Rob Geeks

Simple Method to Secure User Data

Nowadays, there are a wide range of applications are being developed for the smart phone devices. The main intention of these apps is to make the user’s day to day task easier. So, most of them install apps into their devices and use it. These range of applications which collect user’s personal information and save in the servers which are connected through the internet. The web application for the laptops or desktop computers also connects to the web services and stores the information on the server.

There are some more devices that can be connected to the internet such as fitness monitors or thermostats which also saves vital data online. Whenever, user uses any apps into their smart phones or systems they do not have an idea which information’s the applications is storing and where they get stored and is their any security provided for the stored data. The Harvard University and the Researchers at MIT look forward to change, with the help of an app known as Sieve. It will teach us how to secure user data effectively.

How it works is, with Sieve the users on the web would save all their personal information’s in the form of encrypted. If any application that look for using specific files first should have to send a request to the users and receives a secret code or key that will decrypt only those particular data items. Then, at certain point if user wants to withdraw the app’s access, it will once again encrypt the files by replacing with a new key.

Selective disclosure:

Based on the Sieve requirements, the researchers need to build two practical versions of cutting edge cryptographic techniques known as key homomorphism and attribute based encryption. In attribute based encryption, the different labels are assigned for the data items. Once after encrypting, secret keys are generated which unlock particular combinations of attributes such as name and only zip code of the address but, not the street name. The disadvantage of the attribute based encryption is decryption of data items is very slow.

Blind manipulation:

The second technique of cryptographic- key homomorphism allows Sieve application to cancel the access of the apps for user’s personal information. The cloud server can re-encrypt users files which its saves first without decrypting or it might not send for the user further to decrypt or re-uploading or re-encrypt data items.

« »