Carvallo, PamelaCavalli, Ana R.Mallouli, WissamRios, ErkudenAu, Man Ho AllenChoo, Kim-Kwang RaymondLi, Kuan-ChingCastiglione, ArcangeloPalmieri, Francesco2024-07-242024-07-242017Carvallo , P , Cavalli , A R , Mallouli , W & Rios , E 2017 , Multi-cloud applications security monitoring . in M H A Au , K-K R Choo , K-C Li , A Castiglione & F Palmieri (eds) , Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Proceedings . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 10232 LNCS , Springer Verlag , pp. 748-758 , 12th International Conference on Green, Pervasive and Cloud Computing, GPC 2017 , Cetara , Italy , 11/05/17 . https://doi.org/10.1007/978-3-319-57186-7_54conference97833195718500302-9743https://hdl.handle.net/11556/2744Publisher Copyright: © Springer International Publishing AG 2017.The issue of data security and privacy in multi-cloud based environments requires different solutions for implementing and enforcing security policies. In these environments, many security aspects must be faced, such as security-by-design, risk management, data privacy and isolation, and vulnerability scans. Moreover, it also becomes necessary to have a system that interrelates and operates all security controls which are configured and executed independently on each component of the application (service) being secured and monitored. In addition, thanks to the large diffusion of cloud computing systems, new attacks are emerging, so threat detection systems play a key role in the security schemes, identifying possible attacks. These systems handle an enormous volume of information as they detect unknown malicious activities by monitoring different events from different points of observation, as well as adapting to new attack strategies and considering techniques to detect malicious behaviors and react accordingly. To target this issue, we propose in the context of the MUSA EU Horizon 2020 project [1], a security assurance platform that allows monitoring the multi-cloud application deployed in different Cloud Server Providers (CSPs). It detects potential deviations from security Server Level Agreements (A formal, negotiated document that defines in quantitative and qualitative terms the service being offered to a Cloud Service Client (CSC). For more information see [8, 17].) (SLAs) and triggers countermeasures to enforce security during application runtime.11enginfo:eu-repo/semantics/restrictedAccessMulti-cloud applications security monitoringconference output10.1007/978-3-319-57186-7_54Cloud computingDetectionSecurity monitoringService level agreementTheoretical Computer ScienceGeneral Computer Sciencehttp://www.scopus.com/inward/record.url?scp=85019176947&partnerID=8YFLogxK