KDDI Research, Inc. Print

A New Distributed File System for Management of Confidential Information

September 10, 2008

KDDI R&D Laboratories, Inc. has invented a new distributed file system for management of confidential information, which protects secret files from both data leakage and destruction by using a new secret sharing scheme we developed, Ultrahigh-Speed Secret Sharing Scheme.

From the backgrounds of effectuation of Private Information Protection Low, rising accidents of information leakage and so on, the technology ‘Secret Sharing Scheme’ (1) receive a lot of attention, recently. In the conventional method of this technology, heavy computational cost is required to process the secret information. However, in the new method which we developed and used in this distribution system, the ultrahigh-speed processing and the same level security as the conventional method are realized.

By using the developed system, user can realize the high-level security such that any information about the confidential information is not leaked even if one of the distributed servers and storages is cracked by a black hacker. Moreover, the system is also fault tolerant. Even if some of servers are destroyed by disaster, the confidential information can be recovered from survived servers. The developed system works on PCs with Microsoft Windows(2) and can be used by easy operations similar to Windows Explore. Also, because of introducing Ultrahigh-Speed Secret Sharing Scheme, the operation in this system is as fast as regular operations to copy files via networks and stress-free operability is achieved.

We will consider promoting the new security solution services using this distributed system. We are also planning to promote licensing the library of Ultrahigh-Speed Secret Sharing Scheme, the core module of this development. We will talk about this Ultrahigh-Speed Secret Sharing Scheme at Information Security Conference 2008 (ICS’08, September 15th~18th, 2008, in Taipei, Taiwan), which is one of the top-level International Conferences about information security.


※The information contained in the articles is current at the time of publication.Products, service fees, service content and specifications, contact information, and other details are subject to change without notice.