Sign In to Follow Application
View All Documents & Correspondence

Implementation And Management Of Information Security For Distributed Data Storage Systems

Embodiments for providing security to Big Data of an organization are described. In one example, security related inputs are received from a user and are converted into security requirement. Thereafter, a security policy template is identified from plurality of pre-defined security policy templates based on security reference architecture and the security requirement. The security policy template represents a plurality of security controls. Thereafter, one or more security controls are selected from the security controls based on the security requirement. Further, one or more existing security controls implemented in Big Data environment are identified. Thereafter, the selected security controls are compared with the existing security controls for determining a security control that is not implemented in the Big Data environment. Subsequently, the security control is implemented in the Big Data environment to provide security to the Big Data of the organization.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 March 2015
Publication Number
38/2016
Publication Type
Invention Field
GENERAL ENGINEERING
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2021-03-16
Renewal Date

Applicants

TATA CONSULTANCY SERVICES LIMITED
Nirmal Building, 9th Floor, Nariman Point, Mumbai, Maharashtra 400021, India

Inventors

1. MARDIKAR, Nandkishor Janardan
10th Floor, TCS-Kensington 'B' wing, Powai, Mumbai, India
2. DESHPANDE, Sameer
7th Floor, TCS - Neptune, Thane Maharashtra, India
3. SULIKERI, Shivaranjani C
8th Floor, TCS-Kensington 'B' wing, Powai, Mumbai, India
4. GUPTA, Sanjay
8th Floor, TCS-Kensington 'B' wing, Powai, Mumbai, India

Specification

CLIAMS:1. An information security system (100) for securing Big Data of an organization, the information security system (100) comprising:
a processor (102);
an interaction module (112) coupled to the processor (102) to:
obtain one or more security related inputs from a user for a Big Data environment deployed in the organization;
convert the one or more security related inputs into at least one security requirement for the Big Data environment;
a security policy designer (114) coupled to the processor (102) to:
identify a security policy template from amongst a plurality of pre-defined security policy templates based on a security reference architecture and the at least one security requirement, wherein the security policy template represents a plurality of security controls, and wherein the security reference architecture is indicative of the plurality of security controls categorized in a plurality of security layers and security control selection rules;
select one or more security controls from amongst the plurality of security controls based on the at least one security requirement;
a determination module (118) coupled to the processor (102) to:
identify one or more existing security controls implemented in the Big Data environment based on at least one environment parameter;
compare the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment to determine a security control from amongst the selected one or more security controls that is not implemented in the Big Data environment; and
implement the security control in the Big Data environment to provide security to the Big Data of the organization.

2. The information security system (100) as claimed in claim 1, wherein the determination module (118) further is to determine changes to be made to the one or more existing security controls based on the comparison of the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment.

3. The information security system (100) as claimed in claim 1, wherein the security policy designer (114) further is to:
render the security policy template to the user for customization;
based on the customization, select the one or more security controls from amongst the plurality of security controls;
design one or more security policies based on the selected one or more security controls; and
implement the one or more security policies in the Big Data environment to provide security to the Big Data of the organization.

4. The information security system (100) as claimed in claim 3, wherein the security policy designer (114) further is to replicate the one or more security policies of another Big Data environment deployed in the organization.

5. The information security system (100) as claimed in claim 1, the security policy designer (114) further is to generate a visual model for the Big Data environment, wherein the visual model depicts at least one of the security policy template, one or more security policies, and information related to Big Data environment.

6. The information security system (100) as claimed in claim 1, wherein the determination module (118) further is to determine a security product corresponding to each of the one or more existing security controls, and wherein a security product implements a respective existing security control.

7. The information security system (100) as claimed in claim 1, further comprises a monitoring module (120) coupled to the processor (102) to:
periodically monitor the one or more existing security controls implemented in the Big Data environment to determine whether the one or more existing security controls deviate from a security policy; and
on determining the one or more existing security controls to be deviating from the security policy, initiate an action for the Big Data environment.

8. The information security system (100) as claimed in claim 7, wherein the monitoring module (120) is to:
receive a user request to monitor a subset of the Big Data environment against a security policy; and
in response to the user request, monitor the subset of the Big Data environment against the security policy.
9. The information security system (100) as claimed in claim 7, wherein the monitoring module (120) further is to provide a dashboard view of the Big Data environment to the user, wherein the dashboard view allows the user to view information related to the Big Data environment, and wherein the information includes security policies, and status of the Big Data environment.

10. The information security system (100) as claimed in claim 1, further comprises a performance simulator (116) to:

simulate the Big Data environment to ascertain performance of the Big Data environment; and
simulate an impact on a functionality of the Big Data based on changes in the security controls.

11. A method for providing security to Big Data of an organization, the method comprising:
obtaining one or more security related inputs from a user for a Big Data environment deployed in the organization;
converting the one or more security related inputs into at least one security requirement for the Big Data environment;
identifying a security policy template from amongst a plurality of pre-defined security policy templates based on a security reference architecture and the at least one security requirement, wherein the security policy template represents a plurality of security controls, and wherein the security reference architecture is indicative of the plurality of security controls categorized in a plurality of security layers and security control selection rules;
selecting one or more security controls from amongst the plurality of security controls based on the at least one security requirement;
identifying one or more existing security controls implemented in the Big Data environment based on at least one environment parameter;
comparing the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment to determine a security control from amongst the selected one or more security controls that is not implemented in the Big Data environment; and
implementing the security control in the Big Data environment to provide security to the Big Data of the organization.

12. The method as claimed in claim 11, wherein identifying the one or more security controls comprises:
rendering the security policy template to the user for customization;
based on the customization, selecting the one or more security controls from amongst the plurality of security controls;
creating one or more security policies based on the selected one or more security controls; and
implementing the one or more security policies in the Big Data environment to provide security to the Big Data of the organization.

13. The method as claimed in claim 11, further comprises:
generating a visual model for the Big Data environment, wherein the visual model depicts at least one of the security policy template, one or more security policies, and information related to Big Data environment.

14. The method as claimed in claim 11, further comprises:
determining changes to be made to the one or more existing security controls based on the comparison of the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment.

15. The method as claimed in claim 11, further comprises:
monitoring the one or more existing security controls implemented in the Big Data environment to determine whether the one or more existing security controls deviates from a security policy; and
on determining the one or more existing security controls to be deviating from the security policy, initiating an action for the Big Data environment.

16. The method as claimed in claim 11, further comprises providing a dashboard view of the Big Data environment to the user, wherein the dashboard view allows the user to view information related to the Big Data environment, and wherein the information includes security policies, and status of the Big Data environment.

17. The method as claimed in claim 11, further comprises determining a security product corresponding to each of the one or more existing security controls, wherein a security product implements a respective existing security control.

18. The method as claimed in claim 11, wherein the Big Data environment comprises Big Data technologies, NoSQL technologies, and a combination of the Big Data technologies and the NoSQL technologies..

19. A non-transitory computer-readable medium having embodied thereon a computer program for executing a method comprising:
obtaining one or more security related inputs from a user for a Big Data environment deployed in an organization;
converting the one or more security related inputs into at least one security requirement for the Big Data environment;
identifying a security policy template from amongst a plurality of pre-defined security policy templates based on a security reference architecture and the at least one security requirement, wherein the security policy template represents a plurality of security controls, and wherein the security reference architecture is indicative of the plurality of security controls categorized in a plurality of security layers and security control selection rules;
selecting one or more security controls from amongst the plurality of security controls based on the at least one security requirement;
identifying one or more existing security controls implemented in the Big Data environment based on at least one environment parameter;
comparing the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment to determine a security control from amongst the selected one or more security controls that is not implemented in the Big Data environment; and
implementing the security control in the Big Data environment to provide security to the Big Data of the organization.
,TagSPECI:As Attached

Documents

Application Documents

# Name Date
1 739-MUM-2015-FORM-1-26-03-2015.pdf 2015-03-26
2 739-MUM-2015-CORRESPONDENCE-26-03-2015.pdf 2015-03-26
3 739-MUM-2015-FORM 26-(24-04-2015).pdf 2015-04-24
4 739-MUM-2015-CORRESPONDENCE-(24-04-2015).pdf 2015-04-24
5 REQUEST FOR CERTIFIED COPY [30-12-2015(online)].pdf 2015-12-30
7 Request For Certified Copy-Online.pdf 2018-08-11
8 PD015297IN-SC - SPEC FOR FILING.pdf 2018-08-11
9 PD015297IN-SC - FORM 5.pdf 2018-08-11
10 PD015297IN-SC - FORM 3.pdf 2018-08-11
11 PD015297IN-SC - DRAWINGS FOR FILING.pdf 2018-08-11
12 739-MUM-2015-Form 3-020516.pdf 2018-08-11
13 739-MUM-2015-Correspondence-020516.pdf 2018-08-11
14 739-MUM-2015-FER.pdf 2019-11-19
15 739-MUM-2015-FORM 3 [17-04-2020(online)].pdf 2020-04-17
16 739-MUM-2015-OTHERS [11-05-2020(online)].pdf 2020-05-11
17 739-MUM-2015-FER_SER_REPLY [11-05-2020(online)].pdf 2020-05-11
18 739-MUM-2015-COMPLETE SPECIFICATION [11-05-2020(online)].pdf 2020-05-11
19 739-MUM-2015-CLAIMS [11-05-2020(online)].pdf 2020-05-11
20 739-MUM-2015-PatentCertificate16-03-2021.pdf 2021-03-16
21 739-MUM-2015-IntimationOfGrant16-03-2021.pdf 2021-03-16
22 739-MUM-2015-RELEVANT DOCUMENTS [27-09-2022(online)].pdf 2022-09-27
23 739-MUM-2015-RELEVANT DOCUMENTS [26-09-2023(online)].pdf 2023-09-26

Search Strategy

1 SearchStrategyMatrix_19-11-2019.pdf
2 SearchStrategyMatrixAE_09-02-2021.pdf
3 2019-11-1913-08-39_19-11-2019.pdf

ERegister / Renewals

3rd: 18 Mar 2021

From 05/03/2017 - To 05/03/2018

4th: 18 Mar 2021

From 05/03/2018 - To 05/03/2019

5th: 18 Mar 2021

From 05/03/2019 - To 05/03/2020

6th: 18 Mar 2021

From 05/03/2020 - To 05/03/2021

7th: 18 Mar 2021

From 05/03/2021 - To 05/03/2022

8th: 15 Feb 2022

From 05/03/2022 - To 05/03/2023

9th: 01 Mar 2023

From 05/03/2023 - To 05/03/2024

10th: 01 Mar 2024

From 05/03/2024 - To 05/03/2025

11th: 03 Mar 2025

From 05/03/2025 - To 05/03/2026