runtime. The methodology is compatible with SLA-
driven continuous security assurance and it will be
supported by the MUSA framework tools.
ACKNOWLEDGEMENTS
The project leading to this paper has received funding
from the European Union’s Horizon 2020 research
and innovation programme under grant agreement No
644429.
REFERENCES
Alzain, M., Soh, B., and Pardede, E. (2014). TMR-MCDB:
Enhancing Security in a Multi-cloud Model through
Improvement of Service Dependability.
Bernsmed, K., Meland, P.H., Jaatun, M.G. (2015). Cloud
Security Requirements. SINTEF ICT, Norway, 2015.
Bernstein, D. and Vij, D. (2010). Intercloud security
considerations. Proceedings - 2nd IEEE International
Conference on Cloud Computing Technology and
Science, CloudCom 2010, pages 537-544.
Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., &
Morrow, M. (2009, May). Blueprint for the intercloud-
protocols and formats for cloud computing
interoperability. In Internet and Web Applications and
Services, 2009. ICIW'09. Fourth International
Conference on (pp. 328-336). IEEE.
Bohli, J.-M., Gruschka, N., Jensen, M., Iacono, L. L., and
Marnau, N. (2013). Security and Privacy-Enhancing
Multicloud Architectures. IEEE Transactions on
Dependable and Secure Computing, 10(4):212-224.
Celesti, A., Tusa, F., Villari, M., & Puliafito, A. (2010,
July). How to enhance cloud architectures to enable
cross-federation. In Cloud Computing (CLOUD), 2010
IEEE 3rd International Conference on (pp. 337-345).
Cloud Security Alliance, “Cloud Controls Matrix, Version
1.2”, Aug. 2011; https://cloudsecurityalliance.org/
research/initiativesccm.
Ferrer, A.J., Hernández, F., Tordsson, J., Elmroth, E., Ali-
Eldin, A., Zsigri, C., Sirvent, R., Guitart, J., Badia,
R.M., Djemame, K., Ziegler, W., Dimitrakos, T., Nair,
S.K., Kousiouris, G., Konstanteli, K., Varvarigou, T.,
Hudzia, B., Kipp, A., Wesner, S., Corrales, M., Forgó,
N., Sharif, T., Sheridan, C. OPTIMIS: a holistic
approach to cloud service provisioning. Future
Generation Computer Systems 2012; 28(1):66–77.
Ferry, N., Rossini, A., Chauvel, F., Morin, B., and Solberg,
A. (2013). Towards a model-driven provisioning,
deployment, monitoring, and adaptation of multi-cloud
systems. In Cloud Computing (CLOUD), 2013 IEEE
Sixth International Conference on (pp. 887-894). IEEE.
Finnish Personal Data Act (523/1999). Available at:
www.finlex.fi/en/laki/kaannokset/1999/19990523.
Global Inter-cloud Technology Forum (2010). Use Cases
and Functional Requirements for Inter-Cloud
Computing. Technical report.
Myagmar, S. (2005). Threat Modeling as a Basis for
Security Requirements. In StorageSS '05: Proceedings
of the 2005 ACM workshop on Storage security and
survivability, pages 94-102.
National Institute of Standards and Technology (NIST),
“SP 800-53 Rev.4 – Security and Privacy Controls for
Federal Information Systems and Organizations,” Natl.
Inst. Stand. Technol. – Spec. Publ., vol. 800-53, pp. 1-
460, 2014.
Nikolay, G. and Buyya, R. (2012). Inter-Cloud
architectures and application brokering: taxonomy and
survey. Software - Practice and Experience, 44(3):369|-
390.
Oliveira, P. F., Lima, L., Vinhoza, T. T. V., Barros, J., and
Medard, M. (2010). Trusted Storage over Untrusted
Networks. Global Telecommunications Conference
(GLOBECOM 2010), 2010 IEEE, pages 1-5.
Open Web Application Security Project (OWASP).
Application Threat Modeling. Available at:
https://www.owasp.org/index.php/Application_Threat
_Modeling.
Petcu, D., Crciun, C., Neagul, M., Panica, S., Di Martino,
B., Venticinque, S., Rak, M., and Aversa, R.
Architecturing a sky computing platform. In
Proceedings of the International Conference Towards a
Service-Based Internet ServiceWave’10, Vol. 6569,
CezonM,Wolfsthal Y (eds). Springer-Verlag: Ghent,
Belgium, 2011; 1–13.
Saini, V., Duan, Q., and Paruchuri, V. (2008). Threat
modeling using attack trees. Journal of Computing
Sciences, (APRIL):124-131.
Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R.,
Krishnan, R., Ahn, G. J., & Bertino, E. (2013).
Collaboration in multicloud computing environments:
Framework and security issues. Computer, (2), 76-84.
Sodiya, A. S., Onashoga, S. A., and Oladunjoye, B. A.
(2007). Threat modeling using fuzzy logic paradigm.
Informing Science: International Journal of an
Emerging Transdiscipline, 4(1):53-61.
Casola, V., De benedictis, A., Rak, M., and Villano, U.
“SLA-based Secure Cloud Application Development:
the SPECS Framework”, In MICAS 2015, Timisoara,
21-22 September 2015.
Yan, Z., Hongxin, H., Gail-Joon, A., and Mengyang, Y.
(2012). Cooperative Provable Data Possession for
Integrity Verification in Multicloud Storage. IEEE
Transactions on Parallel and Distributed Systems,
23(12):2231-22.