Cloud Service Model's Role in Provider and User Security Investment Incentives

被引:19
作者
Yang, Mingwen [1 ]
Jacob, Varghese S. [2 ]
Raghunathan, Srinivasan [2 ]
机构
[1] Univ Washington, Michael G Foster Sch Business, Seattle, WA 98195 USA
[2] Univ Texas Dallas, Naveen Jindal Sch Management, Richardson, TX 75080 USA
关键词
E‐ business; cloud computing; cloud security; cloud service model; game theory; INFORMATION SECURITY; SOFTWARE SECURITY; INTERDEPENDENCY; QUALITY; IMPACT;
D O I
10.1111/poms.13274
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cloud computing can be viewed as an e-business in which the cloud provider sells a range of information technology services and operations over the Internet to firms. Security is a major concern for firms that move to the cloud. The security of a cloud is the joint responsibility of the cloud provider and cloud users. However, the extent to which the provider and users can affect cloud security through their efforts depends on the cloud service model. In this study, we develop a game-theoretical model to study the impact of the cloud service model on provider and user incentives to exert security effort. Our results show that for a given service model, an increase in the user loss from a security breach induces users to exert more security effort. However, if the provider's service cost is low, the provider profitably free rides on the enhanced user incentives to exert security effort by diminishing his effort. Analogously, the cloud provider is able to profitably free ride on users' enhanced incentives to exert security effort when the user population is more homogeneous in terms of either cloud valuation or loss from a security breach, depending on the service cost. Our results also have implications for how a cloud provider could possibly target a particular cloud service model to specific user groups based on their characteristics and likelihood of security loss.
引用
收藏
页码:419 / 437
页数:19
相关论文
共 43 条
[1]   How Sourcing of Interdependent Components Affects Quality in Automotive Supply Chains [J].
Agrawal, Anupam ;
Muthulingam, Suresh ;
Rajapakshe, Tharanga .
PRODUCTION AND OPERATIONS MANAGEMENT, 2017, 26 (08) :1512-1533
[2]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[3]  
Anselmi Jonatha, 2014, ACM SIGMETRICS Performance Evaluation Review, V41, P47
[4]   Network software security and user incentives [J].
August, Terrence ;
Tunca, Tunay I. .
MANAGEMENT SCIENCE, 2006, 52 (11) :1703-1720
[5]   Cloud Implications on Software Network Structure and Security Risks [J].
August, Terrence ;
Niculescu, Marius Florin ;
Shin, Hyoduk .
INFORMATION SYSTEMS RESEARCH, 2014, 25 (03) :489-510
[6]   Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments [J].
August, Terrence ;
Tunca, Tunay I. .
MANAGEMENT SCIENCE, 2011, 57 (05) :934-959
[7]  
Brandom R., 2016, DROPBOXS 2012 BREACH
[8]   Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions [J].
Cezar, Asunur ;
Cavusoglu, Huseyin ;
Raghunathan, Srinivasan .
PRODUCTION AND OPERATIONS MANAGEMENT, 2017, 26 (05) :860-879
[9]  
Chang V, 2016, IEEE T SERV COMPUT, V9, P138, DOI [10.1109/TSC.2015.2491281, 10.1109/ISSNIP.2015.7106910]
[10]   The Impact and Implications of On-Demand Services on Market Structure [J].
Chen, Pei-Yu ;
Wu, Shin-Yi .
INFORMATION SYSTEMS RESEARCH, 2013, 24 (03) :750-767