enterprise or by the CSP. We chose accounting sys-
tems as the application because of the readily avail-
able audit trail and the characteristic of having to be
adaptive to changes in agent.
This is the first step to a successful spoofing at-
tack, where an intruder acts as a legitimate provider
acting as the man-in-the-middle.
REFERENCES
Armbrust, M., Stoica, I., Zaharia, M., Fox, A., Griffith, R.,
Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Pat-
terson, D., and Rabkin, A. (2010). A View of Cloud
Computing: Clearing the clouds away from the true
potential and obstacles posed by this computing capa-
bility. Commun. ACM, 53(4):50–58.
Bicakci, M. V., Esfandiari, B., and Marsh, S. (2014).
Anomaly detection for mobile device comfort. In
IFIP International Conference on Trust Management,
pages 93–108. Springer.
Chandola, V., Banerjee, A., and Kumar, V. (2009).
Anomaly Detection: A Survey. ACM Comput. Surv.,
41(3):15:1—-15:58.
Crown (1998). Data Protection Act.
Doelitzscher, F., Knahl, M., Reich, C., and Clarke, N.
(2013). Anomaly Detection In IaaS Clouds. In Cloud-
Com, pages 387–394.
Doelitzscher, F., Reich, C., Knahl, M., and Clarke, N.
(2011). An Autonomous Agent Based Incident Detec-
tion System for Cloud Environments. In Cloud Com-
put. Technol. Sci. (CloudCom), 2011 IEEE Third Int.
Conf., pages 197–204.
Duncan, B., Pym, D. J., and Whittington, M. (2013). De-
veloping a Conceptual Framework for Cloud Security
Assurance. In Cloud Comput. Technol. Sci. (Cloud-
Com), 2013 IEEE 5th Int. Conf. (Volume 2), Bristol.
IEEE.
Duncan, B. and Whittington, M. (2014). Compliance with
Standards, Assurance and Audit: Does this Equal Se-
curity? In Proc. 7th Int. Conf. Secur. Inf. Networks,
pages 77–84, Glasgow. ACM.
Duncan, B. and Whittington, M. (2015a). Company Man-
agement Approaches Stewardship or Agency: Which
Promotes Better Security in Cloud Ecosystems? In
Cloud Comput. 2015, pages 154–159, Nice. IEEE.
Duncan, B. and Whittington, M. (2015b). Information Se-
curity in the Cloud: Should We be Using a Different
Approach? In 2015 IEEE 7th Int. Conf. Cloud Com-
put. Technol. Sci., Vancouver.
Duncan, B. and Whittington, M. (2015c). Reflecting on
whether checklists can tick the box for cloud secu-
rity. In Proc. Int. Conf. Cloud Comput. Technol. Sci.
CloudCom, volume 2015-Febru, pages 805–810, Sin-
gapore. IEEE.
Duncan, B. and Whittington, M. (2015d). The Importance
of Proper Measurement for a Cloud Security Assur-
ance Model. In 2015 IEEE 7th Int. Conf. Cloud Com-
put. Technol. Sci., Vancouver.
Duncan, B. and Whittington, M. (2016a). Enhancing Cloud
Security and Privacy: The Cloud Audit Problem. In
Submitt. to Cloud Comput. 2016, Rome.
Duncan, B. and Whittington, M. (2016b). Enhancing Cloud
Security and Privacy: The Power and the Weakness of
the Audit Trail. In Cloud Comput. 2016, Rome. IEEE.
Jøsang, A. (1997). Artificial reasoning with subjective
logic. In Proceedings of the second Australian work-
shop on commonsense reasoning, volume 48, page 34.
Citeseer.
Krukow, K. (2006). Towards a theory of trust for the global
ubiquitous computer. Brics.Dk.
Kuner, C. (2010). Regulation of Transborder Data Flows
under Data Protection and Privacy Law: Past, Present,
and Future. Leg. Stud., (016):1–90.
Law, P. (1996). Health Insurance Portability and Account-
ability Act of 1996.
Marsh, S., Briggs, P., El-Khatib, K., Esfandiari, B., and
Stewart, J. A. (2011). Defining and Investigating De-
vice Comfort. J. Inf. Process., 19(7):231–252.
Neovius, M. (2015). Adaptive experience-based compo-
sition of continuously changing quality of context.
In The Seventh International Conference on Adaptive
and Self-Adaptive Systems and Applications, page 21
26. IARIA.
OWASP (2013). OWASP Top Ten Vulnerabilities 2013.
PWC (2012). UK Information Security Breaches Survey
- Technical Report 2012. Technical Report April,
PWC2012.
PWC (2014). 2014 Information Security Breaches Survey:
Technical Report. Technical report.
Sox (2002). Sarbanes-Oxley Act of 2002.
Teacy, W. L., Patel, J., Jennings, N. R., and Luck, M.
(2006). Travos: Trust and reputation in the context of
inaccurate information sources. Autonomous Agents
and Multi-Agent Systems, 12(2):183–198.
Trustwave (2013). Trustwave Global Security Report. Tech-
nical report.
Verizon (2011). 2011 Data Breach Investigation Repeort:
A study conducted by the Verizon RISK Team in co-
operation with the United States Secret Service and
Others. Technical report.
Verizon (2012). 2012 Data Breach Investigation Report:
A study conducted by the Verizon RISK Team in co-
operation with the United States Secret Service and
Others. Technical report.
Verizon (2013). 2013 Data Breach Investigation Report:
A study conducted by the Verizon RISK Team in co-
operation with the United States Secret Service and
Others. Technical report.
Verizon (2014). 2014 Data Breach Investigations Report.
Technical report.
Walden, I. (2011). Law Enforcement Access in a Cloud
Environment. Leg. Stud., (74):1–19.
Willingmyre, G. T. (1997). Standards at the Crossroads.
StandardView, 5(4):190–194.
CLOSER 2017 - 7th International Conference on Cloud Computing and Services Science
478