ABSTRACT
Currently, several online businesses deem that advertising revenues alone are not sufficient to generate profits and are therefore set to charge for online content. In this paper, we explore a complement to the current advertisement model; more specifically, we propose a micropayment model for non-specialized commodity web-services based on microcomputations. In our model, a user that wishes to access online content offered by a website does not need to register or pay to access the website; instead, he will accept to run microcomputations on behalf of the website in exchange for access to the content. These microcomputations can, for example, support ongoing computing projects that have clear social benefits (e.g., projects relating to HIV, dengue, cancer, etc.) or can contribute towards commercial computing projects. We argue that this micropayment model is economically and technically viable and that it can be integrated in existing distributed computing frameworks (e.g., the BOINC platform). We implement a preliminary prototype of a system based on our model through which we evaluate its performance and usability. Finally, we analyze the security and privacy of our proposal and we show that it ensures payment for the content while preserving the privacy of users.
- Murdoch: Web sites to Charge for Content, http://edition.cnn.com/2009/BUSINESS/05/07/murdoch.web.content/index.html.Google Scholar
- Forrester Research, http://forrester.typepad.com/groundswell/2008/12/people-dont-tru.html.Google Scholar
- The Economics of Online News, http://www.pewinternet.org/Reports/2010/5--The-economics-of-online-news.aspx.Google Scholar
- SETI@home, http://setiathome.ssl.berkeley.edu/.Google Scholar
- Distributed.Net, http://distributed.net/.Google Scholar
- The Great Internet Mersenne Prime Search, http://www.mersenne.org/prime.htm.Google Scholar
- Online Newspaper Viewership Reaches Record in 2007, http://www.naa.org/PressCenter/SearchPressReleases/2008/Online-Newspaper-Viewership.aspx.Google Scholar
- Capcal - How Testing is done on the Cloud, http://www.capcal.com/.Google Scholar
- Amazon Elastic Compute Cloud (Amazon EC2), http://aws.amazon.com/ec2/#pricing.Google Scholar
- How much electricity does my computer use?, http://michaelbluejay.com/electricity/computers.html.Google Scholar
- Electricity Costs in the United States, http://www.think-energy.net/electricitycosts.htm.Google Scholar
- United Devices, Inc, Company Profile, http://biz.yahoo.com/ic/105/105503.html.Google Scholar
- BOINC. http://boinc.berkeley.edu/.Google Scholar
- Browser-Based Distributed DES Cracker. http://descrack.justinsamuel.com/.Google Scholar
- Google AdSense. http://en.wikipedia.org/wiki/AdSense.Google Scholar
- Google Web Toolkit. http://code.google.com/webtoolkit.Google Scholar
- Hashcash. http://www.hashcash.org/.Google Scholar
- MaxxPI, TOP10, FLOPS. http://www.maxxpi.net/pages/result-browser/top10---flops.php.Google Scholar
- A. L. Barabasi, V. W. Freeh, H. Jeong, and J. B. Brockman. Parasitic Computing. In Nature, volume 412, pages 894--897, 2001.Google Scholar
- E. Clemons. Why Advertising is failing on the Internet?, 2009. http://techcrunch.com/2009/03/22/why-advertising-is-failing-on-the-internet/.Google Scholar
- P. Eckersley. How Unique Is Your Web Browser? In Proceedings of PETS, 2010. Google ScholarDigital Library
- R. Gennaro, C. Gentry, and B. Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In Proceedings of the CRYPTO Conference, 2010. Google ScholarDigital Library
- S. Goel, J. Hofman, J. Langford, D. M. Pennock, and D. M. Reeves. Centmail: Rate Limiting via Certified Micro-Donations. In Proceedings of CEAS, 2009.Google Scholar
- P. Golle and I. Mironov. Uncheatable Distributed Computations. In Proceedings of RSA, 2001. Google ScholarDigital Library
- M. T. Goodrich. Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations. In Theoretical Computer Science, LNCS, Springer, 2008. Google ScholarDigital Library
- J. Horton and J. Seberry. Covert Distributed Computing Using Java Through Web Spoofing.Google Scholar
- S. Kamkar. Evercookie - Never Forget. http://samy.pl/evercookie/.Google Scholar
- G. Karame and S. Capkun. Low-Cost Client Puzzles based on Modular Exponentiation. In Proceedings of ESORICS, 2010. Google ScholarDigital Library
- G. Karame, S. Capkun, and U. Maurer. Privacy-Preserving Outsourcing of Crytographic Searches. In ETH Zurich, D-INFK, Technical Report No. 662, 2010.Google Scholar
- G. Karame, M. Strasser, and S. Capkun. Secure Remote Execution of Sequential Computations. In Proceedings of ICICS, 2009. Google ScholarDigital Library
- R. M. Lukose and M. Lillibridge. Databank: An Economics Based Pirvacy Preserving System for Distributed Relevant Advertising and Content. In Technical Report, HP Laboratories, 2006.Google Scholar
- S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. 2009.Google Scholar
- N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The Ghost in the Browser: Analysis of Web-based Malware. In Proceedings of HotBots, 2007. Google ScholarDigital Library
- D. Szajda, B. Lawson, and J. Owen. Hardening Functions for Large Scale Distributed Computations. In Proceedings of the IEEE Symposium on Security and Privacy, 2003. Google ScholarDigital Library
- Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, and Solon Barocas. Adnostic: Privacy Preserving Targeted Advertising. In Network and Distributed System Security Symposium (NDSS), 2010.Google Scholar
Index Terms
- Pay as you browse: microcomputations as micropayments in web-based services
Recommendations
Microcomputations as Micropayments in Web-based Services
In this article, we propose a new micropayment model for nonspecialized commodity web-services based on microcomputations. In our model, a user that wishes to access online content (offered by a website) does not need to register or pay to access the ...
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to resist double-spending through a distributed timestamping service. To ensure the operation and security of Bitcoin, it is essential that all transactions and their order of ...
A feature-pair-based associative classification approach to look-alike modeling for conversion-oriented user-targeting in tail campaigns
WWW '11: Proceedings of the 20th international conference companion on World wide webOnline advertising offers significantly finer granularity, which has been leveraged in state-of-the-art targeting methods, like Behavioral Targeting (BT). Such methods have been further complemented by recent work in Look-alike Modeling (LAM) which ...
Comments