380 likes | 503 Views
Cloud Computing: Implications on Software Network Structure and Security Risks. Terrence August Rady School of Management, UCSD Joint with Marius Florin Niculescu and Hyoduk Shin (Georgia Tech & UCSD) NSF Grant: 0954234. Software. On-premises Internet Explorer, Firefox
E N D
Cloud Computing: Implications on SoftwareNetwork Structure and Security Risks Terrence August Rady School of Management, UCSD Joint with Marius Florin Niculescu and Hyoduk Shin (Georgia Tech & UCSD) NSF Grant: 0954234
Software • On-premises • Internet Explorer, Firefox • Sophos Anti-Virus • IIS, Apache HTTP Server • Adobe Acrobat Reader • SaaS • Salesforce CRM • Netsuite ERP, CRM • Google Docs • IBM DemandTec • On-premises and SaaS • Microsoft Office and Office 365 • Microsoft Dynamics CRM On-premises / Online • SAP Business All-in-One / SAP Business One OnDemand • Oracle Siebel CRM / Oracle CRM OnDemand Where are we heading??
On-premises vs. SaaS • When to use On-premises • Require solution that meets the unique needs of your company (extensive customization) • Require certain level of security and control over data • Have a dedicated IT staff • Do not want access to data to depend on Internet availability and speed • On-site hardware maintenance • When to use SaaS • Want to get up and running as quickly as possible • Require minimal customization (less integrated solution) • Have limited IT support and resources • Do not want to invest in hardware and license fees
Research questions What are the benefits of developing SaaS versions of on-premises software products, focusing on how the joint offering affects the security risk properties of the software? If versioning for risk diversification makes sense, who should be targeted to use SaaS versions via pricing? Compared to benchmark levels of vendor profits and social welfare, what is the impact of jointly offering SaaS versions? How will the security risk faced by users be affected? What are other options?
Literature Review • Software Patching • Beattie et al. (2002) • August and Tunca (2006) • Arora et al. (2006) • Choi et al. (2007) • Software Diversification • Deswarte et al. (1999) • Jackson et al. (2011) • Chen et al. (2011) • SaaS • Choudhary (2007) • Ma and Seidmann (2008) • Zhang and Seidmann (2010) • Xin (2011)
Model • Consumer valuation space: • Cost of patching: • Money and effort exerted to verify, test, and roll-out patched versions of existing systems
Model • Security Risk comes in two forms: • Undirected: • Self-replicating attack such as a worm • Intent is to spread and distribute payload • Examples: Code Red, Slammer, Sasser, Stuxnet, AutoCad worm
Undirected Risk Code Red • Worm that attacks web servers running IIS • Installs back door and propagates 100 times over per infection • Patch issued by Microsoft on June 18, 2001 • Struck on July 19, 2001
Model • Security Risk comes in two forms: • Undirected: • Self-replicating attack such as a worm • Intent is to spread and distribute payload • Examples: Code Red, Slammer, Sasser, Stuxnet, AutoCad worm • Directed: • Targeted attack such as a hacker infiltration • Intent is to penetrate a particular organization for either an economic or political objective • Examples: Sony PlayStation Network attack, Salesforce phishing attack, CardSystems Solutions
Directed Risk Sony PlayStation Network Outage (April, 2011) • 77 million user accounts compromised including date of birth, address, password information • Outage lasted 3 weeks
Directed Risk SonyPictures.com Hacked (June, 2011) • Again user accounts compromised including date of birth, address, password information (in plain text) • SQL Injection
Implications of SaaS Offerings • LinkedIn facing $5 million class action lawsuit (6.5 million users) • Yahoo being sued for password breach affecting 450K users • Stratfor (subscription-based, analysis of international affairs) • Approximately 200 GB sensitive info (credit card stored in plain text) • Settled class action lawsuit for $1.75 million • Other examples: Wyndham, TD Ameritrade, TJ Maxx
Model • Consumer Strategy Buy On-premises / Buy SaaS / Not Buy Patch / Not Patch
On-premises Model Population of potential users
On-premises Model Population of potential users Non-users Patched users Protect network from undirected risk Unpatched users Don’t contribute to undirected risk Contribute to undirected risk
On-premises and SaaS Models Contribute to directed risk
Model Usage Costs where:
Equilibrium Structure • SaaS for Low Tier • Conditions: • Equilibrium strategy profile: SaaS Users Non-users Patched On-premises Users Unpatched On-premises Users
Equilibrium Structure • SaaS for Middle Tier • Conditions: • Equilibrium strategy profile: SaaS Users Non-users Patched On-premises Users Unpatched On-premises Users
Equilibrium Equations SaaS Users Non-users Patched On-premises Users Unpatched On-premises Users
Vendor’s Problem Pricing
Security Risk Diversification Proposition • In equilibrium, there are always some on-premises users who remain unpatched • Cause a large externality under high security risk • Under SaaS, they will face directed risk • Segmenting usage across on-premises and SaaS diversifies this security risk
Where should SaaS be targeted? Proposition • Low patching costs strong incentives to patch • Vendor can charge high price because relatively small unpatched population set low SaaS price to limit cannibalization
Prices and the consumer market • Security Loss Factor:
Where should SaaS be targeted? Proposition • High patching costs still strong incentives to patch • Patching populations fall overall usage declines in the face of high security risk • Reduce price of on-premises to increase purchasing and patching populations • Strategically target SaaS at middle tier to reduce security risk
Prices and the consumer market • Security Loss Factor:
Welfare Implications Proposition
Comparison to Benchmarks Proposition
Security Implications of SaaS Proposition
Comparing Risk Diversification Benefits • Other possibilities • Reduce the likelihood of undirected attacks • Reduce the effective patching costs to users
Versioning Proposition • Uniform valuations and no security externality • Don’t version • Uniform valuations and idiosyncratic risk • Version • Even if the strength of the losses becomes small
Summary • Model of security risk that includes: • On-premises and SaaS versions of software • Security externalities stemming from usage and patching • Software vendor always versions • SaaS can be geared to either the middle or lower tiers sometimes splitting on-premises user populations • How pricing affects security risk • Average per-user security losses can increase when patching costs are low