Monday, March 02, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Blu-ray Players Could Install Malware
MWC: ARCHOS Announces First 256 GB Android Tablet
New PowerVR G6020 And PowerVR Series5 Video Encoders Targets IoT And Mobile Devices
Qualcomm Previews The Next-Generation of Snapdragon Processor At MWC 2015
ZTE Showcases Latest Smart Devices at Mobile World Congress 2015
MWC: Sony Introduces The New Xperia Z4 and Xperia M4 Aqua Tablets
New Nikon Coolpix P900 Camera HAs An 83x Optical Zoom
Nikon Releases The D7200
Active Discussions
Need serious help!!!!
burning
nvidia 6200 review
Hello
Burning Multimedia in track 0
I'm lazy. Please help.
sanyo e6 camera
need help on some cd burning...
 Home > News > General Computing > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Saturday, June 14, 2014
Researchers Propose New Web technology That Would Transform The Web Into A Secure Database


Researchers in the Decentralized Information Group (DIG) at MIT are developing a protocol they call "HTTP with Accountability," or HTTPA, which will automatically monitor the transmission of private data and allow the data owner to examine how it's being used.

With HTTPA, each item of private data would be assigned its own uniform resource identifier (URI), a key component of the Semantic Web, a new set of technologies, championed by W3C, that would convert the Web from, essentially, a collection of searchable text files into a giant database.

Remote access to a Web server would be controlled much the way it is now, through passwords and encryption. But every time the server transmitted a piece of sensitive data, it would also send a description of the restrictions on the data's use. And it would log the transaction, using only the URI, somewhere in a network of encrypted, special-purpose servers.

When the data owner requests an audit, a network of servers work through the chain of derivations, identifying all the people who have accessed the data, and what they've done with it.

An HTTPA-compliant program also incurs certain responsibilities if it reuses data supplied by another HTTPA-compliant source. Suppose, for instance, that a consulting specialist in a network of physicians wishes to access data created by a patient's primary-care physician, and suppose that she wishes to augment the data with her own notes. Her system would then create its own record, with its own URI. But using standard Semantic Web techniques, it would mark that record as "derived" from the PCP's record and label it with the same usage restrictions.

Oshani Seneviratne, an MIT graduate student in electrical engineering and computer science, and Lalana Kagal, a principal research scientist at CSAIL, will present a paper at the IEEE's Conference on Privacy, Security and Trust in July giving an overview of HTTPA with sample application such as an experimental health-care records system.

Seneviratne uses a technology known as distributed hash tables - the technology at the heart of peer-to-peer networks like BitTorrent - to distribute the transaction logs among the servers. Redundant storage of the same data on multiple servers serves two purposes: First, it ensures that if some servers go down, data will remain accessible. And second, it provides a way to determine whether anyone has tried to tamper with the transaction logs for a particular data item - such as to delete the record of an illicit use. A server whose logs differ from those of its peers would be easy to ferret out.

"It's not that difficult to transform an existing website into an HTTPA-aware website," Seneviratne says. "On every HTTP request, the server should say, 'OK, here are the usage restrictions for this resource,' and log the transaction in the network of special-purpose servers."

Audit servers could be maintained by a grassroots network, much like the servers that host BitTorrent files or log Bitcoin transactions.




Previous
Next
FCC To Examine Slow Internet Speeds        All News        Researchers Show Potential Of NRAM At VLSI 2014
FCC To Examine Slow Internet Speeds     General Computing News      Researchers Show Potential Of NRAM At VLSI 2014

Get RSS feed Easy Print E-Mail this Message

Related News
Toshiba Introduces New APs For For IoT Solutions
ARM Buys IoT Security Company Offspark
MediaTek Launches Development Platform For Wi-Fi Enabled IoT Devices
Intel Buys IoT Chip Maker Lantiq
Toshiba Reorganization to Strengthen IoT-Related Business
Toshiba Develops Cloud System for Instantaneous Remote Control of One Million Devices
Samsung CEO Calls For IoT Openness, New Galaxy E5 and E7 Smartphones Announced
CES 2015 Focuses On The Internet Of Things
Google Seeks For Research Proposals For "Web of Things"
Cisco Wants To Analyze Everything
Intel Unifies and Simplifies Connectivity for IoT
Internet Access Considered Human Right: survey

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .