A. Teshome, L. Rilling, and C. Morin, Verification for security monitoring slas in iaas clouds: The example of a network ids, NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp.1-7, 2018.

R. Bejtlich, The Tao of network security monitoring: beyond intrusion detection. Pearson Education, 2004.

M. Rak, N. Suri, J. Luna, D. Petcu, V. Casola et al., Security as a service using an sla-based approach via specs, Cloud Computing Technology and Science (CloudCom), vol.2, pp.1-6, 2013.

, Amazon Compute Service Level Agreement, 2018.

, Cloud File Sharing and Storage for your Business, 2018.

P. Wang, D. J. Dean, and X. Gu, Understanding real world data corruptions in cloud systems, 2015 IEEE International Conference on Cloud Engineering (IC2E), pp.116-125, 2015.

, S3 data corruption ?" accessed, 2018.

, Corrupt iCloud data causes iOS home screen crash, 2018.

S. Amazon, , 2018.

, DriveHQ Service Level Agreement, 2018.

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis et al., Hyperledger fabric: a distributed operating system for permissioned blockchains, Proceedings of the Thirteenth EuroSys Conference, p.30, 2018.

, On Public and Private Blockchains, 2018.

W. Ren, R. W. Beard, and E. M. Atkins, A survey of consensus problems in multi-agent coordination, Proceedings of the 2005, pp.1859-1864, 2005.

L. Lamport, R. Shostak, and M. Pease, The byzantine generals problem, ACM Transactions on Programming Languages and Systems (TOPLAS), vol.4, issue.3, pp.382-401, 1982.

M. Castro and B. Liskov, Practical byzantine fault tolerance, OSDI, vol.99, pp.173-186, 1999.

V. Buterin, Ethereum white paper, 2014.

L. Chen, L. Xu, N. Shah, Z. Gao, Y. Lu et al., On security analysis of proof-ofelapsed-time (poet), International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp.282-297, 2017.

V. Buterin, A next-generation smart contract and decentralized application platform, 2014.

F. B. Schneider, Replication management using the state-machine approach, distributed systems, 1993.

X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch et al., A taxonomy of blockchain-based systems for architecture design, IEEE, pp.243-252, 2017.

N. Oualha, J. Leneutre, and Y. Roudier, Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols, vol.5, pp.231-243, 2012.

Z. Hao and N. Yu, A multiple-replica remote data possession checking protocol with public verifiability, Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on, pp.84-89, 2010.

Z. Hao, S. Zhong, and N. Yu, A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability, IEEE transactions on Knowledge and Data Engineering, vol.23, issue.9, pp.1432-1437, 2011.

W. Luo and G. Bai, Ensuring the data integrity in cloud data storage, Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on, pp.240-243, 2011.

Y. Zhu, H. Wang, Z. Hu, G. Ahn, H. Hu et al., Cooperative provable data possession, 2010.

R. A. Popa, J. R. Lorch, D. Molnar, H. J. Wang, and L. Zhuang, Enabling security in cloud storage slas with cloudproof, USENIX Annual Technical Conference, vol.242, pp.355-368, 2011.

, Decentralized cloud object storage that is affordable and easy to use, 2018.

B. Liu, X. L. Yu, S. Chen, X. Xu, and L. Zhu, Blockchain based data integrity service framework for iot data, pp.468-475, 2017.

E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri et al., Blockchainbased database to ensure data integrity in cloud computing environments, 2017.

, An open standard for creating a timestamp proof of any data, file, or process, 2018.

D. Balouek, A. Amarie, G. Charrier, F. Desprez, E. Jeannot et al., Adding virtualization capabilities to the Grid'5000 testbed," in Cloud Computing and Services Science, ser. Communications in Computer and Information Science, vol.367, pp.3-20, 2013.

, Docker, 2018.

A. T. Wonjiga, L. Rilling, and C. Morin, Defining Security Monitoring SLAs in IaaS Clouds: the Example of a Network IDS, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02079860

. Inria,