Table of Contents

 1     Scope            
 2     References  
 3     Definitions   
        3.1     Terms defined elsewhere              
        3.2     Terms defined in this Recommendation      
 4     Abbreviations and acronyms    
 5     Conventions
 6     Overview     
 7     Scope of monitoring data for cloud computing    
 8     Monitoring data lifecycle in cloud computing       
        8.1     Monitoring data collection             
        8.2     Monitoring data storage 
        8.3     Monitoring data use        
        8.4     Monitoring data migration              
        8.5     Monitoring data analysis 
        8.6     Monitoring data presentation        
        8.7     Monitoring data destruction          
        8.8     Monitoring data backup  
 9     Security threats and challenges for monitoring data of cloud computing       
        9.1     Security threats and challenges in monitoring data collection stage      
        9.2     Security threats and challenges in monitoring data storage stage          
        9.3     Security threats and challenges in monitoring data use stage 
        9.4     Security threats and challenges in monitoring data migration stage      
        9.5     Security threats and challenges in monitoring data analysis stage          
        9.6     Security threats and challenges in monitoring data presentation stage
        9.7     Security threats and challenges in monitoring data destruction stage   
        9.8     Security threats and challenges in monitoring data backup stage          
10     Security requirements for monitoring data of cloud computing      
       10.1     Security requirements for monitoring data collection            
       10.2     Security requirements for monitoring data storage 
       10.3     Security requirements for monitoring data use        
       10.4     Security requirements for monitoring data migration             
       10.5     Security requirements for monitoring data analysis
       10.6     Security requirements for monitoring data presentation       
       10.7     Security requirements for monitoring data destruction         
       10.8     Security requirements for monitoring data backup 
Bibliography