173
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Managing cloud security in the presence of strategic hacker and joint responsibility

, , &
Pages 1371-1384 | Received 19 Aug 2022, Accepted 02 Aug 2023, Published online: 26 Aug 2023
 

Abstract

The widespread use of cloud computing has brought cloud security to the forefront. The cloud provider and the firm assume varying degrees of joint responsibility for cloud security with cloud service models including IaaS, PaaS, and SaaS, to defend the strategic hacker. This paper builds a game-theoretical model to study cloud security management, in which we find that ignoring the strategic hacker leads to the dislocation security investment decisions (overinvestment or underinvestment) for the provider and the firm in bilateral refund contracts (BRCs). The strategic hacker’s attack effort is inverse U-shaped with cloud service models, leading to a free-riding problem between the provider and the firm. Furthermore, from the perspective of social welfare maximization, both the provider and the firm would underinvest or overinvest in cloud security. To solve the problem, we propose two new contract mechanisms: one is an internal effort-based contract, in which the provider oversees the firm internally and the compensation rate depends on the firm’s effort once the breach occurs. The other is an external effort-based contract, in which the monitoring agency supervises the efforts of the provider and the firm. We compare the two new contracts with BRCs and obtain the optimal choice for principals.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1 The subscripts C, F, H, M represent the cloud provider, the firm, the hacker and the monitor agency, respectively. The superscripts I, II, III, IV, V represent the cases that the BRC, the existence of the non-strategic hacker, the benchmark, the internal effort-based contract, the external effort-based contract, respectively.

3 In practice, the relationship between the monitoring cost and security effort may be ambiguous. The variable costs increase with the agent’s effort since more effort requires more monitoring cost. For simplicity, we omit the monitoring cost as 12MeF2.

Additional information

Funding

The authors are extremely grateful to the anonymous referees for their valuable and helpful comments. This work was supported by the Shanghai Social Science Foundation (No. 2022ZGL009), the National Natural Science Foundation of China (No. 71801035, 71872037, 71901058, 71832001), and the Fundamental Research Funds for the Central Universities.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.