Story image

Fujitsu incorporates blockchain to secure data exchange networks

12 Jun 17

Blockchain is the major centerpiece in Fujitsu's new initiative to improve and secure data exchange networks, facilitating faster and safer data sharing tools.

The Fujitsu Virtual Private Digital Exchange Technology can apply blockchain that controls access to distributed data. It can register data attribute information and ID information based on where the data is stored and also manage the access control policy to limit users who can access the data.

Blockchain is already widely use to distribute virtual currencies, but now it is being applied further afield. Fujitsu says that technologies such as IoT, big data and artificial intelligence are generating large volumes of diverse data, however this data comes with security concerns.

The company developed software for data exchange networks that allows organizations to share data, while keeping it in their internal systems.

The Fujitsu Virtual Private Digital Exchange Technology can:

Record registrations of data attribute information and ID information based on where the data is stored

Data providers can record attribute information (for example, type and element of data) and ID information linked with data storage on the blockchain's distributed ledger, while the data remains where it is stored.

That is, users can easily search for data according to the attribute information recorded in the distributed ledger. They can also obtain ID information for the data. Data providers do not need to allow users to download the data directly from where it is stored. Instead, they encrypt the data and send it to users who initially provide their ID information. This enables secure data sharing.

Manage access policies for each dataset

When registering information on the blockchain, data providers can manage the access policy for each data set. This enables the providers to selectively disclose information to those who are granted access to the distributed ledger.

Produce automated processes from data request to transmission

This software features smart contracts which enables efficient data exchange. Smart contracts will automatically execute a series of processes after the data has been requested, from access authorization to transmission of data.

This new software is based on the Hyperledger Fabric, a consortium-type blockchain, and was created by developing proprietary smart contracts executed on the blockchain.

Fujitsu states that it wants to expand and commercialise the software as part of the Fujitsu Network Virtuora series during fiscal 2017.

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.