Cloud computing threat reproduction: cloud browser abuse loopholes

Source: Internet
Author: User
Keywords Microsoft Cloud Storage Windows 8 Windows 8

The abuse of cloud browsers like Amazon Silk, Cloud Browse, Opera Mini, and Puffin gives anonymously free access to massive cloud computing tasks, no doubt for cloud computing where security trust is already precarious It was a heavy bomb dropped.

Security researchers show that cloud computing can be used at any cost without any hassle, as long as it can be found where its processing cycle is. Just as Amazon and Google embarked on a fierce battle for cloud computing, no cloud computing company beat the prices offered by academic computer researchers: it's completely free.

Other security researchers have demonstrated how to crack security vulnerabilities with cloud computing resources. For example, Moxie Marlinspike through its CloudCraker online password cracking service, showing how to use cloud computing resources to crack the network password, but the crack computing services but for a fee.

In a paper co-written by William Enck, an assistant professor of computer science at North Carolina State University and five other authors, the so-called Browser MapReduce (BMR) technology was proposed. MapReduce is a technology developed by Google for parallel computing of big data.

Browser MapReduce aggregates free JavaScript processing resources from cloud browsing together and processes the MapReduce jobs in conjunction with resource scheduling methods that release the computational constraints imposed by cloud browser vendors.

With careful collaboration, BMR successfully demonstrated a new way of performing parasitic computing, the paper notes. With free storage, BMR relies on the bit.ly short URL service to experiment with the encoded data stored in the URL and accessible via the bit.ly API.

The author of this essay also shows turning the cloud browser into an insecure mail server. Through the cloud rendering of the web page (Rendering), cloud computing providers will become an open computing center, in the same way, configure the mail server is not open, its open relay (Open Relay) function will be fully activated, so there will be They are at risk of spammers spamming hackers, they said.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.