ABSTRACT
Users of hosted web-based applications implicitly trust that those applications, and the data that is within them, will remain active and available indefinitely into the future. When a service is terminated, for reasons such as the insolvency of the business that is providing it, users risk the immediate loss of software functionality and may face the permanent loss of their own data. This paper presents Micasa, a runtime for hosted applications that allows a significant subset of application logic and user data to remain available even in the event of the failure of a provider's business. By allowing users to audit application dependence on hosted components, and maintain externalized and private copies of their own data and the logic that allows access to it, we believe that Micasa is a first step in the direction of a more balanced degree of trust and investment between application providers and their users.
- R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 conference on Data communication, SIGCOMM '09, pages 135--146, New York, NY, USA, 2009. ACM. Google ScholarDigital Library
- R. Chandra, P. Gupta, and N. Zeldovich. Separating web applications from user data storage with BSTORE. In Proceedings of the 2010 USENIX conference on Web application development, WebApps'10, pages 1--1, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarDigital Library
- A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten. Social networking with frientegrity: privacy and integrity with an untrusted provider. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 31--31, Berkeley, CA, USA, 2012. USENIX Association. Google ScholarDigital Library
- A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. Sporc: group collaboration using untrusted cloud resources. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarDigital Library
- G. Fox. Yahoo Sets the Date of GeoCities' Death. http://www.pcmag.com/article2/0,2817,2350024,00.asp.Google Scholar
- R. Geambasu, C. Cheung, A. Moshchuk, S. D. Gribble, and H. M. Levy. Organizing and sharing distributed personal web-service data. In Proceedings of the 17th international conference on World Wide Web, WWW '08, pages 755--764, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- Google. Chrome Apps. https://chrome.google.com/webstore.Google Scholar
- Google. Google Takeout. http://www.google.com/goodtoknow/manage-data/takeout/.Google Scholar
- Google. Official Blog: A fall sweep. http://googleblog.blogspot.ca/2011/10/fall-sweep.html.Google Scholar
- Google. Official Blog: A second spring of cleaning. http://googleblog.blogspot.ca/2013/03/a-second-spring-of-cleaning.html.Google Scholar
- L. Ingram and M. Walfish. TreeHouse: JavaScript sandboxes to helpWeb developers help themselves. In Proceedings of the 2012 USENIX conference on Annual Technical Conference, USENIX ATC'12, pages 13--13, Berkeley, CA, USA, 2012. USENIX Association. Google ScholarDigital Library
- M. Krohn, A. Yip, M. Brodsky, R. Morris, M. Walfish, et al. A world wide web without walls. Proceedings of HotNets-VI, Atlanta, GA, 2007.Google Scholar
- S. Lohr. Google to End Health Records Service After It Fails to Attract Users. http://www.nytimes.com/2011/06/25/technology/25health.html.Google Scholar
- J. Mickens, J. Elson, and J. Howell. Mugshot: deterministic capture and replay for javascript applications. In Proceedings of the 7th USENIX conference on Networked systems design and implementation, NSDI'10, pages 11--11, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarDigital Library
- Mozilla. Web Application Manifest Format and Management APIs (W3C Editor's Draft). http://mozilla.github.com/webapps-spec/.Google Scholar
- S. Musil. Instagram competitor PicPlz to shut down in July. http://news.cnet.com/8301-1023_3-57446282-93/instagram-competitor-picplz-to-shut-down-in-july/.Google Scholar
- J.-C. Sirot. jcsirot/digest.js. https://github.com/jcsirot/digest.js.Google Scholar
- W3C. Cross-Origin Resource Sharing. http://www.w3.org/TR/cors/.Google Scholar
- W3C. HTML5 Offline Web Applications. http://www.w3.org/TR/2011/WD-html5-20110525/offline.html.Google Scholar
- Z. Wilcox-O'Hearn and B. Warner. Tahoe: the least-authority filesystem. In Proceedings of the 4th ACM international workshop on Storage security and survivability, StorageSS '08, pages 21--26, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- Why Can't I Restore My Twitter and Facebook Data? http://blog.backupify.com/2011/01/12/why-cant-i-restore-my-twitter-and-facebook-data/.Google Scholar
- Camlistore Project Homepage. http://camlistore.org/.Google Scholar
- Diaspora Project Homepage. http://diasporaproject.org/.Google Scholar
- OpenPhoto Project Homepage. http://theopenphotoproject.org/.Google Scholar
- Unhosted: Freedom from web 2.0's monopoly platforms. http://unhosted.org.Google Scholar
Index Terms
- Tolerating business failures in hosted applications
Recommendations
Recovering business processes from business applications
A business process, such as the process followed when ordering a book, describes the order of executing tasks (e.g., check inventory, verify credit card, and ship book). Business applications implement the business processes for the daily operations of ...
Isolating commodity hosted hypervisors with HyperLock
EuroSys '12: Proceedings of the 7th ACM european conference on Computer SystemsHosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectively take advantage of the mature features and broad user bases of commodity operating systems. However, they are not immune to exploitable software bugs. ...
Recovering business processes from business applications
A business process, such as the process followed when ordering a book, describes the order of executing tasks (e.g., check inventory, verify credit card, and ship book). Business applications implement the business processes for the daily operations of ...
Comments