IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Fujitsu and Keio University partner on automated internet 'trust layer'

The pair want to create an interface that draws information from different sources, like experts or physical tools like sensors, to verify the authenticity of data posted on the internet

Fujitsu and a Japanese university research institute have published research on the concept of a 'Trustable Internet', which aims to make it easier to verify the authenticity of data on the internet.

Related Resource

CIO Priorities: 2020 vs 2023

Zero Trust, SaaS Security, and its impact on SD-WAN being a priority

Webinar title screenWatch now

The Japan-based tech company teamed up with the Keio Research Institute at Keio University to publish a whitepaper on the Trustable Internet concept. The companies said that the verification of large amounts of information on the Internet remains a difficult task, highlighting the need for a more general-purpose method to prove the authenticity of data.

The pair's proposal would aim to help verify the authenticity of data by adding an interface, which they have dubbed the 'Endorsement Layer', which would theoretically help users confirm the credibility of various data based on additional information related to the generation and processing of data

This includes information on confirmation and evaluation by third parties that have viewed the data, and information on physical spaces related to the data including from sensors, for example.

“This enables users to judge the credibility of data from a variety of perspectives to ultimately prevent the use of unverified data and the spread, unintentional or otherwise, of false and unverified information ('fake news'),” said the companies in the research.

An example that the companies gave in a video was a person seeing a river swollen by heavy rain and consequently posting on social media that a flood is about to occur.

The companies said the message could be misinterpreted that a flood is about to occur, or has occurred, generating anxiety among the general public as well as triggering social and economic confusion.

If the companies’ technology was applied in this case, it could inform the users reading the message about the source of the data and the process by which it was generated, as well as extra information like the actual water level of the river, collected from sensors, or the fact that no evacuation is needed since no message has been issued from the authorities. 

“In this way, a chain of verifiable data is established, reinforcing the certainty of the data,” said the narrator in the video. “The confirmed data is then presented to the viewer in a way that is easy to be understood. Viewers can compare the posted message to the confirmed data and act with common confidence without confusion.” 

The two companies suggested the proposed Endorsement Layer should sit between the existing 'Internet Layer' and the 'Web/App' layer. This configuration can be implemented without impacting the existing internet, they said, and allows users to use the internet and applications as usual.

If necessary, they could also obtain additional information to verify the authenticity of data and information.

An image showing how the different layers interact with the endorsement layer

Fujitsu

The additional information can be used to verify the authenticity of data and can be provided by people and devices at the time of data generation, including information on the name, affiliation, and qualifications of the creator of the data, such as the person or company, or the device used, place, and date and time.

Extra information also includes verifications and evaluation from third parties such as independent experts and information obtained from physical spaces including sensor measurements that can be added after the data is generated.

Users would be able to search and check additional information necessary to verify the authenticity of data on the internet in the Endorsement Layer, where information would be stored as graph data.

Through this, the companies hope users would be able to evaluate data authenticity from a different perspective, to make data-driven decisions more accurate, and help to prevent the spread of unverified data.

“By providing a mechanism that enables users to verify and judge the reliability of data available on the internet from various perspectives, we contribute to the health of society and economic activities,” the companies stated. “This is what we are aiming for a trustable internet that people can use information securely.”

Featured Resources

2022 State of the multi-cloud report

What are the biggest multi-cloud motivations for decision-makers, and what are the leading challenges

Free Download

The Total Economic Impact™ of IBM robotic process automation

Cost savings and business benefits enabled by robotic process automation

Free Download

Multi-cloud data integration for data leaders

A holistic data-fabric approach to multi-cloud integration

Free Download

MLOps and trustworthy AI for data leaders

A data fabric approach to MLOps and trustworthy AI

Free Download

Recommended

Why Japan finds it so hard to digitally transform
digital transformation

Why Japan finds it so hard to digitally transform

1 Dec 2022
MSG giant Ajinomoto's chipmaking foray helps break financial records
Business strategy

MSG giant Ajinomoto's chipmaking foray helps break financial records

30 Nov 2022
India to trial digital rupee from December 2022
digital currency

India to trial digital rupee from December 2022

30 Nov 2022
Japan considers creating new cyber defence agency as attacks ramp up in region
cyber attacks

Japan considers creating new cyber defence agency as attacks ramp up in region

24 Nov 2022

Most Popular

Empowering employees to truly work anywhere
Sponsored

Empowering employees to truly work anywhere

22 Nov 2022
Salesforce co-CEO Bret Taylor resigns with cryptic parting message
Business operations

Salesforce co-CEO Bret Taylor resigns with cryptic parting message

1 Dec 2022
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022