Skip to main content

New Technology Shows Who Is Using Your Data Online

WASHINGTON: MIT researchers have developed a new technology that tracks how your private data is used online.

Researchers in the Decentralized Information Group (DIG) at Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory (CSAIL) are developing a protocol they call "HTTP with Accountability," or HTTPA, which will automatically monitor the transmission of private data and allow the data owner to examine how it's being used.

At the IEEE's Conference on Privacy, Security and Trust next month in Toronto, Oshani Seneviratne, an MIT graduate student in electrical engineering and computer science, and Lalana Kagal, a principal research scientist at CSAIL, will present a paper that gives an overview of HTTPA. With HTTPA, each item of private data would be assigned its own uniform resource identifier (URI) that would convert the Web from, essentially, a collection of searchable text files into a giant database.

Remote access to a Web server would be controlled much the way it is now, through passwords and encryption. But every time the server transmitted a piece of sensitive data, it would also send a description of the restrictions on the data's use. An HTTPA-compliant programme also incurs certain responsibilities if it reuses data supplied by another HTTPA-compliant source, researchers said.

Suppose, for instance, that a consulting specialist in a network of physicians wishes to access data created by a patient's primary-care physician, and suppose that she wishes to augment the data with her own notes. Her system would then create its own record, with its own URI. But using standard Semantic Web techniques, it would mark that record as "derived" from the PCP's record and label it with the same usage restrictions.

The network of servers is where the heavy lifting happens. When the data owner requests an audit, the servers work through the chain of derivations, identifying all the people who have accessed the data, and what they've done with it. Seneviratne uses a technology known as distributed hash tables - the technology at the heart of peer-to-peer networks like BitTorrent - to distribute the transaction logs among the servers.

To test the system, Seneviratne built a rudimentary health-care records system from scratch and filled it with data supplied by 25 volunteers. She then simulated a set of transactions - pharmacy visits, referrals to specialists, use of anonymised data for research purposes, and the like - that the volunteers reported as having occurred over the course of a year.

Seneviratne used 300 servers on the experimental network PlanetLab to store the transaction logs; in experiments, the system efficiently tracked down data stored across the network and handled the chains of inference necessary to audit the propagation of data across multiple providers.

Comments

Popular post

Business Mobile Phones now from Intel

Beside the look this mobile phone also have some features which can blow your mind … such are qwetry keypad, two usb port, stereo speakers, oled technology, card reader and yes a cherry on top is a TRACK BALL as well. We have seen Squared Shape Mobile Phone or hole mobile phone but this antique piece from intel is amazing. Designer: Jan Rytir Business-Mobile-Phones-intelmid-1 Business-Mobile-Phones-intelmid-2 Business-Mobile-Phones-intelmid-3 Business-Mobile-Phones-intelmid-4 Business-Mobile-Phones-intelmid-5 Business-Mobile-Phones-intelmid-6 Business-Mobile-Phones-intelmid-7 Business-Mobile-Phones-intelmid-8 Business-Mobile-Phones-intelmid-9 Business-Mobile-Phones-intelmid-10 Business-Mobile-Phones-intelmid-11

Browse Facebook Without Mouse - Keyboard Shortcuts

If you think you need a mouse to browse Facebook on your desktop computers, think again. You can browse through your facebook pages without having a mouse using only your keyboard shortcuts. Check out some of these Facebook hidden keyboard shortcuts..The list is not that long but will give you a good basic functionality. ALT + (Shift + 1)(!) - Facebook Home ALT + (Shift + 2)(@) - Your Wall Page ALT + (Shift + 3)(#) - Friend Requests ALT + (Shift + 4)($) - Messages ALT + (Shift + 5)(%)- Notifications ALT + (Shift + 6)(^) - Account Settings ALT + (Shift + 7)(&) - Privacy Settings ALT + (Shift + 8)(*) - Facebook's facebook profile ALT + (Shift + 9)(() - Terms Of Service page ALT + (Shift + 0)()) - Help Center ALT + ? - Search Facebook ALT + Shift + m -- Compose new message

Business Mobile phone with young generation touch

In our last business mobile phone section you have seen great Business Mobile Phones now from Intel , now this time we are also coming with the business mobile phone but with the touch to young generation as well. However this business mobile phone is just now a concept only but as the demand of people and customers are increasing company will also come with this. You know many tools with folding option now such options are also available in mobile phone with three folded screen which can make it in a wide screen to watch movie or with the help of 3G any live sports as well. Designer: Petr Kubik Business-Mobile-Phones-with-folding-screen-1 Business-Mobile-Phones-with-folding-screen-2 Business-Mobile-Phones-with-folding-screen-3 Business-Mobile-Phones-with-folding-screen-4 Business-Mobile-Phones-with-folding-screen-5 Business-Mobile-Phones-with-folding-screen-6 Business-Mobile-Phones-with-folding-screen-7 Business-Mobile-Phones-with-folding-screen-8 Business-Mobile-Phones-wit