image
image
user-login
Patent search/

DESIGN OF PRIVACY PRODUCTION USING ORDER REVEALING ENCRYPTION

search

Patent Search in India

  • tick

    Extensive patent search conducted by a registered patent agent

  • tick

    Patent search done by experts in under 48hrs

₹999

₹399

Talk to expert

DESIGN OF PRIVACY PRODUCTION USING ORDER REVEALING ENCRYPTION

ORDINARY APPLICATION

Published

date

Filed on 14 November 2024

Abstract

The design of a privacy production using order revealing encryption aims to rapid increase of recent privacy attacks has significantly decreased trust on behalf of the users, system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. Due to management negligence and malicious attack, there still lie enormous security incidents that lead to quantities of sensitive data leakage at cloud storage layer. It is a web application that scans a network or a system for the harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management system. To avoid data breach at the storage layer, integrated data dispersion and distributed storage to realize encrypted, distribution of storage via order-revealing encryption (ORE) and Hybrid ORE, which define a security notion called content privacy. Besides, we define a security notion called content privacy. This security notion captures the leakages, Content privacy eliminates the leakage on the updated points of the database during both search and update.so here we are with a web application system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered

Patent Information

Application ID202441087930
Invention FieldCOMPUTER SCIENCE
Date of Application14/11/2024
Publication Number47/2024

Inventors

NameAddressCountryNationality
R. SubbulakshmiAssistant Professor, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia
C. KarthikeyanAssistant Professor, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia
S. ShamFinal Year Student, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia
B. Vishnu PriyaFinal Year Student, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia

Applicants

NameAddressCountryNationality
Karpagam Institute of TechnologyS.F.NO.247,248, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia
Karpagam Academy of Higher EducationPollachi Main Road, Eachanari Post, CoimbatoreIndiaIndia
R. SubbulakshmiAssistant Professor, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia
C. KarthikeyanAssistant Professor, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia
S. ShamFinal Year Student, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia
B. Vishnu PriyaFinal Year Student, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, CoimbatoreIndiaIndia

Specification

Description:Technical field

It is a web application that scans a network or a system for the harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management system. To avoid data breach at the storage layer, integrated data dispersion and distributed storage to realize encrypted, distribution of storage via order-revealing encryption (ORE) and Hybrid ORE, which define a security notion called content privacy. Besides, we define a security notion called content privacy. This security notion captures the leakages, content privacy eliminates the leakage on the updated points of the database during both search and update.so here we are with a web application system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.

Background

Introduction to Privacy Concerns:In the digital age, privacy concerns have escalated due to the increasing amount of personal data being collected, stored, and processed by various organizations. Individuals are often apprehensive about how their information is used, leading to a demand for more secure and private methods of data handling.
The Role of Encryption
Encryption has long been recognized as a vital tool for protecting sensitive information. Traditional encryption methods, however, often limit the ability to perform operations on encrypted data without revealing the underlying plaintext. This limitation poses challenges in scenarios where data needs to be processed while maintaining privacy.
Understanding Order Revealing Encryption (ORE)
Order Revealing Encryption (ORE) is an innovative cryptographic technique that allows comparisons between encrypted values. This means that one can determine the order of encrypted values without decrypting them. ORE enables privacy-preserving data operations, making it highly relevant for various applications, including secure data sharing and privacy-preserving computations.
Applications of ORE
ORE can be particularly beneficial in scenarios like secure multi-party computations, data analytics, and cloud computing. For example, in cloud environments, organizations can perform operations on their data while it remains encrypted, ensuring that sensitive information is never exposed to the cloud provider.
Mechanisms of ORE
The mechanics of ORE involve encrypting data in such a way that the encryption maintains the order of the original values. This can be achieved through specific mathematical functions or algorithms, allowing comparisons to be made directly on the encrypted data.
Security Implications
The security of ORE systems is paramount. Effective ORE schemes ensure that while the order of the data is revealed, the actual values remain confidential. This dual-layer security helps mitigate the risks associated with data breaches and unauthorized access.
Comparison with Traditional Encryption
Unlike traditional encryption methods that only ensure confidentiality, ORE adds a layer of functionality by enabling ordered comparisons. This makes it suitable for scenarios where both privacy and functionality are required, offering a more versatile solution.
Privacy in Data Sharing
In data sharing scenarios, ORE can facilitate secure exchanges where one party needs to determine the rank or order of values without accessing the actual data. This capability is particularly useful in fields like finance, healthcare, and social networking, where sensitive information is frequently exchanged.
Enhancing Machine Learning Models
In machine learning, ORE can be employed to train models on encrypted datasets. This allows organizations to collaborate and leverage data for training without exposing sensitive information, thereby fostering innovation while protecting privacy.
Challenges and Limitations
Despite its advantages, implementing ORE comes with challenges. These include the computational overhead associated with encryption and decryption processes, as well as potential vulnerabilities that must be addressed to ensure robust security.
Standardization and Adoption
The adoption of ORE techniques requires standardization and acceptance within the cryptographic community. As researchers continue to improve ORE algorithms, establishing best practices and guidelines will be essential for widespread implementation.
Future of Privacy-Preserving Technologies
As privacy regulations tighten globally, the demand for privacy-preserving technologies like ORE is expected to grow. Organizations are increasingly seeking solutions that comply with regulations such as GDPR, making ORE an attractive option.
Real-World Implementations
Several organizations and research institutions are exploring real-world implementations of ORE. Case studies illustrate how ORE can be successfully integrated into existing systems, providing valuable insights into its practicality and effectiveness.
Conclusion
In conclusion, Order Revealing Encryption represents a significant advancement in the field of cryptography and privacy protection. By enabling secure data operations while preserving privacy, ORE offers a promising solution for a wide range of applications, paving the way for more secure and private data management practices in the digital era.

Summary of the Invention

In segmentation coding technique that splits the encrypted plaintext into two parts: the range part and the value part. Based on the segmentation coding technique, we construct Hybrid ORE model. Then, in order to further shorten the length of the ciphertext, we construct Encode ORE scheme. We analyze the space usage and the leakage of Hybrid ORE and Encode ORE. Furthermore, we make experiments to compare the performance of Encode ORE.
so here we are with a web application system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. As this application software provides strong encryption scheme which is Encode-ore which is evolved from existing related techniques which is utter failure, but this technique will not leak your confidential data at any cause, even when an unauthorized persons try at most to steal the data.
Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management system. To avoid data breach at the storage layer, integrated data dispersion and distributed storage to realize encrypted, distribution of storage via order-revealing encryption (ORE) and Hybrid ORE, which define a security notion called content privacy. Besides, we define a security notion called content privacy. This security notion captures the leakages; Content privacy eliminates the leakage on the updated points of the database during both search and update. Due to the inherent leakages associated with range queries, none of the existing related works can support content privacy, whereas the design of our constructions avoids such leakages. , Claims:1. Enhanced Privacy with ORE: The application employs Order Revealing Encryption (ORE) to ensure that sensitive data can be stored and managed securely while allowing ordered comparisons, thereby preventing unauthorized access to actual data values during searches and updates.
2. Content Privacy Assurance: By defining and implementing a security notion of content privacy, the system effectively eliminates potential data leakage during database updates and searches, maintaining the confidentiality of sensitive information even when modifications occur.
3. Integrated Data Dispersion: The design incorporates integrated data dispersion and distributed storage techniques, enhancing security at the cloud storage layer. This approach minimizes the risk of data breaches by distributing encrypted data across multiple locations.
4. Centralized Security Management: The system centralizes the collection of alerts and security events through a Security Information and Event Management (SIEM) system, facilitating efficient tracking and response to malicious activities or policy violations across the network.

Documents

NameDate
202441087930-COMPLETE SPECIFICATION [14-11-2024(online)].pdf14/11/2024
202441087930-DECLARATION OF INVENTORSHIP (FORM 5) [14-11-2024(online)].pdf14/11/2024
202441087930-DRAWINGS [14-11-2024(online)].pdf14/11/2024
202441087930-EDUCATIONAL INSTITUTION(S) [14-11-2024(online)].pdf14/11/2024
202441087930-EVIDENCE FOR REGISTRATION UNDER SSI [14-11-2024(online)].pdf14/11/2024
202441087930-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [14-11-2024(online)].pdf14/11/2024
202441087930-FIGURE OF ABSTRACT [14-11-2024(online)].pdf14/11/2024
202441087930-FORM 1 [14-11-2024(online)].pdf14/11/2024
202441087930-FORM FOR SMALL ENTITY(FORM-28) [14-11-2024(online)].pdf14/11/2024
202441087930-FORM-9 [14-11-2024(online)].pdf14/11/2024
202441087930-REQUEST FOR EARLY PUBLICATION(FORM-9) [14-11-2024(online)].pdf14/11/2024

footer-service

By continuing past this page, you agree to our Terms of Service,Cookie PolicyPrivacy Policy  and  Refund Policy  © - Uber9 Business Process Services Private Limited. All rights reserved.

Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.

Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.