Fujitsu Labs makes tech for batch searches of encrypted data
Method can batch-search 16,000 characters per second, and could be used for DNA research.
IDG News Service - If snooping by the U.S. National Security Agency isn't enough to make you worry about your privacy, Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted.
The technology makes use of homomorphic encryption, which allows for operations to be performed on encrypted data without having to decrypt it.
Fujitsu developed a batch search method that can rifle through 16,000 characters per second using any search term without the need for pre-registering keywords.
The lab hopes to commercialize the technology by 2015, billing it as a useful analytical tool in an increasingly data-driven world. The researchers said it's one that will in fact protect privacy.
"Our technology is based on public-key encryption," said Jun Kogure, research manager at the Social Innovation Laboratories in the Secure Computing Lab of Fujitsu Laboratories.
"When acquiring a public key, one also obtains a secret key paired to that public key. Those who perform searches only need a public key, which is made public beforehand and is something anyone can obtain. As results of searches are also encrypted, only those who have the secret key can see the search results."
If thieves or spies tried to use the method, it would be fruitless.
"They may be able to make searches, but it will not mean anything without the secret key," Kogure said.
Forgoing registration of searchable keywords distinguishes Fujitsu's new approach from other ways of looking through encrypted data.
"Many of the existing methods use tag-based searches, which pre-register keyword tags and in the search phase privately check if the specified keyword matches one of the registered tags," said Kogure.
"Our technology is not based on tag-searching. We use homomorphic encryption to perform full-text searches."
The batch search is performed using encrypted character strings, and the search results themselves are encrypted. That means only users with the decryption key can read them.
Possible applications include searching for a particular base sequence in a strand of DNA. The method would preserve the privacy of the DNA information while yielding a useful result, and could be used in multiple DNA searches.
Searching through encrypted academic scores from a number of schools for analytical purposes could be another application, the lab suggested.
The latest know-how is based on the lab's development in 2013 of a method that allows for high-speed statistical calculations and biometric authentication to be performed on encrypted data.
That method involves batch-encrypting data and opens the door to applications such as matching fingerprint or vein patterns to a secure database without having to decrypt it. The processing speed of this method is about 2,000 times faster than bit-by-bit encryption, according to the lab, which presented the research at security conferences in Germany and the U.K. in September 2013.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts