Welcome!

News Feed Item

Fujitsu Laboratories Develops Technology Capable of Searching Encrypted Data to Maintain Privacy

Searches 16,000 characters per second; applications in genomic research and for other data that requires privacy

Tokyo, Jan 15, 2014 - (JCN Newswire) - Fujitsu Laboratories Ltd. today announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form. Searching data while it is encrypted makes it possible to maintain a high level of privacy with no risk of leaks - particularly important for personal data such as DNA, medical data, biological data, and educational records. Through outsourcing, searches of confidential data can be carried out safely as text data and keyword search terms kept private. Whether or not search hits are obtained also remains undisclosed.

Based on homomorphic encryption(1) which allows computations to be performed on confidential encrypted data without disclosure, Fujitsu has developed a new batch search method that accelerates the processing speed of searching for matches on the encrypted data. The new technology can search 16,000 characters in one second, and does not need an index of searchable keywords to be generated in advance. Instead, it makes discretionary searches of the encrypted text directly for any search key.

Details of this technology are being presented at the Fujitsu North America Technology Forum 2014, opening January 22 in Mountain View, California, and also at the Symposium on Cryptography and Information Security (SCIS2014), opening January 21 in Kagoshima, Japan.

Background

With advances in cloud-based data storage and big-data analysis, information services for individual customers, such as healthcare administration, are appearing, however issues of peoples' private data being disclosed have been increasing. Fujitsu Laboratories has been working on technologies that enable more effective utilization of information while protecting privacy at the same time.

While there are encryption technologies, such as homomorphic encryption, that make it possible to perform calculations on data in an encrypted state, in order for data in the cloud to be useful, statistical calculations alone are not enough. For the data to be truly useful, technology that enables the data to be searchable has been needed.

Technological Issues

There are already a number of methods for searching data in an encrypted state, but these rely on pre-registering searchable keywords, and do not allow for freeform searching. These searches face certain implementation problems as well. As search results are unencrypted, this creates the potential for unwanted disclosure on the search engine. In addition, the search process is time-consuming.

About the Technology

Fujitsu Laboratories has developed a technology that can search encrypted character strings in their encrypted state. This method is based on homomorphic encryption, which makes it possible to perform statistical calculations on encrypted character strings, but takes that approach a step further by performing multiple encrypted calculations in a single process, working in batch mode to determine whether the search key appears in the character string being searched. Because of the nature of homomorphic encryption, searchable keywords do not need to be registered in advance, so the data remains secret throughout the search process, which can cover 16,000 characters per second. Features of this technology are as follows.

1. Searches encrypted character strings directly for matches, eliminating need to pre-register keywords

Fujitsu Laboratories has developed a technology that matches encrypted text using an extension to the private calculation functions in homomorphic encryption. Because the process of finding matches between the search key and the encrypted character string is carried out while the character string is encrypted, there is no need for searchable keywords to be registered in advance. Also, the use of homomorphic encryption means that the entire search process is carried out using encrypted character strings. Even the search results are encrypted, so that they can only be read by someone with the decryption key, further heightening security.

2. Batch-mode calculations accelerate search process

Past search methods could only search for character strings one string at a time. Fujitsu Laboratories has developed a way to search the entire character strings in batch mode, resulting in dramatically faster processing. This method makes it possible to search 16,000 characters of character strings in one second or less.

Results

This technology makes it possible to search encrypted data for any arbitrary search key, while keeping not only the source data itself encrypted but also the search key and even the search results. When applied to searching for a certain base sequence in a DNA strand, for example, this technology allows for a person's DNA information to remain private while finding whether or not it contains a certain sequence. This will also make it possible to achieve new analytical results obtained from medical records or base sequences collected from multiple hospitals, all while encrypted, which has the potential to make new drug development more efficient. Even data that has particularly sensitive privacy implications, such as medical records, can now be searched in full, thanks to this technology. The technology has potential applications outside of biology and medicine, as well, such as, for example, in aggregating results from multiple educational institutions for analysis. It could be used in a variety of situations where the privacy of data needs to be protected, or where data protection has been a problem.

Future Plans

Fujitsu Laboratories is continuing with practical testing of this technology, with a goal of commercial implementation in 2015. It is the company's intention to see this technology widely used as a way to maintain the security of personal information in a world that is increasingly driven by data, and as a tool for creating benefits to society by making data more useful while defending privacy.

Notes

(1) Homomorphic encryption:
A type of encryption that allows mathematical operations, such as addition or multiplication, to be performed on it in its encrypted state. Because the results are also encrypted, a private key is needed to unlock the results. See also "Fujitsu Develops World's First Homomorphic Encryption Technology that Enables Statistical Calculations and Biometric Authentication," press release dated August 28, 2013.

About Fujitsu Limited

Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Approximately 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.4 trillion yen (US$47 billion) for the fiscal year ended March 31, 2013 For more information, please see www.fujitsu.com.



Source: Fujitsu Limited

Contact:
Fujitsu Limited
Public and Investor Relations
www.fujitsu.com/global/news/contacts/
+81-3-3215-5259


Copyright 2014 JCN Newswire. All rights reserved. www.japancorp.net

More Stories By JCN Newswire

Copyright 2008 JCN Newswire. All rights reserved. Republication or redistribution of JCN Newswire content is expressly prohibited without the prior written consent of JCN Newswire. JCN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive ad...
Existing Big Data solutions are mainly focused on the discovery and analysis of data. The solutions are scalable and highly available but tedious when swapping in and swapping out occurs in disarray and thrashing takes place. The resolution for thrashing through machine learning algorithms and support nomenclature is through simple techniques. Organizations that have been collecting large customer data are increasingly seeing the need to use the data for swapping in and out and thrashing occurs ...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
SYS-CON Events announced today that Interoute has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Interoute is the owner operator of Europe's largest network and a global cloud services platform, which encompasses over 70,000 km of lit fiber, 15 data centers, 17 virtual data centers and 33 colocation centers, with connections to 195 additional partner data centers. Our full-service Unifie...
SYS-CON Events announced today that Progress, a global leader in application development, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Enterprises today are rapidly adopting the cloud, while continuing to retain business-critical/sensitive data inside the firewall. This is creating two separate data silos – one inside the firewall and the other outside the firewall. Cloud ISVs oft...
SYS-CON Events announced today that Carbonite will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Carbonite protects your entire IT footprint with the right level of protection for each workload, ensuring lower costs and dependable solutions with DoubleTake and Evault.
SYS-CON Events announced today that WineSOFT will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Based in Seoul and Irvine, WineSOFT is an innovative software house focusing on internet infrastructure solutions. The venture started as a bootstrap start-up in 2010 by focusing on making the internet faster and more powerful. WineSOFT’s knowledge is based on the expertise of TCP/IP, VPN, SSL, peer-to-peer, mob...
When NSA's digital armory was leaked, it was only a matter of time before the code was morphed into a ransom seeking worm. This talk, designed for C-level attendees, demonstrates a Live Hack of a virtual environment to show the ease in which any average user can leverage these tools and infiltrate their network environment. This session will include an overview of the Shadbrokers NSA leak situation.
Cloud-based disaster recovery is critical to any production environment and is a high priority for many enterprise organizations today. Nearly 40% of organizations have had to execute their BCDR plan due to a service disruption in the past two years. Zerto on IBM Cloud offer VMware and Microsoft customers simple, automated recovery of on-premise VMware and Microsoft workloads to IBM Cloud data centers.
SYS-CON Events announced today that Ocean9will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Ocean9 provides cloud services for Backup, Disaster Recovery (DRaaS) and instant Innovation, and redefines enterprise infrastructure with its cloud native subscription offerings for mission critical SAP workloads.
SYS-CON Events announced today that Progress, a global leader in application development, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Enterprises today are rapidly adopting the cloud, while continuing to retain business-critical/sensitive data inside the firewall. This is creating two separate data silos – one inside the firewall and the other outside the firewall. Cloud ISVs ofte...
Most DevOps journeys involve several phases of maturity. Research shows that the inflection point where organizations begin to see maximum value is when they implement tight integration deploying their code to their infrastructure. Success at this level is the last barrier to at-will deployment. Storage, for instance, is more capable than where we read and write data. In his session at @DevOpsSummit at 20th Cloud Expo, Josh Atwell, a Developer Advocate for NetApp, will discuss the role and valu...
SYS-CON Events announced today that Cloud Academy will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud computing technologies. Ge...
As cloud adoption continues to transform business, today's global enterprises are challenged with managing a growing amount of information living outside of the data center. The rapid adoption of IoT and increasingly mobile workforce are exacerbating the problem. Ensuring secure data sharing and efficient backup poses capacity and bandwidth considerations as well as policy and regulatory compliance issues.