166
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Managing cloud security in the presence of strategic hacker and joint responsibility

, , &
Pages 1371-1384 | Received 19 Aug 2022, Accepted 02 Aug 2023, Published online: 26 Aug 2023
 

Abstract

The widespread use of cloud computing has brought cloud security to the forefront. The cloud provider and the firm assume varying degrees of joint responsibility for cloud security with cloud service models including IaaS, PaaS, and SaaS, to defend the strategic hacker. This paper builds a game-theoretical model to study cloud security management, in which we find that ignoring the strategic hacker leads to the dislocation security investment decisions (overinvestment or underinvestment) for the provider and the firm in bilateral refund contracts (BRCs). The strategic hacker’s attack effort is inverse U-shaped with cloud service models, leading to a free-riding problem between the provider and the firm. Furthermore, from the perspective of social welfare maximization, both the provider and the firm would underinvest or overinvest in cloud security. To solve the problem, we propose two new contract mechanisms: one is an internal effort-based contract, in which the provider oversees the firm internally and the compensation rate depends on the firm’s effort once the breach occurs. The other is an external effort-based contract, in which the monitoring agency supervises the efforts of the provider and the firm. We compare the two new contracts with BRCs and obtain the optimal choice for principals.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1 The subscripts C, F, H, M represent the cloud provider, the firm, the hacker and the monitor agency, respectively. The superscripts I, II, III, IV, V represent the cases that the BRC, the existence of the non-strategic hacker, the benchmark, the internal effort-based contract, the external effort-based contract, respectively.

3 In practice, the relationship between the monitoring cost and security effort may be ambiguous. The variable costs increase with the agent’s effort since more effort requires more monitoring cost. For simplicity, we omit the monitoring cost as 12MeF2.

Additional information

Funding

The authors are extremely grateful to the anonymous referees for their valuable and helpful comments. This work was supported by the Shanghai Social Science Foundation (No. 2022ZGL009), the National Natural Science Foundation of China (No. 71801035, 71872037, 71901058, 71832001), and the Fundamental Research Funds for the Central Universities.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 277.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.