- Available Technology
Keywords: Computer Software, Cybersecurity, Encryption, Data
The number of data breaches is steadily growing and is prompting the need for new approaches to encrypting data access. Current methods for encrypting data are rapidly reaching the end of their lifespan due to the capabilities and effectiveness of quantum computing. However, the demand for blockchain security is currently growing. Several companies are in dire need of encryption technologies that effectively address the new generation of cyber security threats. Clemson researchers have created a new method managing data encryption that uses blockchain to enable streamlined data and access storage. This invention allows audit and compliance staff to identify the individuals who had access to which versions of specific data in a privacy preserving manner.
Cyberinfrastructure; cyber encryption
This technology enables the management of data access by leveraging blockchain. The method utilizes key encryption keys (KEK) to efficiently add and remove access to data. The system is self-documenting, which allows data forensics personnel to determine who had access to which version of the data. Using the blockchain to update data access permissions allows this to be done in an anonymous way. It is also resilient to denial of service attacks, since the distributed ledger is more resistant to those attacks.
Dr. Richard Brooks, Tony Skjellum, Lu Yu
Interested in this technology?
Please put technology ID in subject line of email.
Stay up-to-date with the latest trends in the innovation and research industry. Sign up for our newsletter to see how CURF is making a difference and impacting the economy where we live.