.. Broker, Délai moyen global pour un service IaaS sans NaaS dans l'architecture, p.88

C. Wygwam and . Computing, Réelle révolution ou simple évolution ?,» En ligne, 2015.

L. Vaquero, L. Merino, J. Caceres, and M. Lind, A break in the clouds, ACM SIGCOMM Computer Communication Review, vol.39, issue.1, pp.50-55, 2009.
DOI : 10.1145/1496091.1496100

R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. , Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, vol.25, issue.6, pp.599-616, 2009.
DOI : 10.1016/j.future.2008.12.001

S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2010.
DOI : 10.1016/j.jnca.2010.07.006

H. Sakai, «Standardization Activities for Cloud Computing,» Global Standardization Activities, NTT Information Sharing Platform Laboratories Musashino-shi, 2011.

R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De-rose, and R. Buyya, «CloudSim : a toolkit for modelsing and simulation of cloud computing environments and evaluation of resource provisioning algorithms,» Software : Practice and Experience, pp.23-50, 2011.

J. Jung and H. Kim, Designing and implementing MapReduce computing model on CloudSim, ICTC 2012 International Conference on ICT Convergence, pp.504-509, 2012.
DOI : 10.1109/ictc.2012.6387186

S. Ostermann, K. Plankensteiner, R. Prodan, T. Fahringer, M. Tighe et al., «GroudSim : an event-based simulation framework for computational grids and clouds,» Core- GRID/ERCIM Workshop on Grids and Clouds «DCSim : a data centre simulation tool for evaluating dynamic virtualized resource management, The 6th International DMTF Academic Alliance Workshop on Systems and Virtualization Management : Standard and the Cloud, pp.305-313, 2010.

D. Kliazovich, P. Bouvry, and S. U. Khan, GreenCloud: A Packet-Level Simulator of Energy-Aware Cloud Computing Data Centers, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-5, 2010.
DOI : 10.1109/GLOCOM.2010.5683561

A. Nunez, J. L. Vazquez-poletti, A. C. Caminero, and G. G. , Castane et al, «iCanCloud : a flexible and scalable cloud infrastructure simulator, Journal of Grid Computing, vol.1, issue.1, pp.185-209, 2012.

. «sap-business-bydesign, En ligne : www.sap.com/sme/solutions/business management/businessbydesign/index.epx [accédé en 10, 2015.

. «windows-azure, En ligne : www.microsoft.com/azure accédé en 10, 2015.

M. «dedicated-server and . Hosting, Web Hosting by RackspaceHosting " » En ligne : http ://www.rackspace.com [accédé en 10, 2015.

I. «focus-group-on-cloud and . Computing, » Parts 1 to 7, 2012. [51] «OpenStack : NaaS,» En ligne : https ://wiki.openstack.org/wiki, 2015.

S. K. Garg and R. Buyya, NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations, 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp.105-113, 2011.
DOI : 10.1109/UCC.2011.24

T. Benson, A. Akella, A. Shaikh, and S. Sahu, CloudNaaS, Proceedings of the 2nd ACM Symposium on Cloud Computing, SOCC '11, pp.1-13, 2011.
DOI : 10.1145/2038916.2038924

R. Buyya, R. Ranjan, and R. Calheiros, «Intercloud : Utility-oriented federation of cloud computing environments for scaling of application services,» Algorithms and Architectures for Parallel Processing, pp.13-31, 2010.

C. J. Wu, J. M. Ho, and M. S. Chen, «Time-Critical Event Dissemination in Geographically Distributed Clouds, IEEE INFOCOM Workshop on Cloud Computing, pp.654-659, 2011.

F. Faniyi, R. Bahsoon, and G. Theodoropoulos, A Dynamic Data-Driven Simulation Approach for Preventing Service Level Agreement Violations in Cloud Federation, International Conference on Computational Science, ICCS 2012, Procedia Computer Science 9, pp.1167-1176, 2012.
DOI : 10.1016/j.procs.2012.04.126

H. S. Gunawi, T. Do, J. M. Hellerstein, I. Stoica, D. Borthakur et al., Failure as a service (faas) : A cloud service for large-scale, online failure drills, 2011.

S. Paquette, P. T. Jaeger, and S. C. Wilson, Identifying the security risks associated with governmental use of cloud computing, Government Information Quarterly, vol.27, issue.3, pp.245-253, 2010.
DOI : 10.1016/j.giq.2010.01.002

I. Brandic and E. Feller, «Energy and QoS-aware workload management in clouds,» The final proposal of the focus group, 2011.

I. Goiri, F. Julia, J. O. Fito, M. Mac?as, and J. Guitart, Resource-Level QoS Metric for CPU-Based Guarantees in Cloud Providers, LNCS, vol.6296, pp.34-47, 2010.
DOI : 10.1007/978-3-642-15681-6_3

URL : http://capinfo.e.ac.upc.edu/PDFs/dir18/file003788.pdf

W. Yanzhi, C. Shuang, and M. Pedram, Service Level Agreement-Based Joint Application Environment Assignment and Resource Allocation in Cloud Computing Systems, 2013 IEEE Green Technologies Conference (GreenTech), pp.167-174, 2013.
DOI : 10.1109/GreenTech.2013.33

Y. Kouki and T. Ledoux, «CSLA : a Language for improving Cloud SLA Management, International Conference on Cloud Computing and Services Science, CLOSER 2012, 2012.

L. Wu, S. Garg, and R. Buyya, SLA-Based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.23-26, 2011.
DOI : 10.1109/CCGrid.2011.51

H. Park and H. , Jeong, «The QoS-based MCDM system for SaaS ERP applications with Social Network

I. Trajkovska, J. Salvachúa, and A. M. Velasco, «A Novel P2P and Cloud Computing Hybrid Architecture for Multimedia Streaming with QoS Cost Functions,» MM'10, 2010.

R. Nathuji, A. Kansal, and A. Ghaffarkhah, Q-clouds, Proceedings of the 5th European conference on Computer systems, EuroSys '10, 2010.
DOI : 10.1145/1755913.1755938

J. Edmondson, D. Schmidt, and A. Gokhale, QoS-Enabled Distributed Mutual Exclusion in Public Clouds, OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems, pp.542-559, 2011.
DOI : 10.1007/978-3-642-25106-1_9

V. Stantchev and C. Schröpfer, Negotiating and Enforcing QoS and SLAs in Grid and Cloud Computing, Proc. of the 4th International Conference on Advances in Grid and Pervasive Computing (GPC), pp.25-35, 2009.
DOI : 10.1007/978-3-642-01671-4_3

S. Garg, C. Yeo, and A. , Anandasivam et R. Buyya, «Environment-conscious scheduling of HPC applications on distributed cloud-oriented data centers, Journal of Parallel and Distributed Computing, 2011.

R. Karim, D. Chen, and A. Miri, An End-to-End QoS Mapping Approach for Cloud Service Selection, 2013 IEEE Ninth World Congress on Services, pp.341-348, 2013.
DOI : 10.1109/SERVICES.2013.71

W. Yanzhi, L. Xue, and M. Pedram, A Game Theoretic Framework of SLA-based Resource Allocation for Competitive Cloud Service Providers, Sixth Annual IEEE Green Technologies Conference, pp.37-43, 2014.

H. Feng and W. Wu, Framework and user migration strategy of cloud-based video conference multi-gateway system, 2012 19th International Conference on High Performance Computing, pp.1-8, 2012.
DOI : 10.1109/HiPC.2012.6507521

Y. Wu, C. Wu, B. Li, and F. Lau, vSkyConf, Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, MCC '13, 2013.
DOI : 10.1145/2491266.2491273

Y. Feng, . Ba, B. Li, and . Li, Airlift: Video conferencing as a cloud service using inter-datacenter networks, 2012 20th IEEE International Conference on Network Protocols (ICNP), 2012.
DOI : 10.1109/ICNP.2012.6459966

J. Cerviño, P. Rodríguez, I. Trajkovska, F. Escribano, and J. Salvachúa, A Cost-Effective Methodology Applied to Videoconference Services over Hybrid Clouds, Mobile Networks and Applications, vol.13, issue.5, pp.103-109, 2013.
DOI : 10.1007/s11036-012-0380-4

J. Cervino, F. Escribano, P. Rodríguez, I. Trajkovska, and J. Salvachúa, Videoconference Capacity Leasing on Hybrid Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.340-347, 2011.
DOI : 10.1109/CLOUD.2011.51

Y. Demchenko, Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services, 2011 IEEE Third International Conference on Cloud Computing Technology and Science, pp.255-263, 2011.
DOI : 10.1109/CloudCom.2011.42

D. Zissis and D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, vol.28, issue.3, pp.583-592, 2012.
DOI : 10.1016/j.future.2010.12.006

W. Stallings, Network security essentials : applications and standards, 2005.

]. L. Karadsheh, Applying security policies and service level agreement to IaaS service model to enhance security and transition". computers & security 31, pp.315-326, 2012.

I. Studnia, Survey of security problems in cloud computing virtual machines. Computer and Electronics Security Applications, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00761206

I. M. Khalil, A. Khreishah, and M. Azeem, Cloud Computing Security: A Survey, Computers, vol.3, issue.1, pp.11-35, 2014.
DOI : 10.3390/computers3010001

W. Yanzhi, C. Shuang, and M. Pedram, Service Level Agreement-Based Joint Application Environment Assignment and Resource Allocation in Cloud Computing Systems, 2013 IEEE Green Technologies Conference (GreenTech), pp.167-174, 2013.
DOI : 10.1109/GreenTech.2013.33

C. Christmann, J. Falkner, A. Horch, and H. Kett, Identification of IT Security and legal requirements regarding Cloud services, Sixth International Conference on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING 2015, pp.1-7, 2015.

M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A. V. Vasilakos et al., SeDaSC: Secure Data Sharing in Clouds, IEEE Systems Journal, pp.1-10, 2015.
DOI : 10.1109/JSYST.2014.2379646

W. Fan and H. Perros, A novel trust management framework for multi-cloud environments based on trust service providers. Knowledge-Based Systems, pp.392-406, 2014.

K. Sankar, S. Kannan, and P. Jennifer, On-demand security architecture for cloud computing, Middle-East J. Sci. Res, vol.20, issue.2, pp.241-246, 2014.

Q. Liu, G. Wang, and J. Wu, Time-based proxy re-encryption scheme for secure data sharing in a cloud environment, Information Sciences, vol.258, pp.355-370, 2014.
DOI : 10.1016/j.ins.2012.09.034

M. Ficco and M. Rak, Stealthy Denial of Service Strategy in Cloud Computing, IEEE Transactions on Cloud Computing, vol.3, issue.1, 2014.
DOI : 10.1109/TCC.2014.2325045

V. Varadharajan and U. Tupakula, Counteracting security attacks in virtual machines in the cloud using property based attestation, Journal of Network and Computer Applications, vol.40, pp.31-45, 2014.
DOI : 10.1016/j.jnca.2013.08.002

M. Kazim, R. Masood, and M. A. Shibli, Securing the virtual machine images in cloud computing, Proceedings of the 6th International Conference on Security of Information and Networks, SIN '13, pp.425-428, 2013.
DOI : 10.1145/2523514.2523576

C. Li, A. Raghunathan, and N. K. Jha, A Trusted Virtual Machine in an Untrusted Management Environment, IEEE Transactions on Services Computing, vol.5, issue.4, pp.472-483, 2012.
DOI : 10.1109/TSC.2011.30

M. Aslam, C. Gehrmann, and M. Bjorkman, Security and Trust Preserving VM Migrations in Public Clouds, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.869-876, 2012.
DOI : 10.1109/TrustCom.2012.256

L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia et al., Security and privacy for storage and computation in cloud computing, Information Sciences, vol.258, pp.371-386, 2014.
DOI : 10.1016/j.ins.2013.04.028

H. Moraes, R. Nunes, and D. Guedes, DCPortalsNg : efficient isolation of tenant networks in virtualized datacenters, Thirteenth International Conference on Networks, pp.230-235, 2014.

X. He, T. Chomsiri, P. Nanda, and Z. Tan, Improving cloud network security using the Tree-Rule firewall, Future Generation Computer Systems, vol.30, pp.116-126, 2014.
DOI : 10.1016/j.future.2013.06.024

S. Ruj, M. Stojmenovic, and A. Nayak, Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, pp.384-394, 2014.
DOI : 10.1109/TPDS.2013.38

S. K. Sah, S. Shakya, and H. Dhungana, A security management for Cloud based applications and services with Diameter-AAA, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp.6-11, 2014.
DOI : 10.1109/ICICICT.2014.6781243

M. L. Hale and R. Gamble, Building a Compliance Vocabulary to Embed Security Controls in Cloud SLAs, 2013 IEEE Ninth World Congress on Services, pp.118-125, 2013.
DOI : 10.1109/SERVICES.2013.27

D. Serrano, SLA guarantees for cloud services, Future Generation Computer Systems, vol.54, 2015.
DOI : 10.1016/j.future.2015.03.018

URL : https://hal.archives-ouvertes.fr/hal-01162654

M. L. Hale and R. Gamble, Risk propagation of security SLAs in the cloud, 2012 IEEE Globecom Workshops, pp.730-735, 2012.
DOI : 10.1109/GLOCOMW.2012.6477665

M. Rak, L. Liccardo, and R. Aversa, A SLA-based interface for security management in cloud and GRID integrations, 2011 7th International Conference on Information Assurance and Security (IAS), pp.378-383, 2011.
DOI : 10.1109/ISIAS.2011.6122783

S. H. Na and E. N. Huh, A broker-based cooperative security-SLA evaluation methodology for personal cloud computing, Security and Communication Networks, vol.45, issue.7, 2014.
DOI : 10.1002/sec.1086

S. Aparecida-de-chaves, C. Becker-westphall, and F. R. Lamin, SLA Perspective in Security Management for Cloud Computing, Sixth International Conference on Networking and Services, 2010.

Y. Neng-hai, Z. Hao, J. Xu, W. Zhang, and C. Zhang, Review of cloud computing security , Acta Electron, Sinica, vol.41, issue.2, pp.371-381, 2013.

C. Rong, S. T. Nguyen, and M. G. Jaatun, Beyond lightning: A survey on security challenges in cloud computing, Computers & Electrical Engineering, vol.39, issue.1, pp.47-54, 2013.
DOI : 10.1016/j.compeleceng.2012.04.015

M. D. Ryan, Cloud computing security: The scientific challenge, and a survey of solutions, Security and privacy in cloud computing, pp.2263-2268, 2013.
DOI : 10.1016/j.jss.2012.12.025

Z. Tari, Security and Privacy in Cloud Computing, IEEE Cloud Computing, vol.1, issue.1, pp.54-57, 2014.
DOI : 10.1109/MCC.2014.20

L. Soares, D. Fernandes, J. V. Gomes, M. M. Freire, and P. Inácio, Cloud security : state of the art, in : Security, Privacy and Trust in Cloud Systems, pp.3-44, 2014.

C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, A survey on security issues and solutions at different layers of Cloud computing, The Journal of Supercomputing, vol.34, issue.2, pp.561-592, 2013.
DOI : 10.1007/s11227-012-0831-5

R. Latif, H. Abbas, S. Assar, and Q. Ali, Cloud Computing Risk Assessment: A Systematic Literature Review, Future Information Technology, pp.285-295, 2014.
DOI : 10.1007/978-3-642-40861-8_42

D. A. Fernandes, L. F. Soares, J. V. Gomes, M. M. Freire, and P. Inácio, Security issues in cloud environments: a survey, International Journal of Information Security, vol.28, issue.3, pp.113-170, 2014.
DOI : 10.1007/s10207-013-0208-7

R. Chandramouli, M. Iorga, and S. Chokhani, Cryptographic key management issues and challenges in cloud services, Secure Cloud Computing, pp.1-30, 2014.
DOI : 10.6028/nist.ir.7956

M. Ali, S. Khan, and A. Vasilakos, Security in cloud computing: Opportunities and challenges, Information Sciences, vol.305, pp.357-383, 2015.
DOI : 10.1016/j.ins.2015.01.025

R. Pottier and J. Menaud, «BtrScript : A Safe Management System for Virtualized Data Center,» ICAS 2012, The Eighth International Conference on Autonomic and Autonomous Systems, pp.49-56, 2012.

F. Hermenier, A. Lèbre, and J. Menaud, Cluster-wide context switch of virtualized jobs, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC '10, pp.658-666, 2010.
DOI : 10.1145/1851476.1851574

URL : https://hal.archives-ouvertes.fr/inria-00476790

E. Daubert and F. , André et O. Barais, «Adaptation multi-niveaux : l'infrastructure au service des applications,» RenPar'20 / SympA'14, 2011.

D. Hoffert and . Schmidt, Gokhale, «Adapting distributed realtime and embedded publish/subscribe middleware for cloud-computing environments, Proc. of ACMII- FlPIUSENlX Middleware, 2010.
DOI : 10.1007/978-3-642-16955-7_2

Y. Kouki and T. Ledoux, SLA-driven capacity planning for Cloud applications, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012.
DOI : 10.1109/CloudCom.2012.6427519

URL : https://hal.archives-ouvertes.fr/hal-00734417

F. Faniyi, R. Bahsoon, and G. Theodoropoulos, A Dynamic Data-Driven Simulation Approach for Preventing Service Level Agreement Violations in Cloud Federation, International Conference on Computational Science, ICCS 2012, Procedia Computer Science 9, pp.1167-1176, 2012.
DOI : 10.1016/j.procs.2012.04.126

D. Ardagna, M. Trubian, and L. Zhang, SLA based resource allocation policies in autonomic environments, Journal of Parallel and Distributed Computing, vol.67, issue.3, pp.259-270, 2007.
DOI : 10.1016/j.jpdc.2006.10.006

H. Van, F. Tran, and J. Menaud, SLA-Aware Virtual Resource Management for Cloud Infrastructures, 2009 Ninth IEEE International Conference on Computer and Information Technology, pp.357-362, 2009.
DOI : 10.1109/CIT.2009.109

URL : https://hal.archives-ouvertes.fr/hal-00474722

W. Itani, C. Ghali, R. Bassil, A. Kayssi, and A. Chehab, ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud, Future Generation Computer Systems (Impact Factor : 2.365), in press, 2012.
DOI : 10.1016/j.future.2012.05.013

A. Alwesabi and K. Okba, SECURITY METHOD: CLOUD COMPUTING APPROACH BASED ON MOBILE AGENTS, International Journal of New Computer Architectures and their Applications, vol.4, issue.4, pp.17-29, 2014.
DOI : 10.17781/P002

URL : https://doaj.org/article/9803e1cf7f1b44d4872b296928c0f2c4

M. Huebscher and J. Mccann, A survey of autonomic computing???degrees, models, and applications, ACM Computing Surveys, vol.40, issue.3, pp.1-28, 2008.
DOI : 10.1145/1380584.1380585

Y. Chen, V. Paxson, and R. H. Katz, «What's New About Cloud Computing Security ?, pp.1-8, 2010.

D. Riquet, G. Grimaud, and M. Hauspie, «Étude de l'impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux ,» 9ème Conférence Internationale Jeunes Chercheurs, pp.1-8

M. Baugher, D. Mcgrew, M. Naslund, E. Carrara, and K. Norrman, RFC 3711 : The Secure Real-time Transport Protocol (SRTP), Request for Comments, IETF, 2004.

E. Rescola and N. Modadugu, RFC 4347 : Datagram Transport Layer Security (DTLS), Request for Comments, IETF, 2006.

J. Schiller, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload and Authentication Header, 2005.