The misuse of cloud browsers adds to cloud computing threats

Source: Internet
Author: User
Keywords Clouds cloud computing

Through the misuse of cloud browsers such as Amazon Silk, Cloud Browse, Opera Mini and Puffin, anonymous access to large-scale cloud computing tasks is no doubt a bombshell that has thrown off a heavy bomb in a precarious cloud security trust.

Security researchers show that cloud computing can be used indiscriminately without cost, as long as it can find out where its processing cycles are. Just as Amazon and Google launched a raging cloud-computing price war, no cloud-computing company could beat the price offered by academic computer researchers: totally free.

Other security researchers have demonstrated ways to crack security vulnerabilities through cloud computing resources. For example, Moxie Marlinspike through its cloudcraker online password cracking service, showing how to use the Cloud server computing resources to crack the network password, but the crack computing services to be charged.

William Enck, an assistant professor of computer science at the State University of North Carolina, co-authored the so-called browser MapReduce (BMR) technology in his paper with 5 other authors. MapReduce is a technology that Google has developed for parallel operations of large data.

Browser MapReduce can aggregate the free JavaScript processing resources provided from cloud browsing and handle the MapReduce job in conjunction with resource scheduling, which frees up the default and operational limitations of the Cloud browser vendor.

The BMR successfully demonstrated a new method of performing parasitic operations (parasitic computing) by careful collaboration, the paper points out. Through free storage, BMR can rely on bit.ly short Web site services for experimentation, encoding data from URL URLs can be saved and accessed through the bit.ly API.

The paper authors also show that turning cloud browsers into insecure mail servers. Through cloud page rendering (Rendering), cloud computing providers become open operations centers, and in the same way, improperly configured mail servers, their open relay (Relay) features are fully activated, and thus risk being hacked into spam-spamming tools, they say.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.