New 'Sieve' application to protect your information from hackers

A group of electrical engineers from MIT and Harvard University have collaborated to launch an application which enforces security on smartphone users’ private data. Named as Sieve, it would basically serve as a virtual security guard, whenever any 3rd party application would try to access any private data that is stored in an encrypted form on the cloud. If a user finds it suitable to share the particular data, Sieve would provide a security key that would only decipher certain data. But whenever required, the user can stop the application from accessing data and in that case Sieve will only have to encrypt the data with a new key.

Frank Wang, the first author and a PhD candidate from electrical engineering and computer science department explained that their application would eventually raise awareness among people about hidden data that gets transferred to daily activity trackers or similar applications. On the other hand, it offers flexibility to all the applications which targets information conventionally stored in different places.

MIT-Cryptography

Technically, Sieve depends upon two prospective topics of Cryptography, namely attribute-based encryption and key homomorphism. Following database management systems, it exhibits a column-level approach where data can be accessed in a grouped form. Suppose, an application requires only “Name” and “Address”, Sieve will make sure that data from his “Account Number” column is not passed to that same application. However, the team decided to group some data according to the place, time and type to address the slow response limitation of the previous method.

The second method working behind Sieve helps it to revoke an application's access to secured data. Engin Kirda, a professor of electrical and computer engineering at Northeastern University said that commercialisation of such an application might help people to have a control over their personal information. The complete report is to published in the USENIX Symposium on Networked Systems Design and Implementation, which will held this month

Source: Secure, user-controlled data | MIT News | Massachusetts Institute of Technology

Replies

You are reading an archived discussion.

Related Posts

On 18th March, Google Maps announced their new update to Google Maps. Now, the Android users of the same can use customized icons to mark and save the addresses of...
Hello there, I have qualified Gate (EC) 2016 but with a very low score just on the edge of qualifying marks. What should I do now? I am 2013 passout....
Automobile engineers are concerned about high efficiency engines. However, current thinking is to save the environment by lighter vehicles and alternate energies to run them. This article investigates current thoughts...
Hi, This is Sonali,you guys are doing great job its really helpgul for students.i also have query regarding my career . i am persuing BE(computer engineering) and have 2 yr...
On the occasion of turning 10, it seems that Twitter has decided to bring some changes in the way it works. The first of its change is that on 15th...