmayr, A., Rosenberg, F., Dustard, S.,
2010. Monitoring, prediction and pevention of SLA
violations in composite services. In ICWS'10,
Proceedings of the 2010 IEEE International
Conference on Web Services, IEEE.
mOSAIC, 2010. The mOSAIC project web site.
http://www.mosaic-cloud.eu.
Popa, R. A., Lorch, J. R., Molnar, D., Wang, H. J.,
Zhuang, L., 2011. Enabling security in cloud storage
SLAs with CloudProof. In USENIX ATC’11, 2011
USENIX Annual Technical Conference.
Pulls, T., Peeters, R., Wouters, K., 2013. Distributed
Privacy-Preserving Transparency Logging. In
WPES’13, Proceedings of the 12
th
ACM workshop on
privacy in the electronic society, ACM.
Rak, M., Villano, U., Casola, V., De Benedictis, A., 2015.
SLA-based secure Cloud Application Development: