Abstract: The present invention relates to the development by ensuring secure and context-aware access to sensitive data has become a crucial concern in the age of pervasive cloud computing. A Predicate-Based Access Control (PBAC) technique is presented in this study with the goal of improving identity management in cloud storage systems. In contrast to conventional approaches, PBAC dynamically assesses access regulations according to resource sensitivity, environmental context, and user traits. It incorporates logical predicates into the decision-making process, enabling fine-grained access control that adjusts to changes in the device, time, and place. The risk of illegal access is greatly decreased by the suggested approach, which guarantees that only authorized and authenticated individuals can access data under certain circumstances. The system is also flexible and scalable, which makes it appropriate for multi-tenant cloud systems. Results from experiments show how effective and reliable the PBAC architecture is in enforcing security rules without sacrificing functionality. For cloud storage platforms, this method marks a substantial breakthrough in intelligent and safe identity management. FIG.1
Description:Description of the Related Art
[0002] The Cloud storage solutions, which offer scalable, on-demand access to enormous volumes of digital data, have completely changed data accessibility and storage. However, worries about data security, identity management, and access control have significantly increased as businesses and individuals move more sensitive and important data to the cloud. Even though they are frequently employed, traditional access control systems like Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) frequently fail to dynamically adjust to complicated, context-sensitive scenarios that arise in cloud environments. To get over these restrictions, Predicate-Based Access Control (PBAC) has become a sophisticated and adaptable access control architecture. Logical predicates, which are assertions that explain conditions involving user traits, resource qualities, and environmental or contextual variables, are evaluated in PBAC to determine access decisions. By adding real-time context, including device location, time of access, network circumstances, and user behavior patterns, this method allows for fine-grained access control that surpasses static roles and simple attribute checks.
[0003] Strong identity management systems that guarantee that only authorized users may access sensitive data under particular circumstances are necessary due to the growing complexity of cloud storage systems. By connecting permission and authentication procedures to contextual predicates, PBAC facilitates context-aware identity management. A user might only be allowed access to a cloud-based document, for instance, if they are utilizing a company device from a reliable network during business hours. The dynamic evaluation of such conditions improves security and lowers the possibility of unwanted entry.
[0004] PBAC techniques have been further strengthened by recent developments in cloud-native technologies, machine learning, and context-aware computing. These advancements make it easier to automate the enforcement of complex access controls and enable ongoing contextual information monitoring without compromising system performance. Furthermore, PBAC is in line with zero-trust architecture principles, which constantly confirm identities and permissions and presume no inherent trust in any user or system component.
[0005] PBAC's incorporation into cloud storage systems also tackles issues with data sovereignty, multi-tenancy, and regulatory compliance. While keeping centralized control, it enables businesses to customize access regulations to meet certain operational and regulatory requirements. Additionally, because each access choice may be linked to particular circumstances and attributes, the use of predicate logic improves transparency and auditability. PBAC is a major advancement in access control paradigms that is especially well-suited to the distributed and dynamic nature of contemporary cloud systems. It is a crucial tool for enterprises looking to protect their cloud-hosted assets from changing cyberthreats because of its capacity to facilitate secure, flexible, and context-aware identity management.
SUMMARY
[0001] In view of the foregoing, an embodiment herein provides a method for a predicate-based access control mechanism for secure and context-aware identity management in cloud storage systems. In some embodiments, wherein a sophisticated method of protecting sensitive data in dispersed and dynamic contexts is the Predicate-Based Access Control (PBAC) technique for safe and context-aware identity management in cloud storage systems. By adding logical predicates to establish fine-grained, adaptable, and context-aware access policies, this technique expands on conventional access control models such as Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). Taking into account real-time environmental factors such user identification, location, time of access, device type, data sensitivity, and user behaviours patterns, PBAC enables the setting of requirements that must be met in order for access to be allowed.
[0002] In some embodiments, whereas an adaptive access control must be implemented in cloud storage systems where several users and services interact with dispersed resources. In order to meet this demand, PBAC makes dynamic policy evaluation possible, which facilitates contextual decision-making and safe identity verification. For instance, a person using a registered device and a secure network may only access private files during business hours. Boolean and logical predicates are used to define this conditional logic, which is then assessed in real time to ascertain eligibility for access. By integrating with cloud identity management services, the suggested method provides policy enforcement, authorization, and authentication inside a single framework. For smooth enforcement, it makes use of policy engines that decipher predicate logic and coordinate with the supporting infrastructure. By recording the contextual information connected to every access attempt, PBAC also improves auditability and accountability while supporting forensic analysis and regulatory compliance.
[0003] In some embodiments, wherein the greater flexibility, fine-grained access control, enhanced defence against insider threats, and improved compliance with data protection laws like the GDPR are some of this mechanism's main benefits. Additionally, even in situations when user credentials are compromised, the context-awareness function greatly lowers the risk of illegal access. For managing identities and implementing dynamic access controls in cloud environments, a Predicate-Based Access Control method provides a strong, clever, and safe architecture. It represents a major breakthrough in cloud security architecture by integrating contextual awareness with logical predicate evaluation, guaranteeing data protection, compliance, and reliability across a range of cloud service types.
[0004] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.
BRIEF DESCRIPTION OF THE DRAWINGS
[0001] The embodiments herein will be better understood from the following detailed description with reference to the drawings, in which:
[0002] FIG. 1 illustrates a method for a predicate-based access control mechanism for secure and context-aware identity management in cloud storage systems according to an embodiment herein.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
[0001] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
[0002] FIG. 1 illustrates a method for a predicate-based access control mechanism for secure and context-aware identity management in cloud storage systems according to an embodiment herein. In some embodiments, the strong, dynamic, and fine-grained access control in highly distributed and heterogeneous contexts is the cornerstone of a Predicate-Based Access Control (PBAC) technique for safe and context-aware identity management in cloud storage systems. This approach was created to get around the drawbacks of conventional Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) systems, particularly with regard to managing context-awareness, scalability, and dynamic access scenarios in cloud environments. System initialization, identity provisioning, predicate formulation, context evaluation, access request handling, policy enforcement, audit and logging, and dynamic policy adaptation are the key steps that make up the PBAC mechanism's entire operation, which is broken down into the following detailed explanation. The initialization step, during which the cloud storage system configures its security architecture, is where the PBAC mechanism starts. This entails setting up trustworthy communication protocols between the access control engine, identity providers, and storage resources; configuring security modules; and defining system entities. Data integrity and identity verification are frequently supported by the integration of a secure Public Key Infrastructure (PKI). The fundamental ontology of access predicates logical expressions that reflect circumstances in which access may be granted is also defined by system administrators. These predicates are determined by resource sensitivity levels, user characteristics, and environmental factors. The PBAC engine has a starting set of access control policies loaded.
[0003] In some embodiments, during this stage, a reliable Identity Management (IdM) service provides users and entities with distinct digital identities. These identities are associated with both dynamic and static like role, department, and security clearance features. Using trusted sensors and context-aware modules built into the cloud architecture, the PBAC system makes sure these attributes are updated and authenticated on a regular basis. As part of identity provisioning, users are also given cryptographic credentials, which are subsequently used to validate and authenticate access requests. To provide smooth access across several cloud platforms and services without sacrificing security, federated identity models are frequently used.
[0004] In some embodiments, in the PBAC system, predicates are the fundamental building blocks that specify access logic. In this stage, logical predicates that assess a mix of subject, object, and contextual qualities are used to establish access control policies. Policy administrators specify these predicates using a declarative policy language that the PBAC engine supports. Complex access scenarios can be supported by composing, reusing, or nesting policies. Predicates can also incorporate more complex logic, like temporal and spatial limitations and reliance on real-time events.
[0005] In some embodiments, the system assesses each request's context before granting access. This entails gathering contextual data in real time from a variety of sources, such as network logs, user devices, IoT sensors, and behavioural monitoring tools. The time of the request, the user's location, the device's reliability, the state of the network, and the user's past behaviour are examples of contextual factors. This data is standardized and validated by a context management engine, which guarantees that it is up-to-date, trustworthy, and impenetrable. The predicates for access decision-making are then instantiated using this contextual information. An access request is started whenever a user tries to access a cloud-stored resource. The user's identification, the necessary resource information, and the most recent contextual data are all included in this request. After retrieving the related predicates, the PBAC engine compares them to the request parameters. Access is allowed if the predicate evaluates to TRUE; if not, it is refused. Before allowing access, the system could occasionally demand multi-factor authentication or extra contextual verification such biometric or secondary device confirmation. A rule engine optimizes the assessment process by giving priority to frequently used policies and caching confirmed predicates for better efficiency in high-volume settings.
[0006] The Policy Enforcement Point (PEP) implements the decision made by the Policy Decision Point (PDP) following a successful predicate evaluation. The PEP provides temporary, scoped credentials that enable the user to interact with the designated resource under specified restrictions if access is permitted. Priority rules are used when more than one predicates fit a particular request, and the PBAC mechanism supports both positive and negative policies. To guarantee that users only access the acceptable amount of the material, enforcement also involves data masking, redaction, and logging. All access attempts are recorded in a secure audit trail, regardless of their success or failure. The user, resource, predicates assessed, context upon access, and the ultimate decision are all covered in detail in these logs. Forensic investigation, compliance verification, and system debugging all depend on this thorough logging.
[0007] Audit logs are routinely examined by anomaly detection algorithms to spot possible violations or questionable activity. Administrators can receive real-time alerts about unsuccessful authentication attempts or policy infractions. PBAC's capacity for dynamic policy adaptation is one of its main advantages. Administrators can modify predicate definitions without completely rewriting access policies in response to changes in user roles, organizational structures, or danger landscapes. Additionally, machine learning techniques can be used to identify unsafe behavior, recommend optimized predicates, and learn from access patterns. In order to improve the system's resilience against changing cybersecurity threats, the PBAC engine can interact with external risk assessment tools to modify access decisions based on real-time threat intelligence.
[0008] The PBAC method needs to work well with a variety of cloud storage platforms, including Google Cloud Storage, Microsoft Azure Blob Storage, and AWS S3, in order to be effective. Standardized APIs and connectors that transmit access decisions from the PBAC engine to cloud-native authorization frameworks are commonly used to accomplish this integration. Proxy services are used to convert the PBAC system's security tokens into platform-specific access credentials. Regardless of the underlying cloud provider, this makes it possible to consistently implement context-aware regulations. The PBAC system needs to be extremely scalable because cloud environments are dynamic and expansive. Even in situations of high load, the system maintains its responsiveness thanks to parallelized rule evaluation engines, distributed policy decision points, and edge-based context processors. To lower access latency, probabilistic data structures, effective predicate indexing, and caching techniques are used. High availability and fault tolerance are further guaranteed by the incorporation of load balancing and failover techniques.
[0009] The PBAC mechanism is intended to be as unobtrusive as possible from the standpoint of the user. After completing a single authentication, users are given the proper level of access based on their context and identity. User dashboards that show access records, policy explanations, and instructions on why specific access was refused help to preserve transparency. Users can challenge improper rejections or seek access reviews through feedback loops, and these requests are forwarded to administrative dashboards for policy adjustment and evaluation. PBAC procedures are in line with frameworks for regulatory compliance. Access decisions are guaranteed to be traceable and justified by the use of auditable, fine-grained access predicates. This facilitates compliance reporting and supports governance policies. To satisfy auditing requirements, access attestation, policy versioning, and role separation are supported. By directly integrating regional restrictions into predicate logic, the PBAC engine also makes it easier to comply with data residency regulations. A strong, adaptable, and safe framework for controlling identity and access in cloud storage systems is provided by the Predicate-Based Access Control mechanism. It guarantees that access decisions are accurate and flexible enough to adjust to changing circumstances by utilizing dynamic predicates, context-aware evaluation, and fine-grained enforcement. , Claims:I/We Claim:
1. A method for a predicate-based access control mechanism for secure and context-aware identity management in cloud storage systems, wherein the method comprising:
enabling dynamic access decisions through real-time evaluation of context-sensitive predicates that take resource attributes, user roles, and environmental factors into account;
replacing strict access control lists or role hierarchies with a flexible access control policy architecture that allows for fine-grained authorization based on logical predicate evaluation;
enabling dynamic access authorization or denial in cloud storage systems by tying user traits to contextual information, hence facilitating secure identity management;
evaluating access requests using an attribute-driven evaluation engine in relation to runtime environmental variables like time, location, or device type, as well as pre-established policy rules;
improving cloud environments' data security and privacy by blocking unwanted access with predicate-based filtering techniques that are adapted to delicate resource and identity situations;
using cloud storage APIs in conjunction with context-aware access control allows predicate-based rules to be enforced across dispersed architectures without affecting system performance; and
monitoring predicate evaluations, access choices, and user interactions for compliance and forensic analysis, an audit trail and policy enforcement log are provided.
| # | Name | Date |
|---|---|---|
| 1 | 202541057326-STATEMENT OF UNDERTAKING (FORM 3) [15-06-2025(online)].pdf | 2025-06-15 |
| 2 | 202541057326-REQUEST FOR EARLY PUBLICATION(FORM-9) [15-06-2025(online)].pdf | 2025-06-15 |
| 3 | 202541057326-POWER OF AUTHORITY [15-06-2025(online)].pdf | 2025-06-15 |
| 4 | 202541057326-FORM-9 [15-06-2025(online)].pdf | 2025-06-15 |
| 5 | 202541057326-FORM 1 [15-06-2025(online)].pdf | 2025-06-15 |
| 6 | 202541057326-DRAWINGS [15-06-2025(online)].pdf | 2025-06-15 |
| 7 | 202541057326-DECLARATION OF INVENTORSHIP (FORM 5) [15-06-2025(online)].pdf | 2025-06-15 |
| 8 | 202541057326-COMPLETE SPECIFICATION [15-06-2025(online)].pdf | 2025-06-15 |