Cloud Computing: Balancing Openness and Security
Cloud Computing: Balancing Openness and Security
18, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2900889
ABSTRACT Cloud computing companies need to achieve a balance between service openness and security
control to promote the growth of the cloud service business. This paper is a theoretical discussion of the
complete service openness condition and the complete security control condition based on Nash equilibrium
from the perspective of investment, including investment in service and investment in security by the cloud
computing company. The quantitative assessment methods of two conditions are designed based on the
investments. A quantitative analysis of the impact of security investments on security control and service
openness is presented. Based on this analysis, the optimal security investment for service openness and the
minimum complete service openness investment standard are derived. Finally, the relationship between them
is analyzed to help cloud computing providers decide the optimal strategy for coordinating investment in both
service and security.
INDEX TERMS Cloud computing service, service openness, security control, quantitative assessment
method, optimal investment coordination.
2169-3536 2019 IEEE. Translations and content mining are permitted for academic research only.
29038 Personal use is also permitted, but republication/redistribution requires IEEE permission. VOLUME 7, 2019
See [Link] for more information.
J. Xu et al.: Openness and Security in Cloud Computing Services: Assessment Methods and Investment Strategies Analysis
FIGURE 2. The game process between provider and user in cloud service.
service openness condition, the complete security control TABLE 1. Notation used in the model.
condition, and assessment methods of both, as well as the
optimal investment coordination strategy for service and
security, are obtained.
failure, so the background probability is 1 − β. The abnormal 1) THE COMPLETE SERVICE OPENNESS CONDITION
user will not have normal use profit E − pk, much less illegal Irrespective of the user’s decision, the provider’s decision is
benefit brisk , but also the user will be punished as prisk . The to chase more benefit. The expected utility of the provider
expected utility of the user is represented as uid22 . is ua .
(
uid22 = −(1 − β)[E − pk + brisk + prisk ] (2.a) a arg max{uad11 , uad21 } d i = d1i
u = (5)
arg max{uad22 , uad12 } d i = d2i
The provider loses all profit, including both the normal
Since the benign decision is an equilibrium point, the set
service profit (p − c)k and the additional profit padd . The
service of the provider is the Pareto optimal. Thus, if d i = d1i ,
expected utility of the provider is represented as uad22 .
ua = uad11 ⇒ uad11 ≥ uad21 . If d i = d2i , ua = uad12 ⇒ uad12 ≥
uad22 = −(1 − β)[(p − c)k + padd ] (2.b) uad22 . From derivation provided in Appendix A, we can derive
that if the service investment meets Eq.(6), the provider will
(III) Case Three: The provider rejects the normal user always tend to make a service decision. The complete service
because of a false-positive failure of security detection. The openness condition is expressed as follows:
strategy set is d21 = {d2a , d1i } and the background probability w > z + βlrisk − (p − c)k (6)
is α. Since no service is provided, the user does not obtain
normal use profit E − pk, and he also will be wrongly Set value B = z + βlrisk − (p − c)k is called the com-
punished prisk as an abnormal user. So, the expected utility plete service openness investment standard. It is obvious that
of the user is represented as uid21 . the increase in security investment z and the security loss,
which happened under the false-negative failure βlrisk , will
uid21 = −α[E − pk + prisk ] (3.a) increase this standard, whereas the normal service profit of
the provider (p − c)k decreases this standard. Eq.(6) can be
Similarly, the provider will not obtain the normal service transformed into w + pk ≥ z + ck + βlrisk . It is clear that
profit (p − c)k or any additional profit padd , and there will complete service openness means that the total benefit to the
be reputational losses ptrust . Thus, the expected utility of the provider is higher than total cost.
provider is represented as uad21 .
2) THE COMPLETE SECURITY CONTROL CONDITION
uad21 = −α[(p − c)k + ptrust + padd ] (3.b) There is a similar discussion for the user. Rationally, whatever
the decision of the provider, the user will chase more benefit.
(IV) Case Four: The provider serves the abnormal user The expected utility of the user is ui .
because of a false-negative failure of security detection. The (
strategy set is d12 = {d1a , d2i } and the background proba- i arg max{uid11 , uid12 } d a = d1a
u = (7)
bility is β. The abnormal user will obtain benefit, including arg max{uid21 , uid22 } d a = d2a
both normal use profit E − pk and illegal benefit brisk . So,
the expected utility of the user is represented as uid12 . Take the normal behavior decision of the user as the Pareto
optimality. If d a = d1a , ui = uid11 ⇒ uid11 ≥ uid12 , and if
uid12 = β[E − pk + brisk ] (4.a) d a = d2a , ui = uid21 ⇒ uid21 ≥ uid22 . From the derivation in
Appendix B, the following result can be obtained.
The provider obtains the normal service profit (p − c)k, If the probability of false-positive and false-negative
because the user pays for the service despite being an abnor- failure α, β can meet Eq.(8), the user will be forced to adopt
mal user because of PPU payment schema. The additional normal behavior, as determined by the cloud service’s secu-
profit padd is also obtained because service has occurred, but rity detection, even though security breaches still exits.
a security loss lrisk also occurs in this case. Thus, the expected
α(E − pk) + β(E − pk + brisk ) ≤ E − pk (8)
utility of the provider is represented as uad12 .
Obviously, β(E −pk +brisk ) is regarded as the total profit in
uad12 = β[(p − c)k − lrisk + padd ] (4.b) cases with false-negative failures of users who display abnor-
mal behavior, and α(E − pk) is the total profit in cases with
D. EQUILIBRIUM ANALYSIS AND CONDITIONS false-positive failures of users who display normal behavior.
GENERATION Eq.(8) shows that when the user’s expectation of total profit
Based on the above discussion, at a certain macro static time, under two security detection failures is smaller than the user’s
the strategy set of user and provider is finite, and equilib- normal profit of E −pk, cloud service can completely compel
rium must exist according to Nash’s equilibrium existence the user to display normal behavior.
theorem [34], [35]. Taking the benign decision as an equilib-
rium point, regardless of the decisions of provider and user, IV. ASSESSMENT METHODS
cloud service has complete service openness and complete In reality, conditions of complete service openness and secu-
security control at the same time. rity control are difficult to achieve. This section develops
FIGURE 5. The degree to which complete security control changes with FIGURE 6. The security breach changes with security investment.
the security breach.
is the threshold when the complete security control con- s(v, z) = v(λz+1) (12)
dition is just reached. This is the case of conditionally where the parameter λ > 0 is the intensity of security
controlled security. investment on security breach.
(E − pk)(1 − η)(η − s) Take a data simulation to describe the relationship between
S(s) = | | × 100% (11) security breach and security investment as shown in Fig.6.
s[(1 − 2η)(E − pk) − ηbrisk ]
Set λ is 0.2. Three kinds of original vulnerability of secu-
(3) If s ∈ (η, 1], the complete security control condition rity are shown by v = 0.3,0.6,0.9. Fig.6 shows that with
is impossible to reach, and the degree of complete an increase in security investment, three curves of security
security control is zero percent. This is the case of breach decrease from original vulnerability to almost zero.
completely uncontrollable security. The smaller the original vulnerability of security, the faster
There is a data simulation of the assessment function. the reduction of security breach with increased security
We set the normal use profit of user E − pk = 10, investment.
the proportion of normal user η is 0.5, and the illegal ben- The relationship of security breach with two failures is s =
efit of user brisk is 100. The degree to which complete αη+β(1−η) and s = v(λz+1) ⇒ v = s/vλz , so v = (α/vλz )η+
security control changes with a security breach is shown (β/vλz )(1−η). Since the original vulnerability of security v is
in Fig.5. security breach without security investment, that is z = 0 ⇒
s(v, 0) = v. Meanwhile v is also specifically expressed as
V. THE COMPREHENSIVE ANALYSIS two kinds of original detection failures α̂ and β̂, that is v =
Service openness and security control are affected by service α̂η + β̂(1 − η). Therefore, security investment also reduces
investment w and security investment z respectively. How- two failures, as expressed in α/vλz = α̂ ⇒ α = α̂vλz and
ever, in the complete service openness condition, security β/vλz = β̂ ⇒ β = β̂vλz .
FIGURE 9. The degree of complete service openness and complete service openness investment standard changes with the security investment.
(a) w < B∗ . (b) w = B∗ . (c) w > B∗ .
FIGURE 10. The degree of the complete service openness and the degree of the complete security control change with the security investment.
(a) z100% < z ∗ . (b) z100% = z ∗ . (c) z100% > z ∗ .
current service investment is less than the minimum complete openness declines slowly. Therefore, the best security invest-
service openness investment standard, in order to get better ment is more likely to be near z100% .
service openness, it is necessary to increase service invest-
ment to make it as close as possible to B∗ . VI. CONCLUSIONS
In Fig.10(c), complete service openness and security con- Cloud service should have good service openness for users
trol cannot be satisfied at the same time. In this complex and strong security control to protect providers. This paper
situation, the best security investment needs to be decided considers these two aspects from the perspective of service
according to the different attitudes of providers toward open- investment and security investment. To analyze these two and
ness and security. Generally, a provider chooses the optimal to obtain optimal investments to coordinate service openness
security investment z from the interval section [z∗ , z100% ] and security control, complete service openness and complete
security control conditions are obtained. From these two con-
(that is [ ln(λβ̂ln(1/v)l
λln(1/v)
risk ) 1 (E−pk)(1−η)
, λ logv v(E−pk+b risk )
]) because the secu-
ditions, assessment methods for complete service openness
rity investment of this interval section achieves relatively
and complete security control are further developed. The
balanced service openness and complete security control.
minimum complete service openness investment standard
And the best service investment is as close as possible to the
and the optimal security investment for service openness are
complete service openness investment standard B∗ .
obtained. Finally, the best service investment and the best
The specific optimal security investment can be obtained
security investment are discussed to balance service openness
by combining two assessment methods of service openness
and security control.
with Eq.(9) and security control with Eq.(13), according
First, this paper presents a static approach based on macro-
to their corresponding coordination mechanisms caused by
analysis. The expected utility is constructed under the back-
attitude to openness and security of cloud service provider.
ground probability and does not involve a specific time span.
A simple way is to find the intersection point of two assess-
Future research could add time factors to analyze the effect
ment functions in the interval section [z∗ , z100% ] to obtain
of corresponding conclusions, especially the relevant conclu-
a balance between service and security, and this intersec-
sions related to various economic factors parameter that are
tion point can be calculated by combining two assessment
updated dynamically with time. Second, the specific optimal
functions O(w) = [ 1−e e
(e−w/B − 1)]θ × 100% and S(z) =
(λz+1) investment strategy is based on different service and security
(E−pk)(1−η)(η−v
| v(λz+1) )
[(1−2η)(E−pk)−ηbrisk ]
| × 100% of B = z + β̂vλz lrisk − coordination mechanisms and the attitude of the provider
(p − c)k. However, security is usually the most important fact toward openness and security, which will be further studied
for cloud service companies. From Fig.10(c), when security based on the two assessment methods of this paper. Third,
investment approaches z100% , the degree of complete security this paper assumes the Nash equilibrium point is benign
control rises sharply, while the degree of complete service decisions of cloud service providers and users, thus deriving
APPENDIX A
TO OBTAIN THE COMPLETE SERVICE OPENNESS
CONDITION
The situation of d i = d1i and d i = d2i , from comparing
Eq.(1.b) and (3.b), Eq.(2.b) and (4.b). If the service of the FIGURE 11. The region expression in the security control.
provider is Pareto optimality, that implies that
(1−α)[(p−c)k +padd ] ≥ −α[(p−c)k +ptrust +padd ] (A1) E-pk E-pk
β[(p−c)k +padd − lrisk ] ≥ −(1 − β)[(p − c)k +padd ] (A2) E − pk + prisk E − pk + brisk + prisk
β0 =
And the additional profit padd contains service investment E-pk E − pk + brisk
w and security investment z, so padd = w − z. E − pk + prisk E − pk + brisk + prisk
It follows Eq.(A1) and (A2) that = −(E − pk)/prisk (B6)
(p−c)k +w−z−α(p−c)k ≥ −α(p − c)k − αptrust The normal use benefit of user E is higher than the user’s
β(p − c)k − βlrisk ≥ β(p − c)k − (p − c)k − (w − z) payment of them pk, and other economic factors are positive.
That is α0 > 0, β0 < 0 in Eq.(B5) and (B6). Thus, there
And further is the graph of the security control region shown as Fig.11.
w ≥ z − (p − c)k − αptrust (A3) It is easy to find the line of Eq.(B3) under the line expressed
by Eq.(B4), and region II is included in region I. If α and β
w ≥ z − (p − c)k + βlrisk (A4) meet Eq.(B3), then Eq.(B4) has been satisfied. Therefore if
Because α, β, ptrust , and lrisk are positive. It is clear that α(E − pk) + β(E − pk + brisk ) ≤ E − pk, the user exhibits
Eq.(A4) contains Eq.(A3). Therefore set B = z + βlrisk − normal behavior.
(p − c)k, if w ≥ B provider will service the user.
APPENDIX C
APPENDIX B TO OBTAIN THE ASSESSMENT METHOD OF DEGREE OF
TO OBTAIN THE COMPLETE SECURITY CONTROL COMPLETE SECURITY CONTROL
CONDITION Eq.(C1), which came from Eq.(8), is a linear function
The situation of d a = d1a and d a = d2a , from comparing about the probability of the false-positive failure α and the
Eq.(1.a) and (4.a), Eq.(2.a) and (3.a). If normal behavior of false-negative failure β. The relation between the security
the user is Pareto optimality, that implies that breach and the false-positive failure α and the false-negative
failure β is also a linear function described in Eq.(10). Fig.12
(1 − α)[E − pk] ≥ β[E − pk + brisk ] (B1) demonstrates the relationship between these two linear func-
−α[E − pk +prisk ] ≥ −(1−β)[E − pk +brisk +prisk ] (B2) tions to discuss the degree of the complete security control in
different situations.
It follows from Eq.(B1) and (B2) that
α(E −pk)+β(E −pk +brisk ) ≤ E −pk (B3) α(E − pk) + β(E − pk + brisk ) = E − pk (C1)
α(E −pk +prisk )+β(E −pk +brisk +prisk ) αη + β(1 − η) = s (10)
≤ E −pk +brisk +prisk (B4)
The coordinates of the intersection point I of these two lin-
And further, if and only if equality holds in Eq.(B3) ear functions is (α ∗ , β ∗ ), which can be calculated by Cramer’s
and (B4), then the solution of equations (α0 , β0 ) is obtained. rule:
According to the Cramer’s rule,
E-pk E − pk + brisk
E-pk E − pk +brisk s 1−η
E − pk +brisk +prisk E − pk + brisk + prisk α∗ =
α0 = E-pk E − pk + brisk
E-pk E − pk +brisk η 1−η
E − pk +prisk E − pk + brisk + prisk (1 − η − s)(E − pk) − sbrisk
= (C2)
= (E − pk + brisk + prisk )/prisk (B5) (1 − 2η)(E − pk) − ηbrisk
VOLUME 7, 2019 29047
J. Xu et al.: Openness and Security in Cloud Computing Services: Assessment Methods and Investment Strategies Analysis
REFERENCES [25] G. Levitin and K. Hausken, ‘‘Resource distribution in multiple attacks with
[1] P. C. Hershey, S. Rao, C. B. Silio, and A. Narayan, ‘‘System of systems for imperfect detection of the attack outcome,’’ Risk Anal., vol. 32, no. 2,
quality-of-service observation and response in cloud computing environ- pp. 304–318, Feb. 2011.
ments,’’ IEEE Syst. J., vol. 9, no. 1, pp. 212–222, Mar. 2015. [26] G. Levitin, K. Hausken, and H. B. Haim, ‘‘Defending majority voting sys-
[2] Y. Yao, J. Cao, S. Qian, and X. Wang, ‘‘Resource scheduling for real- tems against a strategic attacker,’’ Rel. Eng. Syst. Saf., vol. 111, pp. 37–44,
time analytical workflow services in the cloud,’’ IEEE Access, vol. 6, Aug. 2013.
pp. 57910–57922, 2018. [27] H. Cavusoglu, S. Raghunathan, and H. Cavusoglu, ‘‘Configuration of
and interaction between information security technologies: The case of
[3] C. Zuo, J. Shao, J. K. Liu, G. Wei, and Y. Ling, ‘‘Fine-grained two-factor
firewalls and intrusion detection systems,’’ Inf. Syst. Res., vol. 20, no. 2,
protection mechanism for data sharing in cloud storage,’’ IEEE Trans. Inf.
pp. 198–217, Jun. 2009.
Forensics Security, vol. 13, no. 1, pp. 186–196, Jan. 2018.
[28] K. Anastasopoulou, S. Kokolakis, and P. Andriotis, ‘‘Privacy decision-
[4] R. T. Zhou, Z. Li, and C. Wu, ‘‘Scheduling frameworks for cloud container
making in the digital era: A game theoretic review,’’ in Human
services,’’ IEEE-Acm Trans. Netw., vol. 26, no. 1, pp. 436–450, Feb. 2018.
Aspects of Information Security, Privacy and Trust. New York,
[5] L. Wang, Y. Ma, J. Yan, V. Chang, and A. Y. Zomaya, ‘‘pipsCloud:
NY, USA: Springer, 2017, pp. 589–603. [Online]. Available:
High performance cloud computing for remote sensing big data man-
[Link]
agement and processing,’’ Future Generat. Comput. Syst., vol. 78, no. 1,
[29] E. Furuncu and I. Sogukpinar, ‘‘Scalable risk assessment method for cloud
pp. 353–368, 2018.
computing using game theory (CCRAM),’’ Comput. Standards Interfaces,
[6] J. Vithayathil, ‘‘Will cloud computing make the information technology vol. 38, pp. 44–50, Feb. 2015.
(IT) department obsolete?’’ Inf. Syst. J., vol. 28, no. 4, pp. 634–649, [30] T. Nie and Y. Guo, ‘‘User behavior analysis model based on game theory
Jul. 2018. under multi-clouds environment,’’ Comput. Sci., vol. 4, no. 1, pp. 120–125,
[7] M. A. Lema et al., ‘‘Business case and technology analysis for 5g low 2014.
latency applications,’’ IEEE Access, vol. 5, pp. 5917–5935, 2017. [31] J. Cao, K. Hwang, K. Li, and A. Y. Zomaya, ‘‘Optimal multiserver config-
[8] Adam Levine-Weinberg. Is [Link]’s Retail Business Actually uration for profit maximization in cloud computing,’’ IEEE Trans. Parallel
Profitable? (It’s Complicated). Accessed: Nov. 28, 2018. [Online]. Distrib. Syst., vol. 24, no. 6, pp. 1087–1096, Jun. 2013.
Available: [Link] [32] J. L. Lucas-Simarro, R. Moreno-Vozmediano, R. S. Montero, and
[Link] M. I. Llorente, ‘‘Cost optimization of virtual infrastructures in dynamic
[9] W. A. Tan, S. Li, Q. Zhang, S. Chen, A. Tang, and X. Hu, ‘‘Reliable multi-cloud scenarios,’’ Concurrency Comput.-Pract. Exper., vol. 27, no. 9,
service computing platform architecture for cross-organizational work- pp. 2260–2277, Jun. 2015.
flows,’’ in Proc. IEEE Int. Conf. Syst., Man, Cybern. (SMC), Oct. 2014, [33] D. Ardagna, M., Ciavotta, and M. Passacantando, ‘‘Generalized nash
pp. 3066–3071. equilibria for the service provisioning problem in multi-cloud systems,’’
[10] Y. Ji, J. Zhang, J. Ma, C. Yang, and X. Yao, ‘‘BMPLS: Blockchain-based IEEE Trans. Services Comput., vol. 10, no. 3, pp. 381–395, May/Jun. 2017.
multi-level privacy-preserving location sharing scheme for telecare medi- [34] Z. Yang, D. Meng, and A. Wang, ‘‘On the existence of ideal Nash equilibria
cal information systems,’’ J. Med. Syst., vol. 42, no. 8, p. 147, Jun. 2018. in discontinuous games with infinite criteria,’’ Oper. Res. Lett., vol. 45,
[11] G. Garrison, S. Kim, and R. L. Wakefield, ‘‘Success factors for deploying no. 4, pp. 362–365, Jul. 2017.
cloud computing,’’ Commun. ACM, vol. 55, no. 9, pp. 62–68, Sep. 2012. [35] C. T. Do, N. H. Tran, E.-N. Huh, C. S. Hong, D. Niyato, and Z. Han,
[12] D. Byrne, C. Corrado, and D. E. Sichel, ‘‘The rise of cloud comput- ‘‘Dynamics of service selection and provider pricing game in hetero-
ing: Minding your p’s, q’s and k’s,’’ Nat. Bur. Econ. Res., Tech. Rep., geneous cloud market,’’ J. Netw. Comput. Appl., vol. 69, pp. 152–165,
Cambridge, MA, USA, Working paper 25188, 2018. [Online]. Available: Jul. 2016.
[Link] doi: 10.3386/w25188.
[13] H. MPH Yu, K. Williams, and X. H. Yuan, ‘‘Cloud computing threats
and provider security assessment,’’ in Algorithms Architectures
for Parallel Process., Ica3pp 2015, vol. 9532. New York,
NY, USA: Springer, 2015, pp. 238–250. [Online]. Available: JIAN XU received the B.S. degree in information
[Link] and computing science from the Hefei University
[14] S. Raja and S. Ramaiah, ‘‘Performance comparison of neuro-fuzzy cloud of Technology, in 2004, and the M.S. degree in
intrusion detection systems,’’ Int. Arab J. Inf. Technol., vol. 13, no. 1, applied mathematics from the Guilin University
pp. 142–149, Jan. 2016. of Electronic Technology, in 2007. He is currently
[15] Y. Wang, J. Ma, D. Lu, L. Zhang, and X. Meng, ‘‘Game optimization pursuing the Ph.D. degree in management sci-
for internal DDoS attack detection in cloud computing,’’ J. Comput. Res. ence and engineering with the School of Manage-
Develop., vol. 52, no. 8, pp. 1873–1882, 2015. ment, Hefei University of Technology. He is also
[16] H. J. Syed, A. Gani, F. H. Nasaruddin, A. Naveed, A. I. A. Ahmed, and a part-time Lecturer with the School of Statistics
K. Khan, ‘‘CloudProcMon: A non-intrusive cloud monitoring framework,’’ and Applied Mathematics, Anhui University of
IEEE Access, vol. 6, pp. 44591–44606, 2018.
Finance and Economics. His research interests include cloud computing
[17] L. A. Gordon and M. P. Loeb, ‘‘The economics of information security
service, management information systems, and big data analysis.
investment,’’ ACM Trans. Inf. Syst. Secur., vol. 5, no. 4, pp. 438–457, 2002.
[18] X. Gao, W. J. Zhong, and S. Mei, ‘‘A game-theory approach to config-
uration of detection software with decision errors,’’ Rel. Eng. Syst. Saf.,
vol. 119, pp. 35–43, Nov. 2013.
[19] Y. R. Chen, L. Q. Tian, and Y. Yang, ‘‘Model and analysis of user behavior
based on dynamic game theory in cloud computing,’’ Tien Tzu Hsueh CHANGYONG LIANG is currently a Professor of
Pao/acta Electronica Sinica, vol. 39, no. 8, pp. 1818–1823, Aug. 2011.
management information systems with the School
[20] J. T. Hamill, R. F. Deckro, and J. M. Kloeber, ‘‘Evaluating information
of Management, Hefei University of Technology,
assurance strategies,’’ Decis. Support Syst., vol. 39, no. 3, pp. 463–484,
where he is also with the Key Laboratory of
May 2005.
Process Optimization and Intelligent Decision-
[21] X. Zhao, F. Fang, and A. B. Whinston, ‘‘An economic mechanism for
better Internet security,’’ Decis. Support Syst., vol. 45, no. 4, pp. 811–821, Making. He has authored over 100 publications in
Nov. 2008. high level journals, such as Information and Man-
[22] X. Gao, W. J. Zhong, and S. E. Mei, ‘‘Security investment and information agement, the International Journal of Intelligent
sharing under an alternative security breach probability function,’’ Inf. Syst. Systems, Computers & Industrial Engineering,
Frontiers, vol. 17, no. 2, pp. 423–438, Apr. 2015. Artificial Intelligence in Medicine, the Interna-
[23] K. Hausken, ‘‘Information sharing among firms and cyber attacks,’’ tional Journal of Production Research, Applied Soft Computing, Expert
J. Accounting Public Policy, vol. 26, no. 6, pp. 639–688, Nov./Dec. 2007. Systems with Applications, and Knowledge-Based Systems. His research
[24] K. Hausken, ‘‘The economics of terrorism against two targets,’’ Appl. Econ. interests include information system management, cloud computing service,
Lett., vol. 19, no. 12, pp. 1135–1138, Aug. 2012. and smart business.