accordance with the specified threat model. The pro-
posed mechanisms improves the violation detection
and can be used with an SLA solution that specifies
security guarantees (Luna et al., 2015).
Although our evaluation with CPNs demonstrate
the security of our proposal, it is interesting, as future
work, to deploy it in a cloud infrastructure in order
to evaluate its functioning in a real scenario and ana-
lyze performance aspects. After, it is possible to pro-
pose changes to improve the efficiency, without losing
the security. The proposed mechanisms can be adap-
ted to be combined with others access control mecha-
nisms (e.g., proxy re-encryption or Attribute-Based
Encryption). A robust solution should also include
mechanisms to address other security properties such
as availability and location. The broker, for example,
can manage the storage in multiple providers, impro-
ving the service availability.
ACKNOWLEDGEMENTS
This work was partially supported by the STIC-
AmSud project SLA4Cloud. Carlos Andr
´
e Batista
de Carvalho was also supported by CAPES/FAPEPI
Doctoral Scholarship.
REFERENCES
Albeshri, A., Boyd, C., and Nieto, J. G. (2012). A secu-
rity architecture for cloud storage combining proofs of
retrievability and fairness. In 3rd International Con-
ference on Cloud Computing, GRIDS and Virtualiza-
tion, pages 30–35.
Amazon (2017a). How amazon simple storage ser-
vice (amazon s3) uses aws kms. http://docs.aws.
amazon.com/kms/latest/developerguide/services-
s3.html. Accessed: 2017-07-06.
Amazon (2017b). Managing access permissions to your
amazon s3 resources. http://docs.aws.amazon.com/
AmazonS3/latest/dev/s3-access-control.html. Acces-
sed: 2017-07-06.
Ardagna, C. A., Asal, R., Damiani, E., and Vu, Q. H.
(2015). From security to assurance in the cloud: A
survey. ACM Comput. Surv., 48(1).
Armando, A., Carbone, R., and Compagna, L. (2014).
Satmc: A sat-based model checker for security-
critical systems. In Tools and Algorithms for the
Construction and Analysis of Systems, pages 31–45.
Springer.
Barker, E. (2016). Recommendation for key management,
part 1. NIST Special Publication 800-57.
Boneh, D., Gentry, C., and Waters, B. (2005). Collusion re-
sistant broadcast encryption with short ciphertexts and
private keys. In Advances in Cryptology CRYPTO
2005, volume 3621 of Lecture Notes in Computer
Science, pages 258–275. Springer Berlin Heidelberg.
Carvalho, C. A. B., Agoulmine, N., Castro, M. F., and An-
drade, R. M. C. (2017a). How to improve monitoring
and auditing security properties in cloud storage? In
35th Brazilian Symposium on Computer Networks and
Distributed Systems, pages 559–572.
Carvalho, C. A. B., Andrade, R. M. C., Castro, M. F., and
Agoulmine, N. (2016). Modelagem e deteco de fal-
has em solues para armazenamento seguro em nuvens
usando redes de petri coloridas: Um estudo de caso.
In XIV Workshop de Computao em Clouds e Aplicaes
(WCGA/SBRC), pages 17–30.
Carvalho, C. A. B., Castro, M. F., and Andrade, R. M. C.
(2017b). Secure cloud storage service for detection of
security violations. In 17th IEEE/ACM International
Symposium on Cluster, Cloud and Grid Computing,
pages 715–718.
Hwang, G.-H., Huang, W.-S., and Peng, J.-Z. (2014a).
Real-time proof of violation for cloud storage. In
CloudCom’14, pages 394–399.
Hwang, G.-H., Huang, W.-S., Peng, J.-Z., and Lin, Y.-W.
(2014b). Fulfilling mutual nonrepudiation for cloud
storage. Concurrency and Computation: Practice and
Experience.
Jensen, K. and Kristensen, L. M. (2009). Coloured Petri
nets: modelling and validation of concurrent systems.
Springer Science & Business Media.
Jiang, W., Wang, Z., Liu, L., and Gao, N. (2014). Towards
efficient update of access control policy for crypto-
graphic cloud storage. In International Conference
on Security and Privacy in Communication Systems,
pages 341–356.
Jin, H., Zhou, K., Jiang, H., Lei, D., Wei, R., and Li, C.
(2016). Full integrity and freshness for cloud data.
Future Generation Computer Systems.
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., and
Fu, K. (2003). Plutus: Scalable secure file sharing on
untrusted storage. In Proceedings of the 2nd USENIX
Conference on File and Storage Technologies, pages
29–42.
Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S.,
Kirchberg, M., Liang, Q., and Lee, B. S. (2011).
Trustcloud: A framework for accountability and trust
in cloud computing. In Services (SERVICES), 2011
IEEE World Congress on, pages 584–588.
Luna, J., Suri, N., Iorga, M., and Karmel, A. (2015). Le-
veraging the potential of cloud security service-level
agreements through standards. IEEE Cloud Compu-
ting Magazine, 2(3):32 – 40.
Popa, R. A., Lorch, J. R., Molnar, D., Wang, H. J., and
Zhuang, L. (2011). Enabling security in cloud storage
slas with cloudproof. In USENIXATC’11.
Rong, C., Nguyen, S. T., and Jaatun, M. G. (2013). Beyond
lightning: a survey on security challenges in cloud
computing. Computers and Electrical Engineering,
39(1):47–54.
Stallings, W. (2016). Cryptography and network security:
principles and practices. Pearson, 7 edition.
CLOSER 2018 - 8th International Conference on Cloud Computing and Services Science
134