Skip to main content

An Agency Perspective to Cloud Computing

  • Conference paper
  • First Online:
Economics of Grids, Clouds, Systems, and Services (GECON 2014)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8914))

Included in the following conference series:

Abstract

The field of cloud computing is strongly affected by conflicts of interest between providers and users of resources. A comprehensive and integrative model for representing and analyzing these conflicts on a theoretically well-founded basis is, however, still lacking. Therefore, this paper establishes such a model based on economic agency theory. Employing two realistic example scenarios, we identify representative challenges faced by cloud users and generalize them as typical problems present in agency relations. Based on this conception, we correlate existing practices and strategies from cloud computing with corresponding abstract instruments from agency theory. Finally, we identify approaches that are – even if suggested by economic theory – not practically employed in the cloud domain and discuss the potential to utilize them in future technical and non-technical developments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For an overview of agency theory also discussing its different understandings and lines of research, see also [5].

  2. 2.

    In fact, the actual legal regulations are far more sophisticated. For instance, the transfer of personal data beyond the EU can be allowed if the destination country is explicitly recognized as providing an “adequate level of protection” or in case the transfer is covered by instruments like the “safe harbor agreement” or the so-called “standard contractual clauses”. This would, however, under certain circumstances (like, e.g., under German legislation) invalidate the legal construct of “processing on behalf of the controller” and thus result in further complications. Without going more into detail and for the sake of clarity, we therefore assume – like it is usually done in practice – a strict “EU-internal” requirement.

  3. 3.

    Like, e.g., CloudHarmony – https://www.cloudharmony.com/.

  4. 4.

    High-volume contracts concluded by government agencies or large, multinational corporations might be the exception here.

  5. 5.

    In order to actually provide this functionality, it is a necessary (but not sufficient) condition that receiving the certificate is more expensive for less capable providers than for strong ones. This can, however, be assumed for typical certification schemes.

  6. 6.

    Like, e.g., the Apache toolkits jclouds (https://jclouds.apache.org/) and libcloud (https://libcloud.apache.org/).

  7. 7.

    The same arguments do, of course, also apply to initiatives for cloud-related standardization which are basically also aimed at reducing the hold-up risk by establishing provider substitutability.

References

  1. Akerlof, G.A.: The market for “Lemons”: quality uncertainty and the market mechanism. Q. J. Econ. 84(3), 488–500 (1970)

    Article  Google Scholar 

  2. Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610–613 (2006)

    Article  Google Scholar 

  3. Aubert, B.A., Patry, M., Rivard, S.: Assessing the risk of IT outsourcing. In: Proceedings of 31st HICSS, vol. 6, pp. 685–692 (1998)

    Google Scholar 

  4. Bless, R., Flittner, M.: Towards corporate confidentiality preserving auditing mechanisms for clouds. In: Proceedings of 3rd International Conference on Cloud Networking (CloudNet), (2014). doi:10.1109/CloudNet.2014.6969025

  5. Eisenhardt, K.M.: Agency theory: an assessment and review. Acad. Manag. Rev. 14(1), 57–74 (1989)

    Google Scholar 

  6. Elitzur, R., Gavious, A., Wensley, A.K.: Information systems outsourcing projects as a double moral hazard problem. Omega 40(3), 379–389 (2012)

    Article  Google Scholar 

  7. Eymann, T., Knig, S., Matros, R.: A framework for trust and reputation in grid environments. J. Grid Comput. 6(3), 225–237 (2008)

    Article  Google Scholar 

  8. Friedman, M.: The methodology of positive economics. In: Hausman, D.M. (ed.) The Philosophy of Economics - An Anthology, 2nd edn, pp. 180–213. Cambridge University Press, Cambridge (1994)

    Google Scholar 

  9. Friedman, A.A., West, D.M.: Privacy and Security in Cloud Computing. Center for Technology Innovation at Brookings (2010)

    Google Scholar 

  10. Furubotn, E.G., Richter, R.: Institutions & Economic Theory: The Contribution of the New Institutional Economics, 2nd edn. The University of Michigan Press, Ann Arbor (2005)

    Google Scholar 

  11. Hamlen, K.W., Thuraisingham, B.: Data security services, solutions and standards for outsourcing. Comput. Stand. Interfaces 35(1), 1–5 (2013)

    Article  Google Scholar 

  12. Hauff, S., Huntgeburth, J., Veit, D.: Exploring uncertainties in a marketplace for cloud computing: a revelatory case study. J. Bus. Econ. 84(3), 441–468 (2014)

    Article  Google Scholar 

  13. Holmström, B., Roberts, J.: The boundaries of the firm revisited. J. Econ. Perspect. 12(4), 73–94 (1998)

    Article  Google Scholar 

  14. Jensen, M.C., Meckling, W.H.: Theory of the firm: managerial behavior, agency costs and ownership structure. J. Financ. Econ. 3(4), 305–360 (1976)

    Article  Google Scholar 

  15. Kim, K., Altmann, J.: Evolution of the software-as-a-service innovation system through collective intelligence. Int. J. Coop. Inf. Syst. 22(3), 1340006 (2013)

    Article  Google Scholar 

  16. Klein, B., Crawford, R.G., Alchian, A.A.: Vertical integration, appropriable rents, and the competitive contracting process. J. Law Econ. 21, 297–326 (1978)

    Article  Google Scholar 

  17. Ko, R.K.L., Lee, B.S., Pearson, S.: Towards achieving accountability, auditability and trust in cloud computing. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. CCIS, vol. 193, pp. 432–444. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  18. Kshetri, N.: Privacy and security issues in cloud computing: the role of institutions and institutional evolution. Telecommun. Policy 37(4), 372–386 (2013)

    Article  Google Scholar 

  19. Kurze, T., Klems, M., Bermbach, D., Lenk, A., Tai, S., Kunze, M.: Cloud federation. In: Proceedings of Second International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 32–38 (2011)

    Google Scholar 

  20. Laffont, J.J., Martimort, D.: The Theory of Incentives - The Principal-Agent Model. Princeton University Press, Princeton (2002)

    Google Scholar 

  21. Leimeister, S., Böhm, M., Riedl, C., Krcmar, H.: The business perspective of cloud computing: actors, roles and value networks. In: Proceedings of ECIS 2010, Paper 56 (2010)

    Google Scholar 

  22. Lenk, A., Pallas, F.: Modeling quality attributes of cloud-standby-systems. In: Lau, K.-K., Lamersdorf, W., Pimentel, E. (eds.) ESOCC 2013. LNCS, vol. 8135, pp. 49–63. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  23. Lenk, A., Tai, S.: Cloud standby: disaster recovery of distributed systems in the cloud. In: Villari, M., Zimmermann, W., Lau, K.-K. (eds.) ESOCC 2014. LNCS, vol. 8745, pp. 32–46. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  24. Macías, M., Guitart, J.: Cheat-proof trust model for cloud computing markets. In: Vanmechelen, K., Altmann, J., Rana, O.F. (eds.) GECON 2012. LNCS, vol. 7714, pp. 154–168. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  25. Milgrom, P., Roberts, J.: Economics, Organization & Management. Prentice Hall, Englewood Cliffs (1992)

    Google Scholar 

  26. National Institute of Standards and Technology (NIST): Special Publication 800–145 - The NIST Definition of Cloud Computing (2011). http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf

  27. National Institute of Standards and Technology (NIST): Special Publication 500–292 - NIST Cloud Computing Reference Architecture (2011). http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505

  28. Spence, M.: Job market signaling. Q. J. Econ. 87(3), 355–374 (1973)

    Article  Google Scholar 

  29. Sunyaev, A., Schneider, S.: Cloud services certification. Commun. ACM 56(2), 33–36 (2013)

    Article  Google Scholar 

  30. Taylor, M., Haggerty, J., Gresty, D., Hegarty, R.: Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3), 304–308 (2010)

    Article  Google Scholar 

  31. Vykoukal, J., Wolf, M., Beck, R.: Services grids in industry - on-demand provisioning and allocation of grid-based business services. Bus. Inf. Syst. Eng. 1(2), 177–184 (2009)

    Article  Google Scholar 

Download references

Acknowledgements

The research presented in this paper has been partially funded by the European Commission in the context of the Research Framework Program Seven (FP7) project SECCRIT (Grant Agreement No. 312758, https://seccrit.eu).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Frank Pallas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Pallas, F. (2014). An Agency Perspective to Cloud Computing. In: Altmann, J., Vanmechelen, K., Rana, O. (eds) Economics of Grids, Clouds, Systems, and Services. GECON 2014. Lecture Notes in Computer Science(), vol 8914. Springer, Cham. https://doi.org/10.1007/978-3-319-14609-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14609-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14608-9

  • Online ISBN: 978-3-319-14609-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics