ABSTRACT
Cloud services have become a cheap and popular means of computing. They allow users to synchronize data between devices and relieve low-powered devices from heavy computations. In response to the surge of smartphones and mobile devices, several cloud-based Web browsers have become commercially available. These "cloud browsers" assemble and render Web pages within the cloud, executing JavaScript code for the mobile client. This paper explores how the computational abilities of cloud browsers may be exploited through a Browser MapReduce (BMR) architecture for executing large, parallel tasks. We explore the computation and memory limits of four cloud browsers, and demonstrate the viability of BMR by implementing a client based on a reverse engineering of the Puffin cloud browser. We implement and test three canonical MapReduce applications (word count, distributed grep, and distributed sort). While we perform experiments on relatively small amounts of data (100 MB) for ethical considerations, our results strongly suggest that current cloud browsers are a viable source of arbitrary free computing at large scale.
- A. Aboulnaga, Z. Wang, and Z. Y. Zhang. Packing the most onto your cloud. In CloudDB, Hong Kong, China, Nov. 2009. Google ScholarDigital Library
- P. Alpeyev, J. Galante, and M. Yasu. Amazon.com Server Said to Have Been Used in Sony Attack. Bloomberg, May 2011.Google Scholar
- AlwaysOn Technoligies. Cloud Browse. http://www.alwaysontechnologies.com/cloudbrowse/.Google Scholar
- Amazon EC2 Pricing. http://aws.amazon.com/ec2/pricing/. Accessed April 2012.Google Scholar
- Amazon Inc. Amazon Silk FAQ's. http://www.amazon.com/gp/help/customer/display.html/?nodeId=200775440.Google Scholar
- Amazon Simple Storage Service. http://aws.amazon.com/s3/.Google Scholar
- A.-L. Barabasi, V. W. Freeh, H. Jeong, and J. B. Brockman. Parasitic computing. Nature, 412: 894--897, 30 August 2001.Google ScholarCross Ref
- S. Bjork, L. E. Holmquist, J. Redstrom, et al. WEST: A Web Browser for Small Terminals. In ACM Symp. User Interface Software and Technology (UIST), 1999. Google ScholarDigital Library
- O. Buyukkokten, H. Garcia-Molina, A. Paepcke, and T. Winograd. Power Browser: Efficient Web Browsing for PDAs. In ACM SIGCHI, pages 430--437, 2000. Google ScholarDigital Library
- Y. Chen, X. Xie, W.-Y. Ma, and H.-J. Zhang. Adapting Web Pages for Small-Screen Devices. IEEE Internet Computing, 9(1): 50--56, 2005. Google ScholarDigital Library
- R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proc. ACM CCSW'09, Chicago, IL, 2009. Google ScholarDigital Library
- CloudMosa. Introducing Puffin. http://www.cloudmosa.com.Google Scholar
- K. Dahbur, B. Mohammad, and A. B. Tarakji. A survey of risks, threats and vulnerabilities in cloud computing. In Intl. Conf. Intelligent Semantic Web-Services and Applications, pages 12:1--12:6, 2011. Google ScholarDigital Library
- J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. In OSDI, 2004. Google ScholarDigital Library
- W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A Study of Android Application Security. In USENIX Security Symp., San Francisco, CA, USA, Aug. 2011. Google ScholarDigital Library
- R. Floyd, B. Housel, and C. Tait. Mobile Web Access Using eNetwork Web Express. IEEE Personal Communications, 5(6), 1998.Google Scholar
- A. Fox, I. Goldberg, S. D. Gribble, et al. Experience With Top Gun Wingman: A Proxy-Based Graphical Web Browser for the 3Com PalmPilot. In IFIP Middleware Conference, 1998. Google ScholarDigital Library
- B. Grobauer, T. Walloschek, and E. Stocker. Understanding cloud computing vulnerabilities. IEEE Security and Privacy, 9(2): 50--57, Mar. 2011. Google ScholarDigital Library
- R. Han, P. Bhagwat, R. LaMaire, T. Mummert, V. Perret, and J. Rubas. Dynamic Adaptation in an Image Transcoding Proxy for Mobile Web Browsing. IEEE Personal Communications, 5(6), 1998.Google Scholar
- M. Marlinspike. Cloudcracker. https://www.wpacracker.com, 2012.Google Scholar
- M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl. Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. In Proc. 20th USENIX Security Symposium, San Francisco, CA, Aug. 2011. Google ScholarDigital Library
- O. O'Malley. Terabyte sort on apache hadoop. http://sortbenchmark.org/Yahoo-Hadoop.pdf, May 2008.Google Scholar
- Opera mini & opera mobile browsers. http://www.opera.com/mobile.Google Scholar
- T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, 2009. Google ScholarDigital Library
- J. C. Roberts II and W. Al-Hamdani. Who can you trust in the cloud?: A review of security issues within cloud computing. In Info. Sec. Curriculum Development Conf., Kennesaw, GA, 2011. Google ScholarDigital Library
- T. Roth. Cracking Passwords In The Cloud: Amazon's New EC2 GPU Instances. http://stacksmashing.net/2010/11/15/cracking-in-the-cloud-amazons-new-ec2-gpu-instances/, 2010.Google Scholar
- J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono. All your clouds are belong to us: security analysis of cloud management interfaces. In ACM CCSW'11, 2011. Google ScholarDigital Library
- UCWeb. UC Browser. http://www.ucweb.com/English/UCbrowser/patent.html.Google Scholar
- W3C. Cross-Origin Resource Sharing. http://www.w3.org/TR/cors/, Apr. 2012. WD 3.Google Scholar
- X. Xiao, Q. Luo, D. Hong, H. Fu, X. Xie, and W.-Y. Ma. Browsing on Small Displays by Transforming Web Pages into Hierarchically Structured Sub-PAGES. ACM Trans. Web, 3(1): 4:1--4:36, Jan. 2009. Google ScholarDigital Library
Index Terms
- Abusing cloud-based browsers for fun and profit
Recommendations
Data mobile cloud technology: mVDI
SoICT '13: Proceedings of the 4th Symposium on Information and Communication TechnologyRecently, with the overwhelming growth of Cloud Computing (CC) and mobile devices, Mobile Cloud Computing (MCC) has emerged and become an attractive area of research. Unlike CC, MCC is formed from the properties of mobile devices such as hardware ...
Modeling Trust Based Risk Management in Cloud Adoption using Fuzzy Inference System
Cloud has revolutionized the entire landscape of IT usage, storage and maintenance. It has shifted the focus from owning physical IT infrastructure, facility and storage to the use of same in an abstract form with pay per use facility. This has led to ...
Learning cloud computing and security through CloudSim simulation
InfoSec '14: Proceedings of the 2014 Information Security Curriculum Development ConferenceCloud computing is an emerging parallel and distributed service-oriented computing paradigm that provides platform service, software service, and infrastructure service through computing resource virtualization. Cloud computing is fast evolving and ...
Comments