Cloud Implications on Software Network Structure and Security Risks Terrence August Rady School of Management, UC San Diego Joint with Marius Florin Niculescu.

Slides:



Advertisements
Similar presentations
Economic implications of global patent backlogs Presentation by London Economics 10 March
Advertisements

Grow your business with your head in the cloud. What is Cloud Computing ? Internet-based computing, whereby shared resources, software and information.
Logo Software as a service (Saas) Group D Fong Hui Yun Kyung Jung Yijia Li Roxana Hernandez UC-Berkeley Strategic Computing and Communications Technology.
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES
Conducted by Phase II Quantitative Study Sept, 2001.
Amazon. Cloud computing also known as on-demand computing or utility computing. Similar to other utility providers like electric, water, and natural gas,
Why bring home a cow for a glass of milk?. New to ERP? Are you looking to buy an on-premise ERP solution?
Software Diversity for Information Security Gaurav Kataria Carnegie Mellon University.
Live for today as if it is your last day but plan for tomorrow as if it will last forever!
YOUR INTERNET EXPERIENCE
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2.1.
CRM SOFTWARE What is CRM, Evolution of CRM software and SaaS, SugarCRM in depth, CRM SW Market.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Engineering the Cloud Andrew McCombs March 10th, 2011.
Marketing Essentials Section 3.1 Capitalism
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
Copyright ©2004 Pearson Education, Inc. All rights reserved. Chapter 18 Asset Allocation.
Chapter-7 Introduction to Cloud Computing Cloud Computing.
SOFTWARE AS A SERVICE PLATFORM AS A SERVICE INFRASTRUCTURE AS A SERVICE.
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Solution Briefing Business Productivity in Action Keynote.
Cloud computing DSC340 Mike Pangburn. Relevance to companies?  Cloud Computing will be of particular relevance to the following types of firms:  Cash-lean.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
Banking Clouds V International Youth Banking Forum.
Fast, Friendly, Secure Authentication. Hackers favor authentication-based attacks, report shows. Summary: A suitable password replacement could disrupt.
Effects Of Animal Identification On Cattle Market Structure Prepared by: Darrell R. Mark, Ph.D. Asst. Professor & Extension Livestock Marketing Specialist.
Applications of Technology in Modern Accounting Jonathan Eno Christopher Parks Nathan Phillips.
Connect. Transact. Profit. Lessons Learned: 5 Reasons Cloud is CFO Friendly.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
PhD course - Milan, March /09/ Some additional words about cloud computing Lionel Brunie National Institute of Applied Science (INSA) LIRIS.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments Terrence August Rady School of Management,
Finance & Investment Club Fall 2012 Supply Chain Management Software and Services.
10 Two-sided Platforms 1 Aaron Schiff ECON
Software As A Service
"What is Cloud Computing and what does it mean to you???” Mark Munson.
By: Jeff Siglin BADM 559 Professor Michael Shaw. SaaS Introduction  What is it?  Technically Speaking: It’s software that’s developed and hosted by.
1 ©2009 Desktone, Inc. All rights reserved. Desktops in the Cloud: It’s not Virtual Desktop Infrastructure (VDI) Danny Allan, Chief Solution Architect.
Summary of Enterprise Computing Models. Slide 2 Enterprise Dimensions Who does what? In-source out-source hardware and software Staff vs. consultant What.
Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments Terrence August Rady School of Management,
SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments Author Linlin Wu, Saurabh Kumar Garg and Rajkumar.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
© 2014 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Linux vs. Windows: A Comparison of Application and Platform Innovation Incentives for Open Source and Proprietary Software Platforms Submitted By: Kishan.
Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
VirtuCo :: Authentication and Billing ::. VirtuCo v©v© Authentication schemes –Public key –Username and password –Combination –Additional possibilities.
Enterprise Cloud Computing
HUSKY CONSULTANTS FRANKLIN VALENCIA WIOLETA MILCZAREK ANTHONY GAGLIARDI JR. BRIAN CONNERY.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Michael van Dijken Marketing Communications Communications Sector Microsoft Corporation.
1 BSG LeatherLink Make IT Happen. 2 BSG LeatherLink About - BSG LeatherLink Founded and run by professionals with experience in Leather industry – 47.
The Business Research Company Technology. Technology Industry Taxonomy TBRC Business Research. All Rights Reseserved 2 Technology Computer Hardware &
Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Securing E-Transaction 1/24.
Software as a Service (SaaS) Fredrick Dande, MBA, PMP.
What Project Managers Need to Know About Cloud Computing Stacy Taylor President, Red Mountain Services
Ram Kumar - Director – Product Management techcello (A Division of Asteor Software Inc) Everything You Always Wanted To Know About Multi- Tenancy Speaker:
Gartner BI Summit február 6-7. A legfontosabbak
Public Management Information Systems Financing & Contracting Out Tuesday, June 21, 2016 Hun Myoung Park, Ph.D. Public Management & Policy Analysis Program.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2.1.
Introduction to Enterprise Systems. Slide 2 Objectives Review the enterprise ecosystem.
A.M. Mustehsan E Commerce: Chapter-1
Introduction to Enterprise Systems
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
CLOUD COMPUTING.
Software as a service (Saas)
Presentation transcript:

Cloud Implications on Software Network Structure and Security Risks Terrence August Rady School of Management, UC San Diego Joint with Marius Florin Niculescu and Hyoduk Shin (Georgia Tech & UC San Diego) NSF Grant:

Software Liability Loss liability is a strictly dominated policy for most software security environments

On-premises Browsers: IE, Firefox, Chrome A/V: Sophos, Avira, Symantec Webservers: IIS, Apache HTTP Server Doc Readers: Acrobat Reader, YAP App Servers: Websphere, JBoss, etc. SaaS Enterprise: Salesforce CRM, Netsuite ERP, CRM Productivity: Google Docs Rev. Mgmt: IBM DemandTec Social: LinkedIn, Facebook On-Premises and SaaS Software On-premises and SaaS Microsoft Office and Office 365 Microsoft Dynamics CRM On-premises / Online SAP Business All-in-One / SAP Business One OnDemand Oracle Siebel CRM / Oracle CRM OnDemand Where are we heading??

When to use On-Premises Require solution that meets the unique needs of your company (extensive customization) Require certain level of security and control over data Have a dedicated IT staff Do not want access to data to depend on Internet availability and speed On-site hardware maintenance When to use SaaS Want to get up and running as quickly as possible Require minimal customization (less integrated solution) Have limited IT support and resources Do not want to invest in hardware or pay upfront licensing fees Diverse Consumer Preferences

SAP

Cloud Computing Market  Gartner estimates the cloud computing industry will grow to $149 Billion by 2015  U.S. Government championing the Federal Cloud Computing Initiative Encourage agencies to use cloud computing solutions $80 Billion federal IT budget  SaaS applications will play an increasing role in firms’ IT strategies

 Security Risk comes in two forms:  Undirected:  Self-replicating attack such as a worm  Intent is to spread and distribute payload  Examples: Code Red, Slammer, Sasser, Stuxnet, AutoCad worm Security Attacks

WormDate Vulnerability Notice Code Red month Slammer months Blaster month Sasser weeks Zotob days Undirected Risk

 Security Risk comes in two forms:  Undirected:  Self-replicating attack such as a worm  Intent is to spread and distribute payload  Examples: Code Red, Slammer, Sasser, Stuxnet, AutoCad worm  Directed:  Targeted attack such as a hacker infiltration  Intent is to penetrate a particular organization for either an economic or political objective  Examples: distribute.IT, Office 365 token management vulnerability Security Attacks

Sony PlayStation Network Outage (April, 2011)  77 million user accounts compromised including date of birth, address, password information  Outage lasted 3 weeks Targeted Attack

 Both variants are affected by undirected and directed security attacks  On-Premises  Characterized by a large network of servers, each running distinct instances of the software  Heterogeneous users make independent patching decisions  Undirected risk  SaaS  Characterized by a centralized server or bank of servers  Acts more a single, large node  Directed risk Risk Profile: On-Premises vs. SaaS

Research questions 1.What are the benefits of developing SaaS versions of on-premises software products, focusing on how the joint offering affects the security risk properties of the software? 2.How does the effect on security of having both on-premises and SaaS variants relate to the classic information good versioning problem? Who should the firm target to use SaaS versions? 3.Compared to benchmark levels of vendor profits and social welfare, what is the impact of jointly offering SaaS versions? 4.How will the security risk faced by users be affected?

Literature Review Software Patching Beattie et al. (2002) August and Tunca (2006) Arora et al. (2006) Choi et al. (2007) Software Diversification Deswarte et al. (1999) Schneider and Birman (2009) Jackson et al. (2011) Chen et al. (2011) SaaS Choudhary (2007) Ma and Seidmann (2008) Zhang and Seidmann (2010) Xin (2011) Versioning Bhargava and Choudhary (2001, 2008) Wei and Nault (2011) Jones and Medelson (2011) Chellappa and Jia (2011) Chellappa and Mehra (2013)

 Consumer valuation space:  Cost of patching:  Money and effort exerted to verify, test, and roll-out patched versions of existing systems On-premises SaaS (On-demand) Valuation Security Losses Price Model

 Consumer Strategy Buy On-premises Patch / Not Patch Model Buy SaaS / Not Buy

Population of potential users On-premises Model

Non-users Patched users Unpatched users Population of potential users Don’t contribute to undirected risk Contribute to undirected risk Protect network from undirected risk On-premises Model

On-premises and SaaS Models

Contribute to directed risk

Security Costs where: Model

Consumer Market Equilibrium Structure Unpatched On-premises Users Patched On-premises Users Non-users  Threshold structure (2 possible orderings) SaaS Users

Unpatched On-premises Users Patched On-premises Users Non-users SaaS Users Equilibrium Equations

Consumer Market Equilibrium Structure  Other ordering Unpatched On-premises Users Patched On-premises Users Non-users SaaS Users

Vendor’s Problem Security Losses Social Welfare

Proposition  In equilibrium, there are always some on-premises users who remain unpatched  Cause a large externality under high security risk  Under SaaS, they will face directed risk  Segmenting usage across on-premises and SaaS diversifies this security risk High Security-Loss Environments

Proposition  Low patching costs  strong incentives to patch  Vendor can charge high price because relatively small unpatched population  set low SaaS price to version at low end while limiting cannibalization Where should SaaS be targeted?

 Security Loss Factor: Optimal pricing and the consumer market

Proposition  High patching costs  still strong incentives to patch  Patching populations fall  overall usage declines in the face of high security risk  Reduce price of on-premises to increase purchasing and patching populations  Strategically target SaaS at middle tier to reduce security risk Where should SaaS be targeted?

 Security Loss Factor: Optimal pricing and the consumer market

Proposition Welfare Implications

Benchmark Case  Only an on-premises offering (or can set )  In a high security-loss environment, patched and unpatched populations exist in equilibrium under optimal price  Use measures of profit, security losses, consumer surplus, and social welfare as benchmarks

Proposition Comparison to Benchmarks

Proposition Comparison to Benchmarks

Proposition Low Security-Loss Environments  Uniform valuations and no security externality  Don’t version  Uniform valuations and idiosyncratic risk  Version  Even if the strength of the losses becomes small

Proposition Comparison to Benchmarks

Relative Profit Improvement

Proposition Low Security-Loss Environments

Summary Table

Invest to reduce attack likelihood Security Investment UndirectedDirected Effort Cost of Effort Likelihood

Proposition Investment Comparative Statics  Low security-loss environment  Security investments in on-premises and SaaS both increase as the loss factor increases  High security-loss environment  Security investment in on-premises can increase while it can decrease in SaaS as the loss factor increases

Security Investment

Summary  Model of security risk that includes:  On-premises and SaaS versions of software  Security externalities stemming from usage and patching  Software vendor always versions  SaaS can be geared to either the middle or lower tiers sometimes splitting on-premises user populations  Average per-user security losses can increase when patching costs are low  SaaS targeted to middle tier maintains under security investment