An Agency Perspective to Cloud Computing

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8914)

Abstract

The field of cloud computing is strongly affected by conflicts of interest between providers and users of resources. A comprehensive and integrative model for representing and analyzing these conflicts on a theoretically well-founded basis is, however, still lacking. Therefore, this paper establishes such a model based on economic agency theory. Employing two realistic example scenarios, we identify representative challenges faced by cloud users and generalize them as typical problems present in agency relations. Based on this conception, we correlate existing practices and strategies from cloud computing with corresponding abstract instruments from agency theory. Finally, we identify approaches that are – even if suggested by economic theory – not practically employed in the cloud domain and discuss the potential to utilize them in future technical and non-technical developments.

Keywords

Cloud computing Agency Principal-agent Adverse selection Moral hazard Hold-up 

Notes

Acknowledgements

The research presented in this paper has been partially funded by the European Commission in the context of the Research Framework Program Seven (FP7) project SECCRIT (Grant Agreement No. 312758, https://seccrit.eu).

References

  1. 1.
    Akerlof, G.A.: The market for “Lemons”: quality uncertainty and the market mechanism. Q. J. Econ. 84(3), 488–500 (1970)CrossRefGoogle Scholar
  2. 2.
    Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610–613 (2006)CrossRefGoogle Scholar
  3. 3.
    Aubert, B.A., Patry, M., Rivard, S.: Assessing the risk of IT outsourcing. In: Proceedings of 31st HICSS, vol. 6, pp. 685–692 (1998)Google Scholar
  4. 4.
    Bless, R., Flittner, M.: Towards corporate confidentiality preserving auditing mechanisms for clouds. In: Proceedings of 3rd International Conference on Cloud Networking (CloudNet), (2014). doi: 10.1109/CloudNet.2014.6969025
  5. 5.
    Eisenhardt, K.M.: Agency theory: an assessment and review. Acad. Manag. Rev. 14(1), 57–74 (1989)Google Scholar
  6. 6.
    Elitzur, R., Gavious, A., Wensley, A.K.: Information systems outsourcing projects as a double moral hazard problem. Omega 40(3), 379–389 (2012)CrossRefGoogle Scholar
  7. 7.
    Eymann, T., Knig, S., Matros, R.: A framework for trust and reputation in grid environments. J. Grid Comput. 6(3), 225–237 (2008)CrossRefGoogle Scholar
  8. 8.
    Friedman, M.: The methodology of positive economics. In: Hausman, D.M. (ed.) The Philosophy of Economics - An Anthology, 2nd edn, pp. 180–213. Cambridge University Press, Cambridge (1994)Google Scholar
  9. 9.
    Friedman, A.A., West, D.M.: Privacy and Security in Cloud Computing. Center for Technology Innovation at Brookings (2010)Google Scholar
  10. 10.
    Furubotn, E.G., Richter, R.: Institutions & Economic Theory: The Contribution of the New Institutional Economics, 2nd edn. The University of Michigan Press, Ann Arbor (2005)Google Scholar
  11. 11.
    Hamlen, K.W., Thuraisingham, B.: Data security services, solutions and standards for outsourcing. Comput. Stand. Interfaces 35(1), 1–5 (2013)CrossRefGoogle Scholar
  12. 12.
    Hauff, S., Huntgeburth, J., Veit, D.: Exploring uncertainties in a marketplace for cloud computing: a revelatory case study. J. Bus. Econ. 84(3), 441–468 (2014)CrossRefGoogle Scholar
  13. 13.
    Holmström, B., Roberts, J.: The boundaries of the firm revisited. J. Econ. Perspect. 12(4), 73–94 (1998)CrossRefGoogle Scholar
  14. 14.
    Jensen, M.C., Meckling, W.H.: Theory of the firm: managerial behavior, agency costs and ownership structure. J. Financ. Econ. 3(4), 305–360 (1976)CrossRefGoogle Scholar
  15. 15.
    Kim, K., Altmann, J.: Evolution of the software-as-a-service innovation system through collective intelligence. Int. J. Coop. Inf. Syst. 22(3), 1340006 (2013)CrossRefGoogle Scholar
  16. 16.
    Klein, B., Crawford, R.G., Alchian, A.A.: Vertical integration, appropriable rents, and the competitive contracting process. J. Law Econ. 21, 297–326 (1978)CrossRefGoogle Scholar
  17. 17.
    Ko, R.K.L., Lee, B.S., Pearson, S.: Towards achieving accountability, auditability and trust in cloud computing. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. CCIS, vol. 193, pp. 432–444. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  18. 18.
    Kshetri, N.: Privacy and security issues in cloud computing: the role of institutions and institutional evolution. Telecommun. Policy 37(4), 372–386 (2013)CrossRefGoogle Scholar
  19. 19.
    Kurze, T., Klems, M., Bermbach, D., Lenk, A., Tai, S., Kunze, M.: Cloud federation. In: Proceedings of Second International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 32–38 (2011)Google Scholar
  20. 20.
    Laffont, J.J., Martimort, D.: The Theory of Incentives - The Principal-Agent Model. Princeton University Press, Princeton (2002)Google Scholar
  21. 21.
    Leimeister, S., Böhm, M., Riedl, C., Krcmar, H.: The business perspective of cloud computing: actors, roles and value networks. In: Proceedings of ECIS 2010, Paper 56 (2010)Google Scholar
  22. 22.
    Lenk, A., Pallas, F.: Modeling quality attributes of cloud-standby-systems. In: Lau, K.-K., Lamersdorf, W., Pimentel, E. (eds.) ESOCC 2013. LNCS, vol. 8135, pp. 49–63. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  23. 23.
    Lenk, A., Tai, S.: Cloud standby: disaster recovery of distributed systems in the cloud. In: Villari, M., Zimmermann, W., Lau, K.-K. (eds.) ESOCC 2014. LNCS, vol. 8745, pp. 32–46. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  24. 24.
    Macías, M., Guitart, J.: Cheat-proof trust model for cloud computing markets. In: Vanmechelen, K., Altmann, J., Rana, O.F. (eds.) GECON 2012. LNCS, vol. 7714, pp. 154–168. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  25. 25.
    Milgrom, P., Roberts, J.: Economics, Organization & Management. Prentice Hall, Englewood Cliffs (1992)Google Scholar
  26. 26.
    National Institute of Standards and Technology (NIST): Special Publication 800–145 - The NIST Definition of Cloud Computing (2011). http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
  27. 27.
    National Institute of Standards and Technology (NIST): Special Publication 500–292 - NIST Cloud Computing Reference Architecture (2011). http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505
  28. 28.
    Spence, M.: Job market signaling. Q. J. Econ. 87(3), 355–374 (1973)CrossRefGoogle Scholar
  29. 29.
    Sunyaev, A., Schneider, S.: Cloud services certification. Commun. ACM 56(2), 33–36 (2013)CrossRefGoogle Scholar
  30. 30.
    Taylor, M., Haggerty, J., Gresty, D., Hegarty, R.: Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3), 304–308 (2010)CrossRefGoogle Scholar
  31. 31.
    Vykoukal, J., Wolf, M., Beck, R.: Services grids in industry - on-demand provisioning and allocation of grid-based business services. Bus. Inf. Syst. Eng. 1(2), 177–184 (2009)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Center for Applied Legal Studies, Karlsruhe Institute of TechnologyKarlsruheGermany
  2. 2.FZI Forschungszentrum InformatikBerlinGermany

Personalised recommendations