skip to main content
research-article

Microcomputations as Micropayments in Web-based Services

Published:01 May 2014Publication History
Skip Abstract Section

Abstract

In this article, we propose a new micropayment model for nonspecialized commodity web-services based on microcomputations. In our model, a user that wishes to access online content (offered by a website) does not need to register or pay to access the website; instead, he will accept to run microcomputations on behalf of the service provider in exchange for access to the content. These microcomputations can, for example, support ongoing computing projects that have clear social benefits (e.g., projects relating to medical research) or can contribute towards commercial computing projects. We analyze the security and privacy of our proposal and we show that it preserves the privacy of users. We argue that this micropayment model is economically and technically viable and that it can be integrated in existing distributed computing frameworks (e.g., the BOINC platform). In this respect, we implement a prototype of a system based on our model and we deploy our prototype on Amazon Mechanical Turk to evaluate its performance and usability given a large number of users. Our results show that our proposed scheme does not affect the browsing experience of users and is likely to be used by a non-trivial proportion of users. Finally, we empirically show that our scheme incurs comparable bandwidth and CPU consumption to the resource usage incurred by online advertisements featured in popular websites.

References

  1. AdBlock 2004. The economics of online news. AdBlock Plus. http://en.wikipedia.org/wiki/Adblock_Plus.Google ScholarGoogle Scholar
  2. Adsense 2010. Google AdSense. http://en.wikipedia.org/wiki/AdSense.Google ScholarGoogle Scholar
  3. Alexia 2012. Alexia top sites. http://www.alexa.com/topsites.Google ScholarGoogle Scholar
  4. Barabasi, A. L., Freeh, V. W., Jeong, H., and Brockman, J. B. 2001. Parasitic computing. In Nature. 412.Google ScholarGoogle Scholar
  5. BOINC 2007. BOINC. http://boinc.berkeley.edu/.Google ScholarGoogle Scholar
  6. Capcal 2008. Capcal -- How testing is done on the cloud, http://www.capcal.com/.Google ScholarGoogle Scholar
  7. Cardline 2007. Micropayments still not profitable online. http://www.highbeam.com/doc/1G1-164436911.html.Google ScholarGoogle Scholar
  8. Clemons, E. 2009. Why advertising is failing on the Internet? http://techcrunch.com/2009/03/22/why-advertising-is-failing-on-the-internet/.Google ScholarGoogle Scholar
  9. ClickRate 2013. Display advertising click-through rates, http://www.smartinsights.com/internet-advertising/internet-advertising-analytics/display-advertising-clickthrough-rates/.Google ScholarGoogle Scholar
  10. Continental Research 2009. Micropayments may be the answer for publishers. http://www.bdrc-continental.com/EasysiteWeb/getresource.axd?AssetID=2373&type=full&servicetype=Inline.Google ScholarGoogle Scholar
  11. Cracker 2008. Browser-based distributed DES cracker. http://descrack.justinsamuel.com/.Google ScholarGoogle Scholar
  12. CrowdProcess 2013. CrowdProcess, http://crowdprocess.com/.Google ScholarGoogle Scholar
  13. Cui, H. and Biersack, E. 2013. Troubleshooting slow webpage downloads. In Proceedings of the IEEE INFOCOM TMA Workshop. 405--410.Google ScholarGoogle Scholar
  14. Distributed.Net 1997. Distributed.Net, http://distributed.net/.Google ScholarGoogle Scholar
  15. ElectricityUsage 2012. How much electricity does my computer use? http://michaelbluejay.com/electricity/computers.html.Google ScholarGoogle Scholar
  16. Forrester 2008. Forrester research. http://forrester.typepad.com/groundswell/2008/12/people-dont-tru.html.Google ScholarGoogle Scholar
  17. GIMPS 1996. The great Internet Mersenne prime search, http://www.mersenne.org/prime.htm.Google ScholarGoogle Scholar
  18. Goel, S., Hofman, J., Langford, J., Pennock, D. M., and Reeves, D. M. 2009. Centmail: Rate limiting via certified micro-donations. In Proceedings of CEAS.Google ScholarGoogle Scholar
  19. Goldstein, D. G., McAfee, R. P., and Suri, S. 2013. The cost of annoying ads. In Proceedings of the 22nd International Conference on World Wide Web, (WWW’13). 459--470. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Golle, P. and Mironov, I. 2001. Uncheatable distributed computations. In Proceedings of RSA. 425--440. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Golle, P. and Stubblebine, S. 2001. Secure distributed computing in a commercial environment. In Proceedings of the International Conference on Financial Cryptography. 289--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Goodrich, M. T. 2008. Pipelined algorithms to detect cheating in long-term grid computations. In Theoretical Computer Science. Lecture Notes in Computer Science, Springer, vol. 408, Springer, 199--207. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Greasemonkey 2012. Greasemonkey Firefox add-on. http://www.greasespot.net/.Google ScholarGoogle Scholar
  24. Guardian 2013. Why US newspaper publishers favour paywalls. http://www.guardian.co.uk/media/greenslade/2013/jan/01/paywalls-us-press-publishing.Google ScholarGoogle Scholar
  25. Guha, S., Cheng, B., and Francis, P. 2011. Privad: Practical privacy in online advertising. In Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Hinds, D. 2004. Micropayments - A technology with a promising but uncertain future. Commun. ACM. 47, 5. 44.Google ScholarGoogle Scholar
  27. Horton, J. and Seberry, J. 1998. Covert distributed computing using Java through web spoofing. In Proceedings of ACISP. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kamkar, S. 2010. Evercookie -- Never forget. http://samy.pl/evercookie/.Google ScholarGoogle Scholar
  29. Karame, G., Androulaki, E., and Capkun, S. 2012. Double-spending fast payments in Bitcoin. In Proceedings of ACM CCS. 906--917. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Karame, G. and Capkun, S. 2010. Low-cost client puzzles based on modular exponentiation. In Proceedings of the European Symposium on Research in Computer Security (ESORICS). 679--697. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Karame, G., Capkun, S., and Maurer, U. 2011. Privacy-preserving outsourcing of brute-force key searches. In Proceedings of ACM CCSW. 101--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Karame, G., Strasser, M., and Capkun, S. 2009. Secure remote execution of sequential computations. In Proceedings of ICICS. 181--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Lukose, R. M. and Lillibridge, M. 2006. Databank: An economics based privacy preserving system for distributed relevant advertising and content. Tech. Rep., HP Laboratories.Google ScholarGoogle Scholar
  34. MTurk 2005. Amazon Mechanical Turk. https://www.mturk.com/mturk/welcome/.Google ScholarGoogle Scholar
  35. Murdoch 2009. Murdoch: Web sites to charge for content. http://edition.cnn.com/2009/BUSINESS/05/07/murdoch.web.content/index.html.Google ScholarGoogle Scholar
  36. Nakamoto, S. 2009. Bitcoin: A peer-to-peer electronic cash system. http://nakamotoinstitute.org/bitcoin.html.Google ScholarGoogle Scholar
  37. OnlineNews 2010. The economics of online news. http://www.pewinternet.org/Reports/2010/5--The-economics-of-online-news.aspx.Google ScholarGoogle Scholar
  38. OnlineViewership 2007. Online newspaper viewership reaches record in 2007. http://www.naa.org/PressCenter/SearchPressReleases/2008/Online-Newspaper-Viewership.aspx.Google ScholarGoogle Scholar
  39. Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N. 2007. The ghost in the browser: Analysis of web-based malware. In Proceedings of HotBots. 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. SAT 2014. Wonderings of a SAT geek. http://www.msoos.org/2013/09/minisat-in-your-browser/.Google ScholarGoogle Scholar
  41. SETI 1999. SETI at home. http://setiathome.ssl.berkeley.edu/.Google ScholarGoogle Scholar
  42. Simpson, C. Ad zapping with squid. http://adzapper.sourceforge.net/.Google ScholarGoogle Scholar
  43. Squid 1996. Squid Proxy. http://www.squid-cache.org/.Google ScholarGoogle Scholar
  44. Stats 2013. 10 horrifying stats about display advertising, http://blog.hubspot.com/horrifying-display-advertising-stats.Google ScholarGoogle Scholar
  45. Szajda, D., Lawson, B., and Owen, J. 2003. Hardening functions for large scale distributed computations. In Proceedings of the IEEE Symposium on Security and Privacy. 216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. TOP10 2011. How many GFLOPS does your processor have? http://www.overclock.net/t/947312/how-many-gflops-does-your-processor-have.Google ScholarGoogle Scholar
  47. Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., and Barocas, S. 2010. Adnostic: Privacy preserving targeted advertising. In Proceedings of the Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  48. UnitedDevices 1999. United Devices, Inc, company profile, http://biz.yahoo.com/ic/105/105503.html.Google ScholarGoogle Scholar
  49. USCosts 2009. Electricity costs in the united States. http://www.think-energy.net/electricitycosts.htm.Google ScholarGoogle Scholar
  50. Wasserman, H. and Blum, M. 1997. Software reliability via runtime result-checking. J. ACM. 44, 826--849. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Microcomputations as Micropayments in Web-based Services

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Transactions on Internet Technology
                ACM Transactions on Internet Technology  Volume 13, Issue 3
                May 2014
                97 pages
                ISSN:1533-5399
                EISSN:1557-6051
                DOI:10.1145/2630790
                • Editor:
                • Munindar P. Singh
                Issue’s Table of Contents

                Copyright © 2014 ACM

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 May 2014
                • Revised: 1 January 2014
                • Accepted: 1 January 2014
                • Received: 1 March 2013
                Published in toit Volume 13, Issue 3

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Research
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader
              About Cookies On This Site

              We use cookies to ensure that we give you the best experience on our website.

              Learn more

              Got it!