Fujitsu Labs makes tech for batch searches of encrypted data
Method can batch-search 16,000 characters per second, and could be used for DNA research.
IDG News Service - If snooping by the U.S. National Security Agency isn't enough to make you worry about your privacy, Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted.
The technology makes use of homomorphic encryption, which allows for operations to be performed on encrypted data without having to decrypt it.
Fujitsu developed a batch search method that can rifle through 16,000 characters per second using any search term without the need for pre-registering keywords.
The lab hopes to commercialize the technology by 2015, billing it as a useful analytical tool in an increasingly data-driven world. The researchers said it's one that will in fact protect privacy.
"Our technology is based on public-key encryption," said Jun Kogure, research manager at the Social Innovation Laboratories in the Secure Computing Lab of Fujitsu Laboratories.
"When acquiring a public key, one also obtains a secret key paired to that public key. Those who perform searches only need a public key, which is made public beforehand and is something anyone can obtain. As results of searches are also encrypted, only those who have the secret key can see the search results."
If thieves or spies tried to use the method, it would be fruitless.
"They may be able to make searches, but it will not mean anything without the secret key," Kogure said.
Forgoing registration of searchable keywords distinguishes Fujitsu's new approach from other ways of looking through encrypted data.
"Many of the existing methods use tag-based searches, which pre-register keyword tags and in the search phase privately check if the specified keyword matches one of the registered tags," said Kogure.
"Our technology is not based on tag-searching. We use homomorphic encryption to perform full-text searches."
The batch search is performed using encrypted character strings, and the search results themselves are encrypted. That means only users with the decryption key can read them.
Possible applications include searching for a particular base sequence in a strand of DNA. The method would preserve the privacy of the DNA information while yielding a useful result, and could be used in multiple DNA searches.
Searching through encrypted academic scores from a number of schools for analytical purposes could be another application, the lab suggested.
The latest know-how is based on the lab's development in 2013 of a method that allows for high-speed statistical calculations and biometric authentication to be performed on encrypted data.
That method involves batch-encrypting data and opens the door to applications such as matching fingerprint or vein patterns to a secure database without having to decrypt it. The processing speed of this method is about 2,000 times faster than bit-by-bit encryption, according to the lab, which presented the research at security conferences in Germany and the U.K. in September 2013.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts