skip to main content
10.1145/2523616.2523618acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Tolerating business failures in hosted applications

Authors Info & Claims
Published:01 October 2013Publication History

ABSTRACT

Users of hosted web-based applications implicitly trust that those applications, and the data that is within them, will remain active and available indefinitely into the future. When a service is terminated, for reasons such as the insolvency of the business that is providing it, users risk the immediate loss of software functionality and may face the permanent loss of their own data. This paper presents Micasa, a runtime for hosted applications that allows a significant subset of application logic and user data to remain available even in the event of the failure of a provider's business. By allowing users to audit application dependence on hosted components, and maintain externalized and private copies of their own data and the logic that allows access to it, we believe that Micasa is a first step in the direction of a more balanced degree of trust and investment between application providers and their users.

References

  1. R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 conference on Data communication, SIGCOMM '09, pages 135--146, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Chandra, P. Gupta, and N. Zeldovich. Separating web applications from user data storage with BSTORE. In Proceedings of the 2010 USENIX conference on Web application development, WebApps'10, pages 1--1, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten. Social networking with frientegrity: privacy and integrity with an untrusted provider. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 31--31, Berkeley, CA, USA, 2012. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. Sporc: group collaboration using untrusted cloud resources. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Fox. Yahoo Sets the Date of GeoCities' Death. http://www.pcmag.com/article2/0,2817,2350024,00.asp.Google ScholarGoogle Scholar
  6. R. Geambasu, C. Cheung, A. Moshchuk, S. D. Gribble, and H. M. Levy. Organizing and sharing distributed personal web-service data. In Proceedings of the 17th international conference on World Wide Web, WWW '08, pages 755--764, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Google. Chrome Apps. https://chrome.google.com/webstore.Google ScholarGoogle Scholar
  8. Google. Google Takeout. http://www.google.com/goodtoknow/manage-data/takeout/.Google ScholarGoogle Scholar
  9. Google. Official Blog: A fall sweep. http://googleblog.blogspot.ca/2011/10/fall-sweep.html.Google ScholarGoogle Scholar
  10. Google. Official Blog: A second spring of cleaning. http://googleblog.blogspot.ca/2013/03/a-second-spring-of-cleaning.html.Google ScholarGoogle Scholar
  11. L. Ingram and M. Walfish. TreeHouse: JavaScript sandboxes to helpWeb developers help themselves. In Proceedings of the 2012 USENIX conference on Annual Technical Conference, USENIX ATC'12, pages 13--13, Berkeley, CA, USA, 2012. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Krohn, A. Yip, M. Brodsky, R. Morris, M. Walfish, et al. A world wide web without walls. Proceedings of HotNets-VI, Atlanta, GA, 2007.Google ScholarGoogle Scholar
  13. S. Lohr. Google to End Health Records Service After It Fails to Attract Users. http://www.nytimes.com/2011/06/25/technology/25health.html.Google ScholarGoogle Scholar
  14. J. Mickens, J. Elson, and J. Howell. Mugshot: deterministic capture and replay for javascript applications. In Proceedings of the 7th USENIX conference on Networked systems design and implementation, NSDI'10, pages 11--11, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mozilla. Web Application Manifest Format and Management APIs (W3C Editor's Draft). http://mozilla.github.com/webapps-spec/.Google ScholarGoogle Scholar
  16. S. Musil. Instagram competitor PicPlz to shut down in July. http://news.cnet.com/8301-1023_3-57446282-93/instagram-competitor-picplz-to-shut-down-in-july/.Google ScholarGoogle Scholar
  17. J.-C. Sirot. jcsirot/digest.js. https://github.com/jcsirot/digest.js.Google ScholarGoogle Scholar
  18. W3C. Cross-Origin Resource Sharing. http://www.w3.org/TR/cors/.Google ScholarGoogle Scholar
  19. W3C. HTML5 Offline Web Applications. http://www.w3.org/TR/2011/WD-html5-20110525/offline.html.Google ScholarGoogle Scholar
  20. Z. Wilcox-O'Hearn and B. Warner. Tahoe: the least-authority filesystem. In Proceedings of the 4th ACM international workshop on Storage security and survivability, StorageSS '08, pages 21--26, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Why Can't I Restore My Twitter and Facebook Data? http://blog.backupify.com/2011/01/12/why-cant-i-restore-my-twitter-and-facebook-data/.Google ScholarGoogle Scholar
  22. Camlistore Project Homepage. http://camlistore.org/.Google ScholarGoogle Scholar
  23. Diaspora Project Homepage. http://diasporaproject.org/.Google ScholarGoogle Scholar
  24. OpenPhoto Project Homepage. http://theopenphotoproject.org/.Google ScholarGoogle Scholar
  25. Unhosted: Freedom from web 2.0's monopoly platforms. http://unhosted.org.Google ScholarGoogle Scholar

Index Terms

  1. Tolerating business failures in hosted applications

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  SOCC '13: Proceedings of the 4th annual Symposium on Cloud Computing
                  October 2013
                  427 pages
                  ISBN:9781450324281
                  DOI:10.1145/2523616

                  Copyright © 2013 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 October 2013

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  SOCC '13 Paper Acceptance Rate23of114submissions,20%Overall Acceptance Rate169of722submissions,23%
                • Article Metrics

                  • Downloads (Last 12 months)1
                  • Downloads (Last 6 weeks)0

                  Other Metrics

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader