1     Scope             
 2     References   
 3     Definitions    
        3.1     Terms defined
elsewhere               
        3.2     Terms defined in
this Recommendation       
 4     Abbreviations and acronyms     
 5     Conventions 
 6     Overview      
 7     Scope of monitoring data
for cloud computing     
 8     Monitoring data lifecycle
in cloud computing        
        8.1     Monitoring data
collection              
        8.2     Monitoring data
storage  
        8.3     Monitoring data
use         
        8.4     Monitoring data
migration               
        8.5     Monitoring data
analysis  
        8.6     Monitoring data
presentation         
        8.7     Monitoring data
destruction           
        8.8     Monitoring data
backup   
 9     Security threats and
challenges for monitoring data of cloud computing        
        9.1     Security threats
and challenges in monitoring data collection stage       
        9.2     Security threats
and challenges in monitoring data storage stage           
        9.3     Security threats
and challenges in monitoring data use stage  
        9.4     Security threats
and challenges in monitoring data migration stage       
        9.5     Security threats
and challenges in monitoring data analysis stage           
        9.6     Security threats
and challenges in monitoring data presentation stage 
        9.7     Security threats
and challenges in monitoring data destruction stage    
        9.8     Security threats
and challenges in monitoring data backup stage           
10     Security requirements for
monitoring data of cloud computing       
       10.1     Security requirements
for monitoring data collection             
       10.2     Security
requirements for monitoring data storage  
       10.3     Security
requirements for monitoring data use         
       10.4     Security
requirements for monitoring data migration              
       10.5     Security
requirements for monitoring data analysis 
       10.6     Security
requirements for monitoring data presentation        
       10.7     Security
requirements for monitoring data destruction          
       10.8     Security
requirements for monitoring data backup  
Bibliography