sb-nz logo
Story image

Fujitsu incorporates blockchain to secure data exchange networks

12 Jun 2017

Blockchain is the major centerpiece in Fujitsu's new initiative to improve and secure data exchange networks, facilitating faster and safer data sharing tools.

The Fujitsu Virtual Private Digital Exchange Technology can apply blockchain that controls access to distributed data. It can register data attribute information and ID information based on where the data is stored and also manage the access control policy to limit users who can access the data.

Blockchain is already widely use to distribute virtual currencies, but now it is being applied further afield. Fujitsu says that technologies such as IoT, big data and artificial intelligence are generating large volumes of diverse data, however this data comes with security concerns.

The company developed software for data exchange networks that allows organizations to share data, while keeping it in their internal systems.

The Fujitsu Virtual Private Digital Exchange Technology can:

Record registrations of data attribute information and ID information based on where the data is stored

Data providers can record attribute information (for example, type and element of data) and ID information linked with data storage on the blockchain's distributed ledger, while the data remains where it is stored.

That is, users can easily search for data according to the attribute information recorded in the distributed ledger. They can also obtain ID information for the data. Data providers do not need to allow users to download the data directly from where it is stored. Instead, they encrypt the data and send it to users who initially provide their ID information. This enables secure data sharing.

Manage access policies for each dataset

When registering information on the blockchain, data providers can manage the access policy for each data set. This enables the providers to selectively disclose information to those who are granted access to the distributed ledger.

Produce automated processes from data request to transmission

This software features smart contracts which enables efficient data exchange. Smart contracts will automatically execute a series of processes after the data has been requested, from access authorization to transmission of data.

This new software is based on the Hyperledger Fabric, a consortium-type blockchain, and was created by developing proprietary smart contracts executed on the blockchain.

Fujitsu states that it wants to expand and commercialise the software as part of the Fujitsu Network Virtuora series during fiscal 2017.

Story image
Check Point exposes Android malware vendor using dark net to rebrand products
Check Point security researchers have exposed an Android malware vendor using a marketer on the dark net to rebrand its products, with the intention of supercharging business and throwing off security vendors. More
Story image
Top security threats for 2021
2021 will see several themes develop into full blown security threats, many of them borne from the struggles of pandemic-stricken 2020, writes Wontok head of technology Mick Esber.More
Story image
Ensign and Cybereason expand security offerings with partnership
Partnership enables mutual customers throughout APAC to access managed detection and response capabilities.More
Story image
Entrust acquires HyTrust, with aim to improve data encryption solutions
Entrust says the acquisition will bolster its effort to deliver data protection and compliance solutions to its customers, while accelerating their digital transformations.More
Story image
The current state of ransomware — and its future
Discoveries made by analysts at Sophos have unearthed a new development: ransomware code appears to have been shared across ‘families’, and some of the ransomware groups seemed to work in collaboration more than in competition with one another. More
Story image
SMEs treading water against 'endless volley' of cyber-attacks — report
According to a new report from Cynet, these SMEs are resorting to outsourcing some aspects of their threat mitigation in order to safeguard IT assets, as a result of the heightened risk of serious breaches.More