Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
DROPSTORE: A SECURE BACKUP USING MULTI COLUD AND FOG COMPUTING
Extensive patent search conducted by a registered patent agent
Patent search done by experts in under 48hrs
₹999
₹399
Abstract
Information
Inventors
Applicants
Specification
Documents
ORDINARY APPLICATION
Published
Filed on 14 November 2024
Abstract
Data backup is essential for disaster recovery. Current cloud-based solutions offer a secure infrastructure. However, there is no guarantee of data privacy while hosting the data on a single cloud. Another solution is using Multi-Cloud technologies. Although using multiple clouds to save smaller pieces of the data can enhance data privacy, it comes at the cost of the need for the edge device to manage different accounts and manage the communication with different clouds. These drawbacks made this technology rare to use technology. In this paper, we propose Drop Store to provide an easy-to-use, highly secure, and reliable backup system using state-of-the-art Multi-Cloud and encryption techniques. Drop Store adds an abstraction layer for the end-user to hide all system complexities using a locally hosted device, ‘‘the Droplet’’, that is fully managed by the user. Hence, the user does not rely on any untrusted third party. This was achieved using Fog Computing technology. The uniqueness of Drop Store comes from the convergence of Multi-Cloud and Fog Computing principles. The system implementation is open-source and available online. Performance results show that the proposed system improves data protection in terms of reliability, security, and privacy preservation while maintaining a simple and easy interface with edge devices
Patent Information
Application ID | 202441088101 |
Invention Field | COMPUTER SCIENCE |
Date of Application | 14/11/2024 |
Publication Number | 47/2024 |
Inventors
Name | Address | Country | Nationality |
---|---|---|---|
R. Jaazieliah | Assistant Professor, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
C. Karthikeyan | Assistant Professor, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
Bhavani B | Final Year Student, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
Magudeeshwaran B | Final Year Student, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
Applicants
Name | Address | Country | Nationality |
---|---|---|---|
Karpagam Institute of Technology | S.F.NO.247,248, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
Karpagam Academy of Higher Education | Pollachi Main Road, Eachanari Post, Coimbatore | India | India |
R. Jaazieliah | Assistant Professor, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
C. Karthikeyan | Assistant Professor, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
Bhavani B | Final Year Student, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
Magudeeshwaran B | Final Year Student, Department of Computer Science and Engineering, Karpagam Institute of Technology, Bodipalayam Post, Seerapalayam Village, Coimbatore | India | India |
Specification
Description:Technical field
Cloud computing architecture involves the design and implementation of systems and frameworks that leverage cloud computing technologies for data storage, processing, and management. In particular, the discussion highlights the concept of Multi-Cloud Architecture, which refers to the utilization of multiple cloud computing and storage facilities from various providers, including public clouds, private clouds, and standalone on-premise facilities.Multi-Cloud Architecture introduces a heterogeneous approach to cloud computing, where users have the flexibility to distribute their data and workloads across different cloud platforms. By leveraging multiple cloud providers, users can distribute their data and resources strategically, ensuring redundancy and disaster immunity.
Background
Introduction to Data Backup Needs
In an era where data generation is exponential, the need for secure and reliable backup solutions has become paramount. Individuals and organizations alike face the risks of data loss due to hardware failures, cyberattacks, and natural disasters, highlighting the importance of effective data backup strategies.
Traditional Backup Solutions
Traditional backup solutions often involve local storage systems or single-cloud services. While these methods provide some level of data protection, they can be vulnerable to data loss events, such as hardware malfunctions or service outages, creating a single point of failure.
The Emergence of Multi-Cloud Strategies
To address the shortcomings of single-cloud solutions, organizations are increasingly adopting multi-cloud strategies. By distributing data across multiple cloud providers, users can enhance redundancy and availability, ensuring that data remains accessible even if one service experiences downtime.
Understanding Fog Computing
Fog computing extends cloud computing capabilities to the edge of the network, allowing data processing and storage closer to the source of data generation. This decentralized approach reduces latency and bandwidth usage, making it particularly useful for applications that require real-time processing and backup.
Benefits of Multi-Cloud and Fog Computing;Combining multi-cloud strategies with fog computing provides several benefits. It enhances data resilience by leveraging diverse storage environments while also improving performance and reducing the risk of data loss due to localized outages or failures.
Security Challenges in Data Backup
Despite the advantages of multi-cloud and fog computing, security remains a critical concern. Data breaches, unauthorized access, and compliance with regulations such as GDPR can pose significant challenges for organizations looking to protect their sensitive information.
Encryption as a Solution
Implementing robust encryption methods is essential for securing data during transmission and storage. Encryption ensures that even if data is intercepted or accessed by unauthorized parties, it remains unreadable without the appropriate decryption keys.
Authentication and Access Control
Strong authentication mechanisms and access control policies are crucial for safeguarding data in a multi-cloud environment. Implementing multi-factor authentication (MFA) and role-based access controls helps ensure that only authorized users can access sensitive data.
Data Redundancy and Availability
A secure backup system must prioritize data redundancy and availability. By distributing data across multiple clouds and utilizing fog nodes for local storage, Dropstore ensures that users can quickly recover their data in case of failures or breaches.
Compliance and Regulatory Considerations
Organizations must navigate various compliance requirements when storing and processing sensitive data. A secure backup solution like Dropstore helps meet these regulatory standards by implementing best practices for data security and privacy.
Real-Time Backup Capabilities
Dropstore aims to provide real-time backup capabilities, allowing users to back up their data continuously as changes occur. This minimizes the risk of data loss and ensures that the most current versions of files are always available.
Scalability and Flexibility
The architecture of Dropstore is designed to be scalable and flexible, accommodating the varying needs of users. Organizations can adjust their storage requirements based on changing data volumes and backup needs, optimizing costs and resource utilization.
Integration with Existing Systems
Dropstore is designed to integrate seamlessly with existing IT infrastructure and applications. This compatibility allows organizations to implement the backup solution without disrupting their current operations or workflows.
Conclusion:In conclusion, Dropstore leverages the strengths of multi-cloud and fog computing to provide a secure, efficient, and reliable backup solution. By addressing the challenges of traditional backup methods and enhancing data security, Dropstore represents a significant advancement in safeguarding sensitive information in a rapidly evolving digital landscape.
Summary of the Invention
Drop Store provides a unique data backup system architecture. This uniqueness is derived from the combination of Fog Networking and Multi-Cloud advantages. Whereas Multi Cloud methods are used to provide the most reliable and secure storage environment, Fog Computing is used to provide better throughput and lower latency for the backup process. The enabler of this unique architecture is the Droplet fog device. Droplet is a personal Fog node. It is owned and controlled by the end- user, similar to the rest of his personal devices like smartphones and laptops. Droplet can be considered a Private Fog device. This is, somehow, similar to the Private Cloud concept, where the organizations deploy and manage their own cloud infrastructure. Being a personal device, the Droplet enables many applications to utilize the Fog Computing paradigm. Drop Store benefits from this advantage to provide a better backup experience and a unique system that outperforms the existing systems
The solution is based on Multi-Cloud and Fog Computing paradigms. Data security and user privacy are maintained by encryption and data partitioning on Multi- Cloud Storage. The solution abstracts the individual users from the system complications and improves the backup experience by utilizing Fog Computing advantages. We have built the system and ran many experiments on real-world scenarios. We have implemented two versions of Drop Store. The first implementation is based on a low-cost single- board computer (Droplet node). The second implementation is based on a more powerful personal laptop. We have shown the Drop Store can store and retrieve the data reliably using the two implementations. Drop Store enables securing the user data with minimal complexity at the edge side. In the future, better scheduling strategies for data uploading to the cloud will be explored. The new scheduling strategies need to consider the QoS parameters and the remaining storage at each CSP. To improve the system's error detection and correction capabilities, linear block codes for data replication will be developed instead of entire data block repetition.
The Drop Store system represents a groundbreaking approach that merges the benefits of Multi Cloud and Fog Computing paradigms. It facilitates rapid data backup processes and enhances user experience while eliminating reliance on untrusted third parties for security management.
Figure 1 illustrate the Drop Store system
admin and user registration
This component of the system enables administrators to register and manage their accounts efficiently. Admins gain access to a comprehensive interface to oversee various aspects of the backup system, such as user management and data operations.Users can register and manage their accounts through this module, allowing them to interact with the Drop Store system effectively. User registration facilitates seamless access to backup services and ensures personalized data management.
data collection
The system employs randomized datasets comprising diverse data types, including images, text files, and videos, to represent natural user data accurately. These datasets are periodically backed up to cloud servers during uncongested times, ensuring reliable data storage and protection.
cryptography algorithm and block generation
Drop Store employs robust cryptography algorithms to safeguard user data during storage and transmission. These algorithms ensure data security and confidentiality, mitigating the risk of unauthorized access or data breaches.The system generates data blocks efficiently to optimize storage and retrieval processes. By employing innovative block generation techniques, Drop Store enhances data management capabilities and ensures rapid access to stored information.
defence verification
Drop Store implements defense verification mechanisms to validate the integrity and authenticity of stored data. These verification processes enhance data reliability and protect against potential threats or malicious activities.
key generation and blockchain system
Secure key generation mechanisms are employed to encrypt and decrypt user data effectively. By generating unique cryptographic keys, Drop Store ensures robust data protection and confidentiality, bolstering overall system security.The backbone of the Drop Store system is its blockchain-based architecture, which ensures transparent and immutable data storage. By leveraging blockchain technology, the system enhances data integrity, reliability, and accessibility while minimizing the risk of data manipulation or tampering.
, Claims:1. This component enables administrators to efficiently register and manage their accounts, gaining access to comprehensive interfaces for overseeing various system aspects. Users can register and manage their accounts through this module, ensuring seamless access to backup services and personalized data management options.
2. Robust cryptography algorithms are employed to safeguard user data during storage and transmission, ensuring security and confidentiality.The system efficiently generates data blocks to optimize storage and retrieval processes, enhancing data management capabilities and access speed.
3. Defence verification mechanisms validate the integrity and authenticity of stored data, enhancing data reliability and protecting against potential threats or malicious activities. Secure key generation mechanisms encrypt and decrypt user data effectively, ensuring robust data protection and confidentiality.The system's blockchain-based architecture provides transparent and immutable data storage, enhancing data integrity, reliability, and accessibility while minimizing the risk of data manipulation or tampering.
Documents
Name | Date |
---|---|
202441088101-COMPLETE SPECIFICATION [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-DECLARATION OF INVENTORSHIP (FORM 5) [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-DRAWINGS [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-EDUCATIONAL INSTITUTION(S) [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-EVIDENCE FOR REGISTRATION UNDER SSI [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-FIGURE OF ABSTRACT [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-FORM 1 [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-FORM FOR SMALL ENTITY(FORM-28) [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-FORM-9 [14-11-2024(online)].pdf | 14/11/2024 |
202441088101-REQUEST FOR EARLY PUBLICATION(FORM-9) [14-11-2024(online)].pdf | 14/11/2024 |
Talk To Experts
Calculators
Downloads
By continuing past this page, you agree to our Terms of Service,, Cookie Policy, Privacy Policy and Refund Policy © - Uber9 Business Process Services Private Limited. All rights reserved.
Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.
Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.