Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
AUTHENTICATION OF CLOUD STORAGE USING QR CODE
Extensive patent search conducted by a registered patent agent
Patent search done by experts in under 48hrs
₹999
₹399
Abstract
Information
Inventors
Applicants
Specification
Documents
ORDINARY APPLICATION
Published
Filed on 13 November 2024
Abstract
In short, cloud computing is a commercial and economic paradigm that enables customers to virtually access high-end processing and storage with little to no infrastructure required on their pan. The privacy and security of cloud storage services are critical and present issues in the context of cloud computing due to the loss of control over data and its reliance on the cloud computing provider. There is an increased danger of data access by attackers when sending large volume of data in a cloud system. The proposed smart system
Patent Information
Application ID | 202441087452 |
Invention Field | COMPUTER SCIENCE |
Date of Application | 13/11/2024 |
Publication Number | 47/2024 |
Inventors
Name | Address | Country | Nationality |
---|---|---|---|
GOPINATHAN S | ASSISTANT PROFESSOR, DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE, SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMILNADU, INDIA-600044. | India | India |
JEEVA N | DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE, SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMIL NADU, INDIA-600044. | India | India |
MUKESH M | DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE, SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMIL NADU, INDIA-600044. | India | India |
RAJIV KRISHNA K | DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE, SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMILNADU, INDIA-600044. | India | India |
Applicants
Name | Address | Country | Nationality |
---|---|---|---|
SRI SAIRAM INSTITUTE OF TECHNOLOGY | SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMILNADU, INDIA-600044. | India | India |
GOPINATHAN S | ASSISTANT PROFESSOR, DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE, SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMILNADU, INDIA-600044. | India | India |
JEEVA N | DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE, SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMIL NADU, INDIA-600044. | India | India |
MUKESH M | DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE, SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMIL NADU, INDIA-600044. | India | India |
RAJIV KRISHNA K | DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE, SRI SAIRAM INSTITUTE OF TECHNOLOGY, WEST TAMBARAM, CHENNAI, TAMILNADU, INDIA-600044. | India | India |
Specification
I. FIELD OF INVENTION:
The invention relates to cloud computing, particularly focusing on enhancing the 5ccurity.
privncy) and data management in cloud sLOrage systems. \~1 ith the rise of cloud computing as a model
for providing vinualizecl computing nnd storage resources with minimal infrastructure.· on the user's
end. this invention udclresses the critical challenges of securing data in transit and at rest. It is
designed to safeguard data against unauthorized access and auacks. which are common risks when
transferring large volumes of information to cloud environments.
The system introduces distinct modes for inclividmll and organizational use. where data is
encrypted with a hybrid 1\ES and RSA algorithm to provide robust security. For individtwl users.
data is encrypted and stored securely on the cloud, whik organizational users henelit !"rom a
hi~i·archical access control system~ with the final administralOr managing access rights. The systeiTI i ...
li.trther liJrtilied with geofencing technology and QR-code authentication 10 ensure· only nutlwri·tecl
u~~:rs can access the dara. providing an additional~ layer ofseCLirity and privacy
!.BACKGROUND OF THE INVENTION:
Cloud cnmputing ha:; rapidly emerged as a transl'ormative business and e~onomic modeL em1hling
urganiz.ations·and incliviclu::tls lO access high-perfOrmance cnmputing and sturage n.:snun.:cs tHi demand.
with(H:t· the need for significant local infrastructure. This paradigm shili has brought ~lhout numerous
advantages. such as cost efficiency. scalability: and accessibility. Hcl\.vever= with the adopts(lll or loud
computing~.· especially in industrial and business contexts: comes a substantial loss of direct control over
data= leading .to concerns about data privacy and scc_urity. ·
In cloud environments, data is often stored remotely, and the cloud provider becomes the pr11narv
custodian of· that data. This introduces potential vu!net:abilities. as data in t·ransit and at.rcst· may be
subject to interception. unauthorized access. and various· thril1s of cyber attacks. These risks ure
particularly pronounced when large volumes .of sensitive· data arc transferrel across network='.
Traditional encryption techniques, While ol filtering son1t' level of security. are not always strl'ficicrrt tli
address these ·growing th rears. especially in the context· of modern cloud computing systems .
Moreover. current solutions such as· homomorphic encryption, secret sharing. and secure multi-party
computation 1~1Ce significant limiwtions: including high complllational costs. ~...·xccssivt· communication
overhead, and reduced scalability. These methods olien require numerous rounds -or comnH111ication
between parties and generate large amounts or data traffic: making them ineflicient and impractical /{w
widespread use in cloud systems that deal with sensitive data.
This invention is motivated by the need to enhance the security and pnvacy or cloud-based systems
while addressing the limitations or existing technologies. It introduces a smart system that caters to both
individual and organizational users, providing distinct services lor each. The system employs a hybrid
encryption approach, utilizing both AES (Advanced Encryption Standard) and RSA (Ri\'cst-ShwnirAdlemnn)
algorithms, to secure data in cloud storage. In addition, advanced techniques such as
g.~;.·ol(:ncing ~111<1 QR-cock mllhemication are integrated to further strengthen security. ensuring that on/~·
~1uthorized users with the right permissions can access the data. For organizational u~e. the ~ystcm
imrocluces hierarchical access controls. where the linnl clat~l administer<llOr manags pt:nnission.:->.
ensuring that sensitive clara is only accessible by the right individuals.
13y acldrc:Jsin~ the ~~horlcc.nlings of existing security technologies and offering an innovativeolulinn to
protect cloud-stored data. this_ invention provides a robust framework ror secure.: cfpucJ computing. in w·1
increasingly data-driven world.
3. OBJECTIVES:
I.Data Security: To secure cloud-stnred data using a hybrid t\ES & RSA encryption alglll'itlllll.
ensuring hoth high-performance encryption (t\ES) and strong public-key security (I(Si\) during data
transfer and .storage.
2.Access Control: To establish distinct access control mechanisms tailored to different user roll's in
organizational settings. ensuring that each person involved in the data generating and usage process 11~·1s
secure role-based access.
3. organisational and Individual Modes: To provide separate modes for individual and organizational
users. with li:!atures like hierarchical access control fi)r organizations and simplified encryption t<w
individual users.
4.Authen.tication_ i\~echanisms: To enhance security through the integration or geol(:ncing and QR-codt·
alllhelllication. adding an additional layer of protection by restricting access to data based on
geographic location and user-specific codes.
5.Eflic·iency and Scalability: To overcome the limitations of existing security sollutions like
homomorphic encryption and secure multi-party computation. by providing a system that minimizes
communication rounds. reduces trartic load. and is more scalable lor real-world cloud applications.
6.User-Friendly Experience: To otTer a solution that balances strong security measures with ease o!"usc.
ensuring that users can benefit from high-end cloud storage without being burdened lw co.,mpkx
security procedures.
4. SUiVIMAI~Y
Cklud computing offers virtual access to high-end computing and storage with minimal infrastructural.
but it presents challenges in ensuring, privacy and security. \Vith data stored and man::1ged hy cloud
providers, users face risks of' unauthorized access and auacks, especially when transferring large
volumes of' data. The proposed smart system addresses these concerns by ol'lering two distinct modes 1(1/·
individual a·nd orgimizationaJ· use. lridividual users' data is encrypted and securely stored in the cloud.
For organizations, users have distinct access ievels, with a linal administrator controlling overall
penni ssicms.
To cnlnmce Sf;!~urity: 1.he system.uses a hybrid /\ES & RSA .encryption algorithm. Ct,mbining iEI:-\1
('IH.·ryption with secun·: key management. . Additionally: it integrates geokt;cing <.Hld QR-c<~d~
ciuthCilticatit)ll. adding extra !ayt·rs of protection. by restricting access based on location anclus~.:~r.-spc.~:il-ic
cocks. This system addresses limitations in existing security solutions, such as excessive communication
and tnirtic load. nearing a more efficient. Scallable. and sculpture cloud computing solution for modern
users.
5. BRIEF DESCRIPTION OF THE DIAGRAMS:
• Front-End Design (Figures 1-12):
The front-end design of the project. <IS illustrated in Figures 1-12. encomposses a series of web pages that facilitate the interaction between various user roles such as team leaders. employees, and management. The homepage serves as the entry point to the application, offering a clean and intuitive interface for users to log in and navigate. The Ttam Leader Login page allows team leaders to securely access their dashboard, while the Employee View Page provides employees with a tailored interface to
view relevant information.
The Management Login Page ensures that only authorized personnel from the management team can access the admin features, leading to the Management Home Page, where management can oversee overall project activities. From the management dashboard, they can view employee and team leader data, track progress, and manage approvals. The Team Leader Add Page enables team leaders to input new data related to team members or tasks, while the Team Leader View Page allows them to monitor team performance. The Management Accept View page gives management the ability to review and accept or reject tasks or submissions from the team leaders. This modular front-end ensures that the user experience is seamless, with clear navigation and role-based access to features.
• Algorithm Flow (Figure 13)
Figure 13 demonstrates the flow of the algorithm utilized in the project, focusing on a key generation process that is integral to the system's functionality. The algorithm likely plays a critical role in ensuring the security and efficiency of task assignments or data exchanges between users. The flowchart depicts the step-by-step process through which data is processed, tasks are assigned, and security keys are generated. The inclusion of a key generation mechanism suggests that encryption or authentication protocols are in place, ensuring that sensitive information remains secure throughout its lifecycle. This key generation could be part of an authentication system or could support encrypted communications between users. Overall, the algorithm ensures that data How is optimized and securely managed within the system.
• Code Implementation (Figure 14)
Figure I4 provides a snapshot of the actual code implemented lor the project, highlighting key sections that drive the core functionality. This code may include the logic for user authentication, task management, data storage, and interactions with a back-end server or database. It showcases how the front-end design is linked to the back-end processing, enabling the seamless execution of user actions such as logging in. adding tasks, and managing approvals.
5.DETAILED DESCRIPTION OFTIIE INVENTION:
Cloud computing provides organizations and individuals access to powerful computing resources and vast storage capacities with minimal infrastructure investment. This model has revolutionized the way businesses operate by offering virtualized computing services that are both scalable and cost-effective. However, the widespread adoption of cloud computing comes with significant challenges regarding data security, privacy, and control, particularly when sensitive information is stored on third-party cloud servers.
The invention addresses these concerns by introducing a smart cloud computing system designed.for both individual users and organizations, with distinct modes for each. This system focuses on securing data during its lifecycle-storage, access, and transfer--within cloud environments.
Key Components of the Invention:
Hybrid AES & RSA Encryption:
To ensure strong data security, the system employs a hybrid encryption approach. AES (Advanced Encryption Standard) provides efficient and fast encryption, suitable for securing large amounts of data quickly. RSA (Rivest-Shamir-Adleman). a public-key encryption system, ensures secure key management and exchange. The combination of AES and RSA ensures both speed and security, addressing vulnerabilities associated with single encryption methods.
Individual u ml Organizational Mod os:
The system offers two distinct services based on user type:
For Individual Users: User-uploaded data is encrypted using the hybrid A IIS & R$A system and stored securely in the cloud. The locus is on ease of use. while maintaining strong encryption to protect personal data.
For Organizational Users: The system includes hierarchical access control, where every person involved in data creation or handling has distinct access permissions. The final data administrator holds the authority to grant or revoke access to the cloud-stored data, ensuring line-grained control over sensitive information.
C.'cofencing for Enhanced Security:
The system integrates geofencing technology, which allows the system, to enforce location-based access restrictions. Users can only access data from approved geographic locations, adding a physical layer of security to the digital protection offered by encryption.
QR-Code Authentication:
As an additional layer of security, the system uses QR-code authentication. Ilacli user must authenticate their identity by scanning a dynamically generated QR code. This method ensures ihm even if login credentials are compromised, unauthorized access is prevented without the correct authentication step.
Security-aware Scheduling and Data Access:
For organizational users, the. system integrates security-aware scheduling, ensuring that sensitive data processing tasks are prioritized based on predefined security policies. 'I'his approach mitigates the risks associated with.scheduling sensitive applications in a cloud environment where data could be vulnerable during high-traffic periods. •
Addressing Limitations of Fxisting Security Technologies:
Existing solutions like homomorphic encryption, secret sharing, and secure multi-party computing often struggle, with scalability, excessive communication rounds, and high traffic load. The invention overcomes these limitations by streamlining encryption and authentication processes. The hybrid
encryption system reduces the overhead, making it suitable for both small-scale individual users and large organizations.
Scalability and Efficiency:
This system is designed to scale efficiently, allowing it to handle varying amounts of data while maintaining robust security. By minimizing the communication overhead and traffic load compared to traditional security solutions, the sysiem ensures that both real-time and large-scale data transfers can be performed securely.
How the System Operates:
For Individual Users:
Once the user uploads their data to the cloud, the system automatically encrypts it using the hybrid AES & RSA algorithm. The data is then stored securely on the cloud, and can only be accessed by the user with proper authentication. Geofencing and QR-code verification further ensure that the data is accessed from secure locations and by authorized users only.
For OrganizaIional Users:
Data ;s encrypted upon upload and stored in the cloud. Each individual with access to the system has a unique role and corresponding access rights, assigned by the administrator. The administrator oversees data access permissions and can revoke or grant rights as needed. Geolcncing prevents unauthorized access from unapproved locations, and QR-code authentication ensures that even users within the allowed geographic area are properly authenticated.
CLAIMS
WE CLAIM:
1. A cloud-based data management system:
A system that enhances data security and privacy by utilizing a hybrid AES & RSA encryption algorithm to encrypt user-uploaded data, ensuring secure storage and transfer of sensitive information within the cloud environment.
2. A method for providing distinct data management modes:
This method offers two modes:
• Individual users' mode: Data is automatically encrypted upon upload to the cloud and stored . securely. Access is restricted to the user through authentication.
• Organizational mode: Hierarchical access control is implemented, where each person involved in data generation is assigned distinct access rights. The final data administrator manages permissions for accessing cloud-stored data.
3. A cloud data access control system:
This system integrates geofencing technology to limit access to cloud-stored data based on approved geographic locations, ensuring only users within a specified physical area can access the data.
4. A cloud data authentication system:
This system incorporates QR-code authentication, where users must scan a dynamically generated OR code lo verify their identity before accessing clond-stored data, adding an extra layer of security against u nau th orized access.
5. A method of encrypting and accessing cloud-stored data:
This method reduces the communication .rounds and traffic load typically associated with traditional secure multi-party computing and homomorphic encryption technologies, offering a more efficient and scalable approach to data security.
6. A security-aware cloud data scheduling system:
Designed for organizational use. this system prioritizes sensitive data processes based on predefined security policies, ensuring critical operations are handled securely without compromising performance or efficiency.
7. A system for managing organizational data access:
In this system, the final data administrator holds the authority to grant, revoke, or modify access rights for other users involved in the data generation process, maintaining strict control over sensitive timid-based information. f
8. A.cloud data protection system:
This system combines both, physical and digital security measures by integrating geofencing. QR-code authentication, and hybrid encryption (AES & RSA't to ensure that data access is restricted to authorized users and secured against unauthorized access or cyber attacks.
y. A method for securely transferring large volumes of data:
This method uses.a hybrid AES & RSA encryption algorithm for data encryption and optimizes efficiency by minimizing compuiational overhead and traffic load during the encryption and transfer processes.
10..A cloud data security solution:
This solution balances ease,.of use with strong encryption standards, allowing both individual users and organizations to securely manage and access their cloud-stored data without complex security procedures, ensuring seamless integration with existing cloud infrastructure.
Documents
Name | Date |
---|---|
202441087452-Form 1-131124.pdf | 18/11/2024 |
202441087452-Form 2(Title Page)-131124.pdf | 18/11/2024 |
202441087452-Form 3-131124.pdf | 18/11/2024 |
202441087452-Form 5-131124.pdf | 18/11/2024 |
202441087452-Form 9-131124.pdf | 18/11/2024 |
Talk To Experts
Calculators
Downloads
By continuing past this page, you agree to our Terms of Service,, Cookie Policy, Privacy Policy and Refund Policy © - Uber9 Business Process Services Private Limited. All rights reserved.
Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.
Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.