ACKNOWLEDGEMENTS
This work has been partly funded from the Euro-
pean Commission’s Seventh Framework Programme
(FP7/2007-2013), grant agreement 317550, Cloud
Accountability Project - http://www.a4cloud.eu/ -
(A4CLOUD).
REFERENCES
Amazon Web Services (2016). Amazon cloudwatch. https:
//aws.amazon.com/de/cloudwatch/.
Azraoui, M., Elkhiyaoui, K.,
¨
Onen, M., Bernsmed, K.,
De Oliveira, A., and Sendor, J. (2015). A-ppl: An
accountability policy language. In Garcia-Alfaro, J.,
Herrera-Joancomart
´
ı, J., Lupu, E., Posegga, J., Aldini,
A., Martinelli, F., and Suri, N., editors, Data Privacy
Management, Autonomous Spontaneous Security, and
Security Assurance, volume 8872 of Lecture Notes in
Computer Science, pages 319–326. Springer Interna-
tional Publishing.
Azraoui, M., Elkhiyaoui, K.,
¨
Onen, M., Bernsmed, K., San-
tana De Oliveira, A., and Sendor, J. (2014). A-PPL:
An accountability policy language. In DPM 2014,
9th International Workshop on Data Privacy Manage-
ment, September 10, 2014, Wroclaw, Poland, Wro-
claw, POLAND.
Bitkom Research GmbH (2015). Cloud Monitor
2015. https://www.kpmg.com/DE/de/Documents/
cloudmonitor%202015 copyright%20 sec neu.pdf.
Cloud Security Alliance (2013). Top threats to cloud com-
puting survey results update 2012. https://downloads.
cloudsecurityalliance.org/initiatives/top threats/
Top Threats Cloud Computing Survey 2012.pdf.
Cloud Security Alliance (2014). Cloud Controls Matrix.
https://cloudsecurityalliance.org/research/ccm/.
Cloud Security Alliance (2015). Security, Trust & Assur-
ance Registry. https://cloudsecurityalliance.org/star/.
Cloud Security Alliance (2016). Cloud Trust Protocol.
https://cloudsecurityalliance.org/research/ctp.
Ganglia (2015). Ganglia. http://ganglia.sourceforge.net/.
Information Systems Audit and Control Association (2012).
Control Objectives for Information and Related Tech-
nology (COBIT) 5. http://www.isaca.org/cobit/.
ISO (2005). ISO27001:2005. http://www.iso.org/iso/
catalogue detail?csnumber=42103.
JADE (2014). Java Agent DEvelopement framework. http:
//jade.tilab.com.
Katsaros, G., Kousiouris, G., Gogouvitis, S. V., Kyriazis,
D., Menychtas, A., and Varvarigou, T. (2012). A
self-adaptive hierarchical monitoring mechanism for
clouds. Journal of Systems and Software, 85(5):1029
– 1041.
Kertesz, A., Kecskemeti, G., Oriol, M., Kotcauer, P., Acs,
S., Rodr
´
ıguez, M., Merc
`
e, O., Marosi, A., Marco, J.,
and Franch, X. (2013). Enhancing federated cloud
management with an integrated service monitoring
approach. Journal of Grid Computing, 11(4):699–
720.
Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Bad-
ger, L., and Leaf, D. (2011). Nist cloud computing
reference architecture. http://www.nist.gov/customcf/
get pdf.cfm?pub id=909505.
Massonet, P., Naqvi, S., Ponsard, C., Latanicki, J., Rochw-
erger, B., and Villari, M. (2011). A monitoring and
audit logging architecture for data location compli-
ance in federated cloud infrastructures. In Parallel
and Distributed Processing Workshops and Phd Fo-
rum (IPDPSW), 2011 IEEE International Symposium
on, pages 1510–1517.
Montes, J., S
´
anchez, A., Memishi, B., P
´
erez, M. S., and
Antoniu, G. (2013). Gmone: A complete approach to
cloud monitoring. Future Generation Computer Sys-
tems, 29(8):2026 – 2040.
Muller, C., Oriol, M., Rodriguez, M., Franch, X., Marco, J.,
Resinas, M., and Ruiz-Cortes, A. (2012). Salmonada:
A platform for monitoring and explaining violations
of ws-agreement-compliant documents. In Principles
of Engineering Service Oriented Systems (PESOS),
2012 ICSE Workshop on, pages 43–49.
Nagios Enterprises, LLC (2014). Nagios. http://www.
nagios.org/.
National Institute of Standards and Technology (2011).
Guidelines on security and privacy in public cloud
computing. http://csrc.nist.gov/publications/nistpubs/
800-144/SP800-144.pdf.
National Institute of Standards and Technology) (2013).
Security and privacy controls for federal information
systems and organizations. http://nvlpubs.nist.gov/
nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf.
PCI Security Standards Council (2015). Payment Card
Industry Data Security Standard (PCI-DSS). https:
//www.pcisecuritystandards.org/.
Povedano-Molina, J., Lopez-Vega, J. M., Lopez-Soler,
J. M., Corradi, A., and Foschini, L. (2013). Dargos: A
highly adaptable and scalable monitoring architecture
for multi-tenant clouds. Future Generation Computer
Systems, 29(8):2041 – 2056.
Rackspace (2016). Rackspace cloud monitoring. http:
//www.rackspace.com/cloud/monitoring.
R
¨
ubsamen, T., Pulls, T., and Reich, C. (2015). Secure
Evidence Collection and Storage for Cloud Account-
ability Audits. In CLOSER 2015 - Proceedings of
the 5th International Conference on Cloud Comput-
ing and Services Science, Lisbon, Portugal, May 20 -
22, 2015. SciTePress.
R
¨
ubsamen, T. and Reich, C. (2013). Supporting cloud ac-
countability by collecting evidence using audit agents.
In Cloud Computing Technology and Science (Cloud-
Com), 2013 IEEE 5th International Conference on,
volume 1, pages 185–190.
R
¨
ubsamen, T. and Reich, C. (2014). An Architecture
for Cloud Accountability Audits. In 1. Baden-
W
¨
urttemberg Center of Applied Research Symposium
on Information and Communication Systems SInCom
2014.
Evidence Collection in Cloud Provider Chains
69