<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>SLA-Based Continuous Security Assurance in Multi-Cloud DevOps</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Erkuden Rios</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Massimiliano Rak</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eider Iturbe</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wissam Mallouli</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Fundacion Tecnalia Research &amp; Innovation.</institution>
          <addr-line>Derio</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Montimage Research &amp; Development.</institution>
          <addr-line>Paris</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Campania Studies Luigi Vanvitelli</institution>
          ,
          <addr-line>Naples</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>50</fpage>
      <lpage>68</lpage>
      <abstract>
        <p>Multi-cloud applications, i.e. those that are deployed over multiple independent Cloud providers, pose a number of challenges to the security-aware development and operation. Security assurance in such applications is hard due to the lack of insights of security controls applied by Cloud providers and the need of controlling the security levels of all the components and layers at a time. This paper presents the MUSA approach to Service Level Agreement (SLA)-based continuous security assurance in multi-cloud applications. The paper details the proposed model for capturing the security controls in the o ered application Security SLA and the approach to continuously monitor and asses the controls at operation phase. This new approach enables to easily align development security requirements with controls monitored at operation as well as early react at operation to any possible security incident or SLA violation.</p>
      </abstract>
      <kwd-group>
        <kwd>multi-cloud security</kwd>
        <kwd>multi-cloud monitoring</kwd>
        <kwd>security assurance</kwd>
        <kwd>security in DevOps</kwd>
        <kwd>cloud security controls</kwd>
        <kwd>cloud security SLA</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Despite the tremendous growth in the expansion of Cloud Computing [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
security is still one of the major drawbacks of Cloud adoption [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Many consumers
continue to be reluctant to go into the Cloud due to the lack of transparency and
control over the security features the Cloud Service Providers o er. A growing
trend to ease transparency consists in the use of cloud Security Service Level
Agreements (SLAs). A cloud SLA is a contractual agreement between the Cloud
Service Provider (CSP) and the Cloud Service Customer (CSC) specifying the
security grants o ered by the consumed cloud service [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>Copyright c 2017 by the paper's authors. Copying permitted for private and academic
purposes.</p>
      <p>
        The research on cloud SLAs started some years ago and a collection of
outcomes from initial EU-funded projects on the subject can be found in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Since
then, recent projects like SPECS [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], SLALOM [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and SLA-READY [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] have
enlarged the cloud SLA solution oriented results and provided relevant advances
in tools, legal transparency and reference models rising understanding of
nonsecurity expert consumers, including SMEs, on negotiated service level clauses.
      </p>
      <p>Nevertheless, several challenges for Security assurance in multi-cloud remain,
like those tackled in this work. One one hand, we deal with the automatic creation
of the (multi-)cloud applications' Security SLAs taking into account the SLAs
of the composing components and the cloud services they use. And on the other
hand we provide a solution for the continuous monitoring of such Security SLA,
considering controls in all the layers involved: cloud service provider, system,
network, application.</p>
      <p>
        This paper presents the MUSA solution to SLA-based security assurance
for multi-cloud applications that use or have their components deployed in
distributed cloud services. The solution is based on the MUSA DevOps approach
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] that allows for the security-aware development and operation of such
applications considering security as one of the major drivers in application life-cycle.
The solution not only enables the automatic creation of the o ered Security
SLA of the multi-cloud application, but it also enables to monitor at runtime
the security service level objectives speci ed in the SLA. The solution is part of
the MUSA framework developed within the European Union's H2020 research
project MUSA [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>The MUSA framework is a DevOps oriented solution that seamlessly
integrates di erent tools to support multi-disciplinary DevOps teams in the
securityaware life-cycle of (multi-)cloud applications, from application design (including
its Security SLA creation) till continuous assurance at operation.</p>
      <p>The paper is structured as follows. After the introductory section, the Section
2 describes the state of the art in security SLAs for multi-cloud based
applications. The Section 3 introduces the complete MUSA work ow and framework
for the security-intelligent life-cycle management of multi-cloud applications. In
Section 4 we detail the proposed approach to Security SLA Assurance in
multicloud, which is part of the MUSA DevOps framework. The Section 5 describes
the validation of the solution in two use cases in the domains of ight
scheduling prototypes and smart mobility services. Finally, the Section 6 presents the
conclusions and the future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Security SLAs in multi-cloud</title>
      <p>
        The term inter-cloud computing was de ned in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] as: A cloud model that, for
the purpose of guaranteeing service quality, such as the performance and
availability of each service, allows on-demand reassignment of resources and transfer
of workload through a interworking of cloud systems of di erent cloud providers
based on coordination of each consumers requirements for service quality with
each providers SLA and use of standard interfaces.
      </p>
      <p>Therefore, inter-cloud indicates the usage of cloud resources from multiple
Cloud Service Providers (CSPs). These multiple CSPs can be part of a cloud
federation, i.e. voluntarily collaborate to allow sharing of cloud resources between
them, or they can be independent, with no need to exist an explicit collaboration
agreement or interconnection among them.</p>
      <p>In this work we focus on the security assurance of multi-cloud applications
which components use or are deployed in multiple cloud services o ered by
independent CSPs, which could be heterogeneous. Therefore, they pose more
challenges to the design, creation and monitoring of their security SLAs because
they combine services and security mechanisms from diverse and independent
sources.</p>
      <p>In order to be able to o er a holistic assurance in multi-cloud applications we
need: i) mechanisms for SLA creation focused on security properties to derive
composite Security SLA of applications that combine multiple clouds, and ii)
mechanisms for continuous monitoring of such Security SLAs taking into account
that heterogeneous controls can be applied by multiple providers at di erent
layers: application, system or network.
2.1</p>
      <sec id="sec-2-1">
        <title>The Security SLA model</title>
        <p>
          According to ISO/IEC 20000-1 [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] a Service Level Agreement (SLA) is a
documented agreement between the service provider and customer that identi es
services and service level objectives.
        </p>
        <p>
          When it comes to cloud, a Cloud SLA is a contract framework that de nes
the terms and conditions necessary to ful l the obligations of a Cloud Service
Provider (CSP) for the service(s) o ered to a Cloud Service Consumer (CSC)
[
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. In this line, the cloud Security SLA enables to express the security policy
associated to cloud services o ered to CSCs. The cloud Security SLA declares the
set of Service Level Objectives (SLOs) related to security aspects of the service
in terms of thresholds on well de ned security metrics that relate to security
controls of the service.
        </p>
        <p>
          As de ned by NIST Security Control Framework [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], security controls are
safeguards or countermeasures prescribed for an information system or an
organization designed to protect the con dentiality, integrity, and availability of its
information and to meet a set of de ned security requirements.
        </p>
        <p>
          The NIST Control Framework [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] that is adopted in our approach gathers
more than 900 security controls, identi ed by a unique identi er and a name,
and are organised in families, such as Access Control (AC), Identi cation and
Authentication (IA), Risk Assessment (RA) , System and Communications
Protection (SC), System and Information Integrity (SI), etc.
        </p>
        <p>
          Other security control frameworks for cloud exist such as Cloud Security
Alliance's Cloud Control Matrix [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] and ISO/IEC 27017 [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], but NIST o ers
greater maturity, richness and granularity of the controls.
        </p>
        <p>
          In our approach, we adopt the SPECS cloud Security SLA model, described
in detail in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] and based on the WS-Agreement standard [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. This model has
been extended with provider-speci c information and security-related concepts
and its use adapted to multi-cloud environments. An extract of the model with
the main concepts is shown in Fig.1.
        </p>
        <p>
          As it can be seen in the model, Security capability concept refers to a grouping
of security controls. Security capabilities are de ned by NIST [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] as sets of
mutually reinforcing security controls. Capabilities and controls are enforced by
means of suitable software and/or hardware mechanisms, which are deployed by
the resources provider either on the resources provided to the customer or on
external resources. The Service Level Objectives use security metrics to express
the target level that is guaranteed in the SLA. The security metrics that can be
expressed by using the MUSA SLA Generator are part of the security metric
catalogue presented in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>The Security SLA composition</title>
        <p>The goal of Security SLA composition is to identify the security policy of each
application component and the security policy of the overall application, i.e.
the set of security controls that can be declared in the composite application
Security SLA.</p>
        <p>
          State of the art techniques of SLA composition range from ontology based [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]
to WS-Agreement based [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], but all are focused on reliability and performance
controls, and therefore, they are hardly reusable in security context.
        </p>
        <p>In multi-cloud based applications, the Security SLA that can be o ered to
the application customers depends on how the components are deployed, the
relationships among them, the number and type of the cloud resources they use
and the Security SLAs of all the individual parts.</p>
        <p>
          In our solution we rely on the approach detailed in [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] for obtaining the
multi-cloud application composite Security SLA. This is a novel technique that
enables to compute and declare in terms of standard security controls the security
policy of applications that orchestrate multiple cloud services. The technique
relies on graph-based models that synthesize the deployment architecture of
the distributed application, the relationships among the services composing the
application (e.g. uses, is deployed in, protects, etc.), the SLA Templates of the
services and the SLAs declared by the CSPs in use.
        </p>
        <p>The SLA Template (SLAT) of the service is de ned as the document that
describe the security policy implemented by a service according to its internal
con guration and not taking into account the e ect of deployments. Therefore,
Security SLA templates de ne the required security Service Level Objectives
(SLOs) of the components in the basis of the SLOs required over the cloud
services they will use.</p>
        <p>In our approach the SLATs of the application components are obtained in
a two-step process: in the rst step, a risks analysis process is performed where
each threat over the component is associated to the relevant security controls
that minimize the risk; in the second step, each control required by the risk
analysis is assessed against the code of the component with the aid of a dedicated
questionnaire. These controls are those that would like to be granted by the
component and they could be: implemented by the component, required on the
cloud service it uses, or requested to MUSA security agents, as explained later.</p>
        <p>The proposed SLA composition process translates each SLATs associated
to the components to a SLA. The composition is performed on a per security
control basis and it assumes the controls can be independently evaluated.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Security Assurance in multi-cloud</title>
      <p>
        Even if not particularly oriented to multi-cloud, there exist a number of Cloud
systems monitoring solutions such as those collected in the surveys provided in
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] and [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. The state of the art multi-cloud monitoring solutions, e.g. from
MOSAIC project [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] and PaaSage project [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], SeaClouds project [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] mainly
focus on elasticity policies and quality of service (QoS) but lack speci c or rich
support to security control. This is the case of the framework o ered in PaaSage
for model-driven provisioning, deployment, monitoring, and adaptation of
multicloud systems that relies in the enactment of the application model (written in
CloudML language [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]). In this framework monitoring is dependent on the
de nition of the metrics in CloudML language in the application model, rather
than in an standard Service Level Agreement (SLA) format (such as Web Service
Agreement), which limits the approach.
      </p>
      <p>
        Initiating the path towards security assurance, the CUMULUS project [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
delivered an integrated framework of models, processes and tools supporting the
certi cation of security properties of cloud services (IaaS, PaaS or SaaS).
      </p>
      <p>
        On security speci cs, the SPECS project [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] delivered an open source
framework to o er Security-as-a-Service, by monitoring security parameters speci ed
in SLAs and by providing the techniques to systematically manage SLA
lifecycle. The project provided solutions for automatic negotiation and monitoring
of SLAs between CSPs and SPECS platform based on security properties of cloud
services. The work presented in this paper directly links with the outcomes of
SPECS as MUSA extends these to multi-cloud setups.
      </p>
      <p>To the best of authors' knowledge, no previous work addresses
security-bydesign principles to multi-cloud application, identifying the security risks that
multi-cloud applications are exposed to, expressing the security controls that can
mitigate the risks in a machine-readable Security SLA, and nally, continuously
monitoring the multi-cloud application composite security SLA.
4</p>
    </sec>
    <sec id="sec-4">
      <title>The MUSA Security DevOps framework for multi-cloud</title>
      <p>
        Our approach to continuous security assurance in multi-cloud relies in
integrating a number of predictive and reactive security mechanisms in the application
life-cycle. MUSA promotes the DevOps paradigm [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] since in our approach
an multi-disciplinary team combining individuals from Development and
Operations teams is the responsible for the multi-cloud application engineering
and runtime administration. We name DevOps Team to such multi-disciplinary
team that involves application architects, developers, security architects,
business managers, service operators and system administrators. The expertise of
the team members comes from diverse aspects of cloud system engineering and
management. Even if the team works together in the whole life-cycle process, in
each phase, from design to application operation, one of the roles in the DevOps
Team may need to take the responsibility of the activity.
      </p>
      <p>The MUSA DevOps approach is enabled by the MUSA framework which
supports the MUSA work ow depicted in Fig.2.</p>
      <p>
        The MUSA approach aims at aiding multi-disciplinary DevOps teams in
multi-cloud application life-cycle. The work ow supported by the tools in the
MUSA framework is iterative and involves the following activities:
1. Application modelling : The initial step in the multi-cloud application design
is the speci cation of its Cloud Provider Independent Model (CPIM), a task
supported by the MUSA Modeller. The application CPIM is expressed in
a MUSA extended CAMEL language and speci es the application cloud
and security requirements in a level of abstraction independent from speci c
Cloud services and providers the application will use.
2. Continuous Risk Assessment that helps in the selection of the security
controls and metrics that will be granted in the Security SLA and controlled at
runtime. The activity follows a methodology similar to the one described in
[
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. For each component the relevant threats are selected according to the
component nature. The technical and business impact of the threat are
evaluated, as well as risk minimization measures selected. These measures are
de ned as the desired countermeasures or controls required over the cloud
services the components will use. The controls are expressed following the
NIST standard Security Control Framework. The risk assessment is
continuously updated with the feedback from the continuous monitoring of the
controls behaviour at runtime.
3. Cloud services selection: In order to take most out of cloud services
combination in terms of security, the DevOps Team is supported by the MUSA
Decision Support Tool (DST) in the selection of cloud services that best
match the security requirements of the application components. The best
match is obtained by comparing the security controls o ered by the cloud
services under study (those previously categorized in the MUSA CSP Data
Repository) with the security requirements of the individual components.
4. Security SLA templates generation : Once the most appropriate cloud service
is selected for each of the components, the DevOps Team will use the MUSA
SLA Generator to automatically create the Security SLA templates of the
components. To this aim, the MUSA framework supports the veri cation
of the feasibility of the components' Security SLA templates by checking
whether the cloud service o erings selected in the previous step do o er
such security requirements (in form of security controls). In case they do
not, the MUSA security enforcement agents may be adopted to o er them.
5. Deployment planning : The Security SLA templates will be stored in the SLA
Repository and will be retrieved by the MUSA Deployer so it can generate
the multi-cloud deployment Implementation plan for the application. The
Implementation plan speci es the application's software components to be
installed and the cloud services to be provisioned, as well as their con
guration details.
6. Composed Security SLA generation : In this step the DevOps Team is
supported by the MUSA SLA Generator in the automatic generation of the
nal o ered Security SLA of the overall multi-cloud application following
the technique explained in section 2.2.
7. Deployment execution: The DevOps Team uses the MUSA Deployer to
execute the previously created Implementation plan. The execution includes the
provision and con guration of the needed cloud resources as well as the
deployment of both the application components and the corresponding MUSA
agents required in the plan.
8. Continuous Monitoring of composed Security SLA: Once the components are
deployed and running, the MUSA Security Assurance platform starts
monitoring the required metrics on the multi-cloud application components based
on the nal composed Security SLA. The continuous monitoring ensures the
composed Security SLA holds and alarms are raised whenever incidents are
detected.
9. Enforcement of security controls : As part of the possible reaction measures
to detected incidents, the MUSA Security Assurance platform supports the
dynamic enforcement of MUSA security enforcement agents. These agents
are security mechanisms that can be activated to work with the component
in case the detected problem is associated to the agent. Note that for the
agents to work with the components, the components have to be prepared
at design time.
      </p>
      <p>In the MUSA work ow, Application modelling, Continuous Risk assessment
and Cloud services selection follow an iterative loop that allows identifying
whether there are any security requirements in the application that are not
possible to be addressed with the security controls o ered by the cloud services
available. In this case, the DevOps Team should revisit the CPIM to include
protection components or specify the use of MUSA security enforcement agents
that o er such missing security controls (if available).</p>
      <p>In the following we detail the MUSA solution for Security Assurance which
includes the last two steps: Continuous monitoring and enforcement.
5</p>
    </sec>
    <sec id="sec-5">
      <title>MUSA Security Assurance in Multi-cloud DevOps</title>
      <p>Once all the components of the application have been appropriately deployed
and the application is up and running, the runtime monitoring and operation
of the multi-cloud application starts. The deployment scenarios may be diverse
depending on application architecture, where some of the components may be
deployed in cloud IaaS or may use PaaS or SaaS services. Therefore, the assurance
solution in MUSA needs to be instantiated to select the right monitoring and
security enforcement agents that ful l the selected deployment environment's
needs.
5.1</p>
      <sec id="sec-5-1">
        <title>MUSA Security Assurance Work ow</title>
        <p>In this section we zoom in the MUSA Security Assurance part of the MUSA
work ow of Fig.2. There are two main activities included in the MUSA Security
Assurance at operation that are explained in the following subsections.
Continuous Monitoring The objective of this activity is to monitor the
security behaviour at operation of the multi-cloud application under test, in order
to early react to possible incidents and violation of the Security SLA. The
subactivities are:
{ Extraction of metrics and thresholds from Security SLAs: After retrieving the
o ered composite Security SLA registered in the MUSA Security Assurance
Platform (in the Security SLA Repository of the platform), the platform
will extract from it the security metrics that need to be monitored in the
application components and in the cloud providers. The SLO thresholds that
will apply for triggering the alerts and noti cations are also learned from the
Security SLAs.
{ Con guration of monitoring agents: Make the needed arrangements and
congurations for the MUSA monitoring agents to properly work and enable
them to monitor the security metrics.
{ Security metrics measurement and monitoring: Take the actual values of the
metrics and store them in the Measurement Repository.
{ Reporting and visualization of monitoring results: Show to the user the
resulting values measured and the reports from the computation of the metrics.
{ Noti cation of security incidents: The DevOps Team can subscribe to
desired alerts and noti cations. The envisaged noti cations could be mainly of
two types: Security SLA violations (when it is detected that a SLOs in the
Security SLA is not reached) and alerts (when it is detected that a threshold
level in the SLO is not reached, i.e. before any violation in the SLO occurs).</p>
        <p>The user will therefore need to set the threshold levels for the alerts.
Adaptation and reaction The goal of this activity is adapt to security
incidents detected while monitoring in order to try to ensure the Security SLA of the
multi-cloud application still holds. Therefore, the activity involves the decisions
on and execution of the necessary reaction measures in case potential or actual
Security SLA violations are detected. The reaction mechanisms in MUSA relies
depend on the cause and type of the incident as well as whether it is an alert
or a violation, i.e. the SLA is about to be violated or violation has e ectively
occurred already, respectively. The summary of the possible reaction measures
that the DevOps Team can adopt is given below.</p>
        <p>{ Activate a MUSA security enforcement agent : The MUSA security
enforcement agents are software artefacts provided by MUSA framework that
implement one or more security controls in the multi-cloud application
components that use them. In those cases that the component was prepared at
design time to be able to use a MUSA enforcement agent, it is possible to
enable such agent at runtime. The enforcement service in the MUSA
Security Assurance Platform will identify the needed MUSA enforcement agent
and activate it in the component in case the incident was detected in such
component and corresponds to a security control implemented by the agent.
{ Re-deployment of multi-cloud application : Whenever the cause of the security
incident detected strives in a security control by a cloud service used by one
or more of the components, the DevOps Team may need to replace the failing
cloud service with some other cloud service o ering similar functionality and
security controls. The DevOps Team will therefore perform a new search
in the MUSA Decision Support Tool to nd a replacement service and
redeploy the components that were using the failing cloud service. Most likely
the rest of the components may not be a ected, but it is advisable the whole
process starts from the beginning in order to make sure the new Cloud
Service combination with the Cloud Service replacement still holds the
multicloud application security requirements.
{ Re-design of multi-cloud application : In case the cause of the security
incident resides in an defective or poor security performance of one or more
of the constituent components and not in the Cloud Services in use, the
DevOps Team may need to update the multi-cloud application design and
re ne the security requirements or modify the components. This means that
the DevOps Team will need to analyse the report of the causes and start the
Design process again.
5.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>MUSA Security Assurance Platform architecture</title>
        <p>The MUSA Security Assurance solution ts the operation phase of the MUSA
framework. The MUSA Security Assurance Platform takes as input the Security
SLA of the application to monitor the multi-cloud composite application SLA as
well as the individual components' SLAs referred by it. From individual SLAs,
the platform knows the right security metrics to monitor in single components
and from composite SLAs it is able to monitor the security of the overall
application taking into account the communication exchanges between distributed
components. In order to learn the list of monitoring agents deployed with each
application component as well as their IP addresses, the MUSA Security
Assurance Platform also requires the application deployment Implementation plan.</p>
        <p>As shown in Fig.3, the MUSA Security Assurance Platform is composed of
three main elements:
{ The MUSA Monitoring agents responsible for collecting the security metrics
speci ed in the Security SLA and relevant events to be analysed by the
centralized MUSA Security Assurance platform.
{ The MUSA Security enforcement agents that are deployed and/or activated
in case of any security incident detection.
{ The MUSA Security Assurance Platform that is deployed as
Software-asa-Service and allows collecting, displaying and managing all the security
metrics and events from individual application components. The Platform
gathers the measurements and events from the monitoring agents, checks
the component Security SLAs and computes the composite metrics to check
the global application Security SLA ("SLA checking" module). In case of an
alert or a violation, the "security enforcement manager" is responsible for
deploying, activating and con guring the local or remote security
enforcement agents to mitigate the security risk. The communication with both
monitoring and enforcement agents is done through the same KAFKA event
bus.</p>
        <p>In the following two subsections we present details of both the monitoring
and enforcement agents.</p>
        <p>
          MUSA Monitoring agents Three di erent types of monitoring agents can be
deployed in the same virtual machine or container as the application component
to compute security metrics by relying on di erent sources: Network, operating
system or application. The security metrics that can be monitored thanks to the
use of MUSA monitoring agents are those speci ed in the Security SLA of the
application which relates to the individual components' Security SLAs.
{ Network monitoring agent: This agent is responsible for analysing network
tra c from di erent network interfaces of the virtual machine or container
where the component is running. This agent facilitates network performance
monitoring and operation troubleshooting through its real-time and
historical data gathering. The agent correlates network events to detect
performance, operational and security incidents thanks to its advanced rules
engine.
{ System monitoring agent: This agent monitors operating system resources
to detect server performance degradation or performance bottlenecks early
on. The agent relies on Linux top command to monitor Linux performance.
The top command is available in many Linux/Unix-like operating systems
and is used to display all the running and active real-time processes, CPU
usage, Memory usage, Swap Memory, Cache Size, Bu er Size, Process PID,
User, among others.
{ Application monitoring agent: It monitors information about the internal
state of the target system, i.e., multi-cloud application component in which it
is deployed. It noti es the MUSA security assurance platform about
measurements of execution details and other internal conditions of the application
component. The application monitoring agent is a Java library composed by
two parts. The rst part is an aspect to be weaved into the application code
via pointcuts aimed at sending application-internal tracing information to
the MUSA Security Assurance Platform for analysis. It is composed of a set
of functions that can be weaved in strategic application points to capture
relevant internal data. The second part connects the aspect with the noti
cation tool via a connector library, providing a simple interface for sending
log data to the MUSA Security Assurance Platform in a secure way.
MUSA Security enforcement agents The security enforcement agents
offered in MUSA are security controls or mechanisms that can be easily
integrated in multi-cloud application components and activated at runtime
whenever needed to react to a violation in the Security SLA. The MUSA enforcement
agents are built on top of existing open source solutions and the major
innovation resides in having MUSA framework as single point of management for
orchestrating multiple mechanisms in an homogenized way and from the same
enforcement management dashboard. The enforcement agents can be deployed
by the MUSA Deployer just as the individual components of the application.
The MUSA Deployer interprets the application design model in MUSA extended
CAMEL to learn the agents deployment con guration and execute it. Below we
present two of the enforcement agents provided in the MUSA framework.
{ The high availability (HA) framework : The HA framework is a collection
of open-source software built around the Corosync/Pacemaker stack [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ]. It
provides high availability clustering mechanisms in multi-cloud for
scalability, load balancing, automatic failover, automatic routing between services,
and inter-component secure communications. Di erent deployment con
gurations of the HA framework are possible, together with the component in
its docker container on IaaS nodes, or side-by-side with the component for
both IaaS and PaaS systems.
{ The access control (AC) framework : The AC framework ensures that only
authorised parties can access and use the functionality o ered by the
components. Therefore, it o ers access control in end-user-to-component
communications and in component-to-component communications. The frameworks
uses solutions external to MUSA to o er the authentication and
authorisation functionality. The access control policies should be de ned following the
XACML [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] policy model. The Policy Enforcement Point (PEP) and Policy
Decision Point (PDP) would be included in each component, which allows
for taking the permission decisions locally and increase the performance.
The MUSA framework and the SLA-based security assurance approach have
been evaluated in the creation and operation of two real-world multi-cloud
applications withing the MUSA proejct use cases:
{ Smart mobility service by Tampere University of Technology, Finland. This
is a multi-cloud application aims at supporting the energy e cient and
sustainable multi-modal transport of Tampere citizens when commuting from
home to work and vice versa. The application uses open data and services
available in the Intelligent Transport Systems and Services (ITS) platform
[
          <xref ref-type="bibr" rid="ref33">33</xref>
          ], where the Tampere City Council has a number of services exposed to
allow companies and individual developers to develop, test and productize
own tra c applications using public data. The services can be publicly
accessed and include the public transport services APIs, other tra c related
APIs, tra c data, etc. Multi-cloud applications that integrate IST Factory
cloud-based services will be empowered with MUSA assurance tools for
ensuring security of data storage and exchange at runtime. The focus of this
case study is to ensure high availability of the application as well as con
dentiality and integrity of citizens personal data.
{ Flight scheduling application by Lufthansa Systems, Germany. This is a
working prototype for a ight schedule planning application. The prototype
is realized as a multi-layered, distributed web application and provides a
scalable platform of self-contained and loosely coupled business components,
each capable of running in a separate process and interacting by use of
lightweight REST style communication protocols. The focus of this case
study is on data integrity, con dentiality, localization and access control of
di erent services within the application.
        </p>
        <p>The DevOps Teams in both case studies followed the di erent steps of MUSA
work ow to design the composite application, create its composite SLA and
monitor it at runtime. In the process, individual SLA templates were created
with the SLA Generator and Cloud service providers selected using the DST
tool. After the application deployment planning and the computation of the
composite application SLA, the application was deployed successfully using the
MUSA Deployer tool and continuous monitoring and reaction was performed.
In both use case scenarios, the MUSA monitoring agents described in section
5.2 were deployed to retrieve the security metrics speci ed in the applications'
Security SLAs. For some of the components MUSA enforcement agents described
in section 5.2 were deployed as well.</p>
        <p>
          For instance, for the smart mobility service, one of the main application
components is called TSM Engine which is a Web service responsible for retrieving
diverse information (location, weather, paths, energy etc.) from the other
components. After the risk analysis step, the Security SLA speci ed the following
security controls (partial list), expressed according to the NIST Control
Framework [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]:
{ Denial of service protection (NIST SC-5)
{ Vulnerability scanning (NIST RA-5)
{ Authentication management (NIST IA-5)
{ Session Authenticity (NIST SC-23)
{ Information System Monitoring (NIST SI-4)
{ etc.
        </p>
        <p>And the following security metrics (partial list) where included in the Security
SLA related to the security controls, as shown in Fig.4:
{ Availability
{ Vulnerability Measure
{ Risk Assessment Vulnerability Measure
{ M13-Scanning Frequency - Basic Scan
{ M22-Scanning Frequency - Extended Scan
{ M23-Up Report Frequency
{ Resilience to attacks
{ etc.</p>
        <p>The continuous monitoring of the security metrics in the Security SLA
allowed detecting potential malicious activities based on a set of detection rules
denoting several kinds of attack signatures. For example, to evaluate the e
ciency in availability, we stopped the Tomcat server where the TSM engine was
running which caused the application availability rate (SLO more than 99%)
stated in the Security SLA was not respected. The incident was detected by the
MUSA monitoring agent and noti ed to the MUSA Security Assurance Platform
that raised immediately a violation alarm to the DevOps Team together with the
recommendation to restart the Tomcat server and to ensure server redundancy.
The DevOps Team followed the advice and used the High availability framework
MUSA enforcement agent to ensure server redundancy, which helped to recover
from the incident. Additional monitoring and reaction strategies provided by the
solution for incidents on identity thefts, unauthorized access control threats, etc.
were evaluated successfully.
7</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion and Future work</title>
      <p>Multi-cloud applications pose a great challenge to security assurance due to they
have to tackle the security of the individual components as well as the overall
application security, which in turn depends on the security controls provided
by the cloud services in use. Despite the cloud service providers o er their own
security controls, the multi-cloud application has to ensure integrated security
across the whole composition.</p>
      <p>The MUSA DevOps framework has been conceived and prototype created
to address such challenge. It supports the security-aware design and operation
of multi-cloud applications and integrates security-by-design mechanisms with
continuous security assurance. The later is o ered in form of a
Software-as-aService solution named MUSA Security Assurance Platform.</p>
      <p>The MUSA Security SLA-based assurance advances over the state of the art
in security-aware cloud SLAs, which foster clarity and transparency in cloud
service provisioning. The application composite Security SLA can be computed
and expressed in machine-readable format, relying on standard security control
families like those of NIST and Cloud Security Alliance.</p>
      <p>The MUSA Security Assurance platform enables cloud transparency by being
able to monitor security metrics in the Security SLA, and by keeping informed
multi-cloud application consumers on the real-time behaviour of both the
components and the cloud services underneath. Non-compliance with respect to
security level objectives in the Security SLAs of the used CSPs and the application
are early detected and reaction measures activated for prompt mitigation of the
risks. As a result, the presented approach enables multi-cloud applications be
secure and self-adaptive.</p>
      <p>The initial evaluation of MUSA security assurance approach in two real case
studies showed that the proposed methods and tools reduce the security aws in
the application implementation and are e ective in ensuring the multi-cloud
application complies with its composite Security SLA. Further evaluation rounds of
the MUSA framework are planned in the next months within the two case studies
presented above in order to assess the e ectiveness and usability of the
framework tools, particularly in the support to an integrated and multi-disciplinary
DevOps approach to enhance security in multi-cloud applications and rise
consumers' trust in cloud-based environments.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgment</title>
      <p>The MUSA project leading to this paper has received funding from the European
Union's Horizon 2020 research and innovation programme under grant agreement
No 644429. We would also like to acknowledge all the members of the MUSA
Consortium for their valuable help.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Rightscale:
          <article-title>Cloud computing trends: 2017 state of the cloud survey (</article-title>
          <year>2017</year>
          ) Available at: http://www.rightscale.com/blog/cloud-industry-insights/cloudcomputing-trends
          <article-title>-2017-state-cloud-survey.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Deloitte</surname>
          </string-name>
          <article-title>: Measuring the economic impact of cloud computing in europe</article-title>
          , smart number:
          <year>2014</year>
          /0031 (
          <year>2017</year>
          ) Available at: https://ec.europa.eu/digital-singlemarket/en/news/measuring-economic
          <article-title>-impact-cloud-computing-europe.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Casola</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Benedictis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Modic</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Villano</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Per-service security sla: a new model for security management in clouds</article-title>
          . In: Enabling Technologies:
          <article-title>Infrastructure for Collaborative Enterprises (WETICE</article-title>
          ),
          <year>2016</year>
          IEEE 25th International Conference on,
          <source>IEEE</source>
          (
          <year>2016</year>
          )
          <volume>83</volume>
          {
          <fpage>88</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Blasi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brataas</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boniface</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Butler</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>DAndria</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Drescher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jimenez</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krogmann</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kousiouris</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koller</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Landi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matera</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Menychtas</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oberle</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Phillips</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rea</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romano</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Symonds</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ziegler</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Cloud computing service level agreements { exploitation of research results (06</article-title>
          <year>2013</year>
          ) Available at: http://ec.europa.eu/information society/newsroom/cf/dae/document.cfm?doc id =
          <volume>2496</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. SPECS project:
          <source>Secure Provisioning of Cloud Services based on SLA management. FP7-ICT-2013.1</source>
          .
          <issue>5</issue>
          (
          <issue>2013</issue>
          -
          <fpage>2016</fpage>
          . Available at: www.specs-project.
          <source>eu/)</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>6. SLALOM project: Service Level Agreement - Legal and Open Model (</article-title>
          <year>2015</year>
          -
          <fpage>2016</fpage>
          . Available at: www.slalom-project.
          <source>eu/)</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>7. SLA-READY project: Making Cloud SLAs readily usable in the EU private sector</article-title>
          .
          <source>(</source>
          <year>2015</year>
          -
          <fpage>2016</fpage>
          . Available at: www.sla-ready.eu/)
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Rios</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iturbe</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Orue-Echevarria</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casola</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , et al.:
          <article-title>Towards self-protective multi-cloud applications: Musa{a holistic framework to support the security-intelligent lifecycle management of multi-cloud applications</article-title>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>9. MUSA project: Multi-cloud Secure Applications (</article-title>
          <year>2015</year>
          -2017) Available at: http://www.musa-project.
          <source>eu.</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Forum</surname>
            ,
            <given-names>G.I.C.T.</given-names>
          </string-name>
          :
          <article-title>Use cases and functional requirements for inter-cloud computing</article-title>
          .
          <source>In: Global Inter-Cloud Technology Forum, GICTF White Paper</source>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. ISO/IEC: Iso/iec 20000-1
          <article-title>:2011 information technology { service management { part 1: Service management system requirements (</article-title>
          <year>2011</year>
          ) Available at: https://www.iso.org/standard/51986.html.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. ETSI:
          <article-title>Interoperability and security in cloud computing</article-title>
          ,
          <source>etsi sr 003 391 v2.0</source>
          .
          <issue>0</issue>
          (
          <issue>2015</issue>
          ) Available at: http://csc.etsi.
          <source>org/resources/WP3- Report/STF 486 WP3 Report-v2.0</source>
          .0.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <article-title>National Institute of Standards and Technology (NIST): Security and privacy controls for federal information systems and organizations</article-title>
          .
          <volume>800</volume>
          -
          <fpage>53</fpage>
          (apr
          <year>2013</year>
          )
          <volume>1</volume>
          {
          <fpage>460</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Alliance</surname>
            ,
            <given-names>C.S.:</given-names>
          </string-name>
          <article-title>Cloud security alliance</article-title>
          ,
          <source>cloud controls matrix v3.0</source>
          .
          <issue>1</issue>
          (
          <issue>2016</issue>
          ) https://cloudsecurityalliance.org/research/ccm/.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. ISO/IEC: Iso/iec 27017:
          <article-title>2015 information technology { security techniques { code of practice for information security controls based on iso/iec 27002 for cloud services (</article-title>
          <year>2015</year>
          ) Available at: https://www.iso.org/standard/43757.html.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Casola</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Benedictis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Modic</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Erascu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Automatically enforcing security slas in the cloud</article-title>
          .
          <source>IEEE Transactions on Services Computing</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Andreieux</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Web services agreement speci cation (</article-title>
          <year>2007</year>
          ) Available at: https://www.ogf.org/documents/GFD.107.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Casola</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benedictis</surname>
            ,
            <given-names>A.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Villano</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>A security metric catalogue for cloud applications</article-title>
          .
          <source>In: Complex, Intelligent, and Software Intensive Systems - Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017)</source>
          , Torino, Italy,
          <source>July 10-12</source>
          ,
          <year>2017</year>
          . (
          <year>2017</year>
          )
          <volume>854</volume>
          {
          <fpage>863</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bu</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cai</surname>
          </string-name>
          , H.:
          <article-title>Sla-based service composition model with semantic support</article-title>
          .
          <source>In: Services Computing Conference (APSCC)</source>
          ,
          <year>2012</year>
          <article-title>IEEE Asia-Paci c</article-title>
          ,
          <source>IEEE</source>
          (
          <year>2012</year>
          )
          <volume>374</volume>
          {
          <fpage>379</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Zappatore</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bochicchio</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>SLA composition in service networks</article-title>
          .
          <source>In: Proceedings of the 30th Annual ACM Symposium on Applied Computing - SAC '15</source>
          , New York, New York, USA, ACM Press (
          <year>2015</year>
          )
          <volume>1219</volume>
          {1224 Available at: http://dl.acm.org/citation.cfm?doid=
          <volume>2695664</volume>
          .
          <fpage>2699490</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Security assurance of (multi-) cloud application with security sla composition</article-title>
          .
          <source>In: International Conference on Green, Pervasive, and Cloud Computing</source>
          , Springer (
          <year>2017</year>
          )
          <volume>786</volume>
          {
          <fpage>799</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Fatema</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emeakaroha</surname>
            ,
            <given-names>V.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Healy</surname>
            ,
            <given-names>P.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morrison</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lynn</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>A survey of Cloud monitoring tools: Taxonomy, capabilities and objectives</article-title>
          .
          <source>Journal of Parallel and Distributed Computing</source>
          <volume>74</volume>
          (
          <issue>10</issue>
          ) (oct
          <year>2014</year>
          )
          <volume>2918</volume>
          {
          <fpage>2933</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Naser</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zolkipli</surname>
            ,
            <given-names>M.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anwar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al-Hawawreh</surname>
            ,
            <given-names>M.S.:</given-names>
          </string-name>
          <article-title>Present Status and Challenges in Cloud Monitoring Framework: A Survey</article-title>
          .
          <source>In: 2016 European Intelligence and Security Informatics Conference (EISIC)</source>
          , IEEE (aug
          <year>2016</year>
          )
          <volume>201</volume>
          {
          <fpage>201</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Venticinque</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mhr</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Echevarria</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esnal</surname>
          </string-name>
          , G.:
          <article-title>Cloud Application Monitoring: The mOSAIC Approach</article-title>
          . In: 2011
          <source>IEEE Third International Conference on Cloud Computing Technology and Science</source>
          , IEEE (nov
          <year>2011</year>
          )
          <volume>758</volume>
          {
          <fpage>763</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Zeginis</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kritikos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garefalakis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konsolaki</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Magoutis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Towards Cross-Layer Monitoring of Multi-Cloud Service-Based Applications</article-title>
          .
          <source>In: Lecture Notes in Computer Science (including subseries Lecture Notes in Arti - cial Intelligence and Lecture Notes in Bioinformatics)</source>
          . Volume
          <volume>8135</volume>
          LNCS. (
          <year>2013</year>
          )
          <volume>188</volume>
          {
          <fpage>195</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Brogi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ibrahim</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Soldani</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carrasco</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cubo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pimentel</surname>
          </string-name>
          , E.,
          <string-name>
            <surname>D'Andria</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Seaclouds: a european project on seamless management of multi-cloud applications</article-title>
          .
          <source>ACM SIGSOFT Software Engineering Notes</source>
          <volume>39</volume>
          (
          <issue>1</issue>
          ) (
          <year>2014</year>
          ) 1{
          <fpage>4</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27. SINTEF:
          <article-title>Model-based provisioning and deployment of cloud-based systems (</article-title>
          <year>2013</year>
          ) Available at: http://cloudml.org.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Columbus</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Computerworld's 2015 forecast predicts security, cloud computing and analytics will lead it spending</article-title>
          . Online at: http://www.forbes.com/sites/louiscolumbus/2014/11/26/computerworlds-2015
          <string-name>
            <surname>-</surname>
          </string-name>
          forecast
          <article-title>-predicts-security-cloud-computing-and-analytics-will-</article-title>
          <string-name>
            <surname>lead-</surname>
          </string-name>
          it-spending/ (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Gartner</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Gartner it glossary devops</article-title>
          .
          <source>Gartner IT Glossary</source>
          (
          <year>2017</year>
          ) Available at: http://www.gartner.com/it-glossary/devops.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Afolaranmi</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moctezuma</surname>
            ,
            <given-names>L.E.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casola</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rios</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lastra</surname>
            ,
            <given-names>J.L.M.</given-names>
          </string-name>
          :
          <article-title>Methodology to obtain the security controls in multi-cloud applications</article-title>
          .
          <source>In: Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume</source>
          <volume>1</volume>
          : CLOSER,
          <string-name>
            <surname>,</surname>
            <given-names>INSTICC</given-names>
          </string-name>
          , ScitePress (
          <year>2016</year>
          )
          <volume>327</volume>
          {
          <fpage>332</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31. Openstack:
          <article-title>Pacemaker cluster stack (</article-title>
          <year>2015</year>
          ) https://docs.openstack.org/haguide/controller-ha-pacemaker.html.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>OASIS</surname>
          </string-name>
          <article-title>: extensible access control markup language (xacml) version 3</article-title>
          .0 (
          <issue>2013</issue>
          ) Available at: http://docs.oasis-open.
          <source>org/xacml/3</source>
          .0/xacml-3.0
          <article-title>-core-spec-osen</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33. of Technology, T.U.:
          <article-title>Intelligent transport systems and services (its) factory developer wiki (</article-title>
          <year>2014</year>
          ) Available at: http://wiki.itsfactory. /index.php/ITS Factory Developer Wiki.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>