References
[1]. Al Aqrabi, H., Liu, L., Hill, R., & Antonopoulos, N. (2014, August). A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. In High Performance Computing and Communications, 2014 IEEE 6th Intl. Symp. on Cyberspace Safety and Security, 2014 IEEE 11th Intl. Conf. on Embedded Software and Syst. (HPCC, CSS, ICESS), 2014 IEEE Intl. Conf. on (pp. 498-505). IEEE.
[2]. Amazon S3 Service Level Agreement. (2018). Amazon Simple Storage Service. Retrieved from https://aws.amazon.com/s3/sla/
[3]. Che, J., Duan, Y., Zhang, T., & Fan, J. (2011). Study on the security models and strategies of cloud computing. Procedia Engineering, 23, 586-593.
[4]. Colbert, B., & Batten, L. M. (2011, January). Dealing with rogue virtual machines in a cloud services environment. In CLOSER 2011: Proceedings of the 1st International Conference on Cloud Computing and Services Science (pp. 43-48). INSTICC.
[5]. Felici, M., & Fernández-Gago, C. (Eds.). (2015). Accountability and Security in the Cloud: First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures (Vol. 8937). Springer.
[6]. Gaggero, M., & Caviglione, L. (2016, July). Model predictive control for the placement of Virtual Machines in cloud computing applications. In American Control Conference (ACC), 2016 (pp. 1987-1992). IEEE.
[7]. Google Compute Engine Service Level Agreement. (2018). Google cloud. Retrieved from https://cloud. google.com/compute/sla
[8]. Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: A survey. Computers, 3(1), 1-35.
[9]. Kumar, V. K. A., Kumar, R., N., Kumar, K. K., & Kumar, S. N. K. (2014). Survey on security threats in cloud computing. International Journal of Applied Engineering Research (IJAER), 9(21), 10495-10500.
[10]. Perez-Botero, D., Szefer, J., & Lee, R. B. (2013, May). Characterizing hypervisor vulnerabilities in cloud computing servers. In Proceedings of the 2013 international workshop on Security in cloud computing (pp. 3-10). ACM.
[11]. SLA for Storage. (2015). Service Level Agreement. Retrieved from https://azure.microsoft.com/ en-in/ support/legal/sla/storage/v1_0/
[12]. Smith, J. E., & Nair, R. (2005a). The architecture of Virtual Machines. Computer, 38(5), 32-38.
[13]. Smith, J., & Nair, R. (2005b). Virtual Machines: Versatile Platforms for Systems and Processes. Elsevier.
[14]. Zhao, L., Sakr, S., Liu, A., & Bouguettaya, A. (2014). Cloud Data Management. Springer.