Accountability for Federated Clouds

  • Thiago Gomes RodriguesEmail author
  • Patricia Takako Endo
  • David W. S. C. Beserra
  • Djamel Sadok
  • Judith Kelner


The evolution of software service delivery has changed the way accountability is performed. The complexity related to cloud computing environments increases the difficulty in properly performing accountability, since the evidences are spread through the whole infrastructure, from different servers at physical, virtualization, and application layers. This complexity increases when we are considering cloud federation because besides the inherent complexity of the virtualized environment, the federation members may not implement the same security procedures and policies. The main objective of this chapter is to present concepts about cloud security, discussing why accountability in federated scenarios is important and hard to provide, and propose an accountability framework, named CloudAcc, that supports audit, management, planning and billing process in federated cloud environments.


  1. 1.
    Aoyama, T., & Sakai, H. (2011). Inter-cloud-computing. Wirtschaftsinformatik, 53(3), 171–175.CrossRefGoogle Scholar
  2. 2.
    Ardagna, C. A., Asal, R., Damiani, E., & Vu, Q. H. (2015). From security to assurance in the cloud: A survey. ACM Computing Surveys (CSUR), 48(1), 2.CrossRefGoogle Scholar
  3. 3.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.CrossRefGoogle Scholar
  4. 4.
    Avetisyan, A. I., Campbell, R., Lai, K., Lyons, M., Milojicic, D. S., Lee, H. Y., Soh, Y. C., Ming, N. K., Luke, J. -Y., & Namgoong, H. et al. (2010). Open cirrus: A global cloud computing testbed. IEE Computer Society, 43(4), 35–43.CrossRefGoogle Scholar
  5. 5.
    Barreto, L., Fraga, J., & Siqueira, F. (2015). Cloud federations and security attributes. In 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems (SBRC) (pp. 140–149). New York: IEEE.CrossRefGoogle Scholar
  6. 6.
    Buyya, R., Ranjan, R., & Calheiros, R. N. (2010). Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. In Algorithms and architectures for parallel processing (pp. 13–31). Heidelberg: Springer.CrossRefGoogle Scholar
  7. 7.
    Castelluccia, C., Druschel, P., Hübner, S., Pasic, A., Preneel, B., & Tschofenig, H. (2011). Privacy, accountability and trust-challenges and opportunities. ENISA [Online]. Available:
  8. 8.
    Dagger, D., O’Connor, A., Lawless, S., Walsh, E., & Wade, V. P. (2007). Service-oriented e-learning platforms: From monolithic systems to flexible services. Internet Computing, IEEE, 11(3), 28–35.CrossRefGoogle Scholar
  9. 9.
    Erl, T. (2008). Soa: Principles of service design (Vol. 1). Upper Saddle River: Prentice Hall.Google Scholar
  10. 10.
    Farina, J., Scanlon, M., Le-Khac, N. -A., Kechadi, M., et al. (2015). Overview of the forensic investigation of cloud services. In 2015 10th International Conference on Availability, Reliability and Security (ARES) (pp. 556–565). New York: IEEE.CrossRefGoogle Scholar
  11. 11.
    Fernandes, D. A.B., Soares, L. F. B., Gomes, J. V., Freire, M. M., Inácio, P. R. M. (2014). Security issues in cloud environments: A survey. International Journal of Information Security, 13(2), 113–170.CrossRefGoogle Scholar
  12. 12.
    Fernandez, E. B., Monge, R., & Hashizume, K. (2016). Building a security reference architecture for cloud systems. Requirements Engineering, 21(2), 225–249.CrossRefGoogle Scholar
  13. 13.
    Koppell, J. G. S. (2005). Pathologies of accountability: Icann and the challenge of “multiple accountabilities disorder”. Public Administration Review, 65(1), 94–108.CrossRefGoogle Scholar
  14. 14.
    Malhotra, A., Van Gundy, M., Varia, M., Kennedy, H., Gardner, J., & Goldberg, S. (2016). The security of NTP’s datagram protocol. Cryptology ePrint Archive, Report 2016/055.
  15. 15.
    Mell, P., & Grance, T. (2011). The NIST definition of cloud computing [online]. Available: Scholar
  16. 16.
    Nakahara, S., & Ishimoto, H. (2010). A study on the requirements of accountable cloud services and log management. In 2010 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT) (pp. 1–6). New York: IEEE.Google Scholar
  17. 17.
    National Security Agency and Central Security Service. (2016). Information assurance directorate., Accessed: 2016-09-27.
  18. 18.
    NIST. (2010). Cloud computing. Accessed: 2016-05-27.Google Scholar
  19. 19.
    Pawluk, P., Simmons, B., Smit, M., Litoiu, M., & Mankovski, S. (2012). Introducing stratos: A cloud broker service. In 2012 IEEE Fifth International Conference on Cloud Computing (pp. 891–898). New York: IEEE.CrossRefGoogle Scholar
  20. 20.
    Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I. M., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., et al. (2009). The reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development, 53(4), 4–1.CrossRefGoogle Scholar
  21. 21.
    Rodrigues, T. G. (2016). Cloudacc: A cloud-based accountability frameworkfor federated cloud. PhD Thesis.Google Scholar
  22. 22.
    Sklavos, N., & Souras, P. (2006). Economic models & approaches in information security for computer networks. IJ Network Security, 2(1), 14–20.Google Scholar
  23. 23.
    Toosi, A. N., Calheiros, R. N., Buyya R. (2014). Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Computing Surveys (CSUR), 47(1), 7.CrossRefGoogle Scholar
  24. 24.
    Yao, J., Chen, S., Wang, C., Levy, D., & Zic, J. (2010). Accountability as a service for the cloud. In 2010 IEEE International Conference on Services Computing (SCC) (pp. 81–88). New York: IEEE.CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Thiago Gomes Rodrigues
    • 1
    Email author
  • Patricia Takako Endo
    • 2
  • David W. S. C. Beserra
    • 3
  • Djamel Sadok
    • 1
  • Judith Kelner
    • 1
  1. 1.Federal University of PernambucoRecifeBrazil
  2. 2.University of PernambucoCaruaruBrazil
  3. 3.Centre de Recherche en Informatique, Université Paris 1 Panthéon-SorbonneParisFrance

Personalised recommendations