SYS-CON MEDIA Authors: Pat Romanski, Elizabeth White, Liz McMillan, Plutora Blog, Trevor Parsons

News Feed Item

Fujitsu Laboratories Develops Technology Capable of Searching Encrypted Data to Maintain Privacy

Searches 16,000 characters per second; applications in genomic research and for other data that requires privacy

Tokyo, Jan 15, 2014 - (JCN Newswire) - Fujitsu Laboratories Ltd. today announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form. Searching data while it is encrypted makes it possible to maintain a high level of privacy with no risk of leaks - particularly important for personal data such as DNA, medical data, biological data, and educational records. Through outsourcing, searches of confidential data can be carried out safely as text data and keyword search terms kept private. Whether or not search hits are obtained also remains undisclosed.

Based on homomorphic encryption(1) which allows computations to be performed on confidential encrypted data without disclosure, Fujitsu has developed a new batch search method that accelerates the processing speed of searching for matches on the encrypted data. The new technology can search 16,000 characters in one second, and does not need an index of searchable keywords to be generated in advance. Instead, it makes discretionary searches of the encrypted text directly for any search key.

Details of this technology are being presented at the Fujitsu North America Technology Forum 2014, opening January 22 in Mountain View, California, and also at the Symposium on Cryptography and Information Security (SCIS2014), opening January 21 in Kagoshima, Japan.

Background

With advances in cloud-based data storage and big-data analysis, information services for individual customers, such as healthcare administration, are appearing, however issues of peoples' private data being disclosed have been increasing. Fujitsu Laboratories has been working on technologies that enable more effective utilization of information while protecting privacy at the same time.

While there are encryption technologies, such as homomorphic encryption, that make it possible to perform calculations on data in an encrypted state, in order for data in the cloud to be useful, statistical calculations alone are not enough. For the data to be truly useful, technology that enables the data to be searchable has been needed.

Technological Issues

There are already a number of methods for searching data in an encrypted state, but these rely on pre-registering searchable keywords, and do not allow for freeform searching. These searches face certain implementation problems as well. As search results are unencrypted, this creates the potential for unwanted disclosure on the search engine. In addition, the search process is time-consuming.

About the Technology

Fujitsu Laboratories has developed a technology that can search encrypted character strings in their encrypted state. This method is based on homomorphic encryption, which makes it possible to perform statistical calculations on encrypted character strings, but takes that approach a step further by performing multiple encrypted calculations in a single process, working in batch mode to determine whether the search key appears in the character string being searched. Because of the nature of homomorphic encryption, searchable keywords do not need to be registered in advance, so the data remains secret throughout the search process, which can cover 16,000 characters per second. Features of this technology are as follows.

1. Searches encrypted character strings directly for matches, eliminating need to pre-register keywords

Fujitsu Laboratories has developed a technology that matches encrypted text using an extension to the private calculation functions in homomorphic encryption. Because the process of finding matches between the search key and the encrypted character string is carried out while the character string is encrypted, there is no need for searchable keywords to be registered in advance. Also, the use of homomorphic encryption means that the entire search process is carried out using encrypted character strings. Even the search results are encrypted, so that they can only be read by someone with the decryption key, further heightening security.

2. Batch-mode calculations accelerate search process

Past search methods could only search for character strings one string at a time. Fujitsu Laboratories has developed a way to search the entire character strings in batch mode, resulting in dramatically faster processing. This method makes it possible to search 16,000 characters of character strings in one second or less.

Results

This technology makes it possible to search encrypted data for any arbitrary search key, while keeping not only the source data itself encrypted but also the search key and even the search results. When applied to searching for a certain base sequence in a DNA strand, for example, this technology allows for a person's DNA information to remain private while finding whether or not it contains a certain sequence. This will also make it possible to achieve new analytical results obtained from medical records or base sequences collected from multiple hospitals, all while encrypted, which has the potential to make new drug development more efficient. Even data that has particularly sensitive privacy implications, such as medical records, can now be searched in full, thanks to this technology. The technology has potential applications outside of biology and medicine, as well, such as, for example, in aggregating results from multiple educational institutions for analysis. It could be used in a variety of situations where the privacy of data needs to be protected, or where data protection has been a problem.

Future Plans

Fujitsu Laboratories is continuing with practical testing of this technology, with a goal of commercial implementation in 2015. It is the company's intention to see this technology widely used as a way to maintain the security of personal information in a world that is increasingly driven by data, and as a tool for creating benefits to society by making data more useful while defending privacy.

Notes

(1) Homomorphic encryption:
A type of encryption that allows mathematical operations, such as addition or multiplication, to be performed on it in its encrypted state. Because the results are also encrypted, a private key is needed to unlock the results. See also "Fujitsu Develops World's First Homomorphic Encryption Technology that Enables Statistical Calculations and Biometric Authentication," press release dated August 28, 2013.

About Fujitsu Limited

Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Approximately 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.4 trillion yen (US$47 billion) for the fiscal year ended March 31, 2013 For more information, please see www.fujitsu.com.



Source: Fujitsu Limited

Contact:
Fujitsu Limited
Public and Investor Relations
www.fujitsu.com/global/news/contacts/
+81-3-3215-5259


Copyright 2014 JCN Newswire. All rights reserved. www.japancorp.net

More Stories By JCN Newswire

Copyright 2008 JCN Newswire. All rights reserved. Republication or redistribution of JCN Newswire content is expressly prohibited without the prior written consent of JCN Newswire. JCN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
You use an agile process; your goal is to make your organization more agile. But what about your data infrastructure? The truth is, today's databases are anything but agile - they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver new features and capabilities needed to make your organization competitive. As your application an...
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, ...
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects - scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e....
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, addressed the big issues involving these technologies and, more important, the results they will achieve. Rodney Rogers, chairman and CEO of Virtustream; Brendan O'Brien, co-founder of Aria Systems, Bart Copeland, president and CEO of ActiveState Software; Jim Cowie, chief scientist at Dyn; Dave Wagstaff, VP ...
"Application monitoring and intelligence can smooth the path in a DevOps environment. In a DevOps environment you see constant change. If you are trying to monitor things in a constantly changing environment, you're going to spend a lot of your job fixing your monitoring," explained Todd Rader, Solutions Architect at AppDynamics, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Desktop as a Service is emerging as a very big trend. One of the big influencers of this – for Esri – is that we have a large user base that uses virtualization and they are looking at Desktop as a Service right now," explained John Meza, Product Engineer at Esri, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
More and more file-based and machine generated data is being created every day causing exponential data and content growth, and creating a management nightmare for IT managers. What data centers really need to cope with this growth is a purpose-built tiered archive appliance that enables users to establish a single storage target for all of their applications - an appliance that will intelligently place and move data to and between storage tiers based on user-defined policies. In her session a...
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of E...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!