Sign In to Follow Application
View All Documents & Correspondence

System And Method For Balancing Accuracy For Secure Cloud Transactions

Abstract: SYSTEM AND METHOD FOR BALANCING ACCURACY FOR SECURE CLOUD TRANSACTIONS ABSTRACT A system (100) for balancing accuracy for secure cloud transactions is disclosed. The system (100) comprising: a computing device (104) adapted to receive a transaction request from a user device (102); wherein the computing device (104) is configured to: enable a user to enter login credentials using the user device (102); authenticate the user device (102) based on the entered credentials; receive transaction details including a data, policies, and credentials associated with the transaction request; execute a Two-Phase Validation Commit (2PVC) protocol to verify the data policies, the credentials, and data consistency during an execution of the transaction; provide a feedback to the user device (102) regarding a validation status and the execution status of the transaction; and enable the user to perform a subsequent transaction upon successful validation of a completion of the transaction. Claims: 10, Figures: 6 Figure 1 is selected.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
27 May 2024
Publication Number
22/2024
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

SR University
SR University, Ananthasagar, Warangal Telangana India 506371 patent@sru.edu.in 08702818333

Inventors

1. Dr. T Sampath Kumar
SR University, Ananthasagar, Warangal, Telangana-506371, India (IN)
2. Dr. R Ravi Kumar
SR University, Ananthasagar, Warangal, Telangana-506371, India (IN)
3. Dr. Mohammed Ali Shaik
SR University, Ananthasagar, Warangal, Telangana-506371, India (IN)
4. Dr. P Praveen
SR University, Ananthasagar, Warangal, Telangana-506371, India (IN)

Specification

Description:BACKGROUND
Field of Invention
[001] Embodiments of the present invention generally relate to a validation system and particularly to a system and a method for balancing accuracy for secure cloud transactions.
Description of Related Art
[002] In today’s digital landscape, databases, and cloud servers play a crucial role in storing and managing vast amounts of information across various industries. Ensuring the integrity and reliability of data within these databases and cloud servers is paramount for the efficient operation of businesses and organizations. However, traditional validation systems often face challenges in effectively detecting and preventing errors or inconsistencies in the data.
[003] However, existing validation systems typically rely on single-phase validation approaches, where data is validated against predefined rules or criteria linearly. While these systems may catch some errors, they often lack the robustness and flexibility needed to address complex data validation requirements.
[004] Moreover, with the increasing volume and complexity of data being processed, single-phase validation systems can become overwhelmed, leading to performance bottlenecks and potential data inaccuracies slipping through undetected.
[005] There is thus a need for an improved and advanced system for balancing accuracy for secure cloud transactions that can administer the aforementioned limitations in a more efficient manner.
SUMMARY
[006] Embodiments in accordance with the present invention provide a system for balancing accuracy for secure cloud transactions. The system comprising: a computing device adapted to receive a transaction request from a user device. The computing device is configured to: enable a user to enter login credentials using the user device; authenticate the user device based on the entered credentials; receive transaction details including a data, policies, and credentials associated with the transaction request; execute a Two-Phase Validation Commit (2PVC) protocol to verify the data policies, the credentials, and data consistency during an execution of the transaction; provide a feedback to the user device regarding a validation status and the execution status of the transaction; and enable the user to perform a subsequent transaction upon successful validation of a completion of the transaction.
[007] Embodiments in accordance with the present invention further provide a method for validating secure cloud transactions using a system. The method comprising steps of: enabling a user to enter login credentials using a user device; authenticating the user device based on the entered credentials; receiving transaction details including a data, policies, and credentials associated with the transaction request; executing a Two-Phase Validation Commit (2PVC) protocol to verify the data policies, the credentials, and data consistency during an execution of the transaction; providing a feedback to the user device regarding a validation status and the execution status of the transaction; and enabling the user to perform a subsequent transaction upon successful validation of a completion of the transaction.
[008] Embodiments of the present invention may provide a number of advantages depending on their particular configuration. First, embodiments of the present application may provide a system for balancing accuracy for secure cloud transactions.
[009] Next, embodiments of the present application may provide a system for balancing accuracy for secure cloud transactions that provides insights into the trade-offs involved in data security and data exchange methodologies and identify areas for further improvement.
[0010] Next, embodiments of the present application may provide a system for balancing accuracy for secure cloud transactions that optimizes performance without compromising accuracy and precision.
[0011] Next, embodiments of the present application may provide a system for balancing accuracy for secure cloud transactions that emphasizes precision and accuracy by employing rigorous data validation and verification mechanisms.
[0012] Next, embodiments of the present application may provide a system for balancing accuracy for secure cloud transactions that takes a holistic approach by considering both performance and accuracy as significant factors.
[0013] Next, embodiments of the present application may provide a system for balancing accuracy for secure cloud transactions that focuses on achieving a balance between all three aspects: performance, accuracy, and precision.
[0014] These and other advantages will be apparent from the present application of the embodiments described herein.
[0015] The preceding is a simplified summary to provide an understanding of some embodiments of the present invention. This summary is neither an extensive nor exhaustive overview of the present invention and its various embodiments. The summary presents selected concepts of the embodiments of the present invention in a simplified form as an introduction to the more detailed description presented below. As will be appreciated, other embodiments of the present invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
BRIEF DESCRIPTION OF THE DRAWINGS
[0016] The above and still further features and advantages of embodiments of the present invention will become apparent upon consideration of the following detailed description of embodiments thereof, especially when taken in conjunction with the accompanying drawings, and wherein:
[0017] FIG. 1A illustrates a block diagram of a system for balancing accuracy for secure cloud transactions, according to an embodiment of the present invention;
[0018] FIG. 1B illustrates a first interface for a user registration, according to an embodiment of the present invention;
[0019] FIG. 1C illustrates a first interface for a user login, according to an embodiment of the present invention;
[0020] FIG. 1D illustrates a second interface of the computing device, according to an embodiment of the present invention;
[0021] FIG. 1E illustrates a third interface of a Certified Authority (CA) server, according to an embodiment of the present invention; and
[0022] FIG. 2 depicts a flowchart of a method for validating secure cloud transactions using the system for balancing accuracy for secure cloud transactions, according to an embodiment of the present invention.
[0023] The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word "may" is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including but not limited to. To facilitate understanding, like reference numerals have been used, where possible, to designate like elements common to the figures. Optional portions of the figures may be illustrated using dashed or dotted lines, unless the context of usage indicates otherwise.
DETAILED DESCRIPTION
[0024] The following description includes the preferred best mode of one embodiment of the present invention. It will be clear from this description of the invention that the invention is not limited to these illustrated embodiments but that the invention also includes a variety of modifications and embodiments thereto. Therefore, the present description should be seen as illustrative and not limiting. While the invention is susceptible to various modifications and alternative constructions, it should be understood, that there is no intention to limit the invention to the specific form disclosed, but, on the contrary, the invention is to cover all modifications, alternative constructions, and equivalents falling within the scope of the invention as defined in the claims.
[0025] In any embodiment described herein, the open-ended terms "comprising", "comprises”, and the like (which are synonymous with "including", "having” and "characterized by") may be replaced by the respective partially closed phrases "consisting essentially of", “consists essentially of", and the like or the respective closed phrases "consisting of", "consists of”, the like.
[0026] As used herein, the singular forms “a”, “an”, and “the” designate both the singular and the plural, unless expressly stated to designate the singular only.
[0027] FIG. 1 illustrates a block diagram of a system 100 for balancing accuracy for secure cloud transactions, according to an embodiment of the present invention. In an embodiment of the present invention, the system 100 may be adapted for the verification of transactions that may be executed on a database 108. According to embodiments of the present invention, the transactions may be, but not limited to, reading queries from the database 108, writing the queries to the database 108, modifying the queries in the database 108, deleting the queries in the database 108, reading a digital file, writing the digital file, modifying the digital file, deleting the digital file, downloading the digital file, uploading the digital file, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the transaction, including known, related art, and/or later developed technologies.
[0028] Further, after the execution of the transaction, the system 100 may check a state of the transaction. According to embodiments of the present invention, the state of the transaction may be, but not limited to, a pending state, an ongoing state, a completed state, a suspended state, a hold state, and so forth. Embodiments of the present invention are intended to include or otherwise cover any state of the transaction, including known, related art, and/or later developed technologies.
[0029] In another embodiment of the present invention, the system 100 may be configured to check a validity and an approachability of the transaction that may be initiated by a user. According to embodiments of the present invention, the validity and approachability of the transaction may be, but not limited to, a syntax proofing of the transaction, an authorization of the user executing the transaction, and so forth. Embodiments of the present invention are intended to include or otherwise cover any validity and an approachability check of the transaction, including known, related art, and/or later developed technologies.
[0030] According to embodiments of the present invention, the system 100 may comprise a user device 102, a computing device 104, a Certified Authority (CA) server 106, and the database 108.
[0031] In an embodiment of the present invention, the user device 102 may be a device used by the user. The user device 102 may be configured to enable the user to request the transaction in the database 108. The user device 102 may further be configured to return an output generated after the execution of the requested transaction, in an embodiment of the present invention. In another embodiment of the present invention, the user device 102 may further be configured to return error messages (if any) that may have occurred during execution of the requested transaction.
[0032] In an embodiment of the present invention, the user device 102 may be configured to register the user onto the system 100 by receiving user details using a first interface 102a (as shown in FIG. 1B). According to embodiments of the present invention, the user details may be, but not limited to, a username, a password, an electronic mail address, a date of birth, a gender, a contact number, an address, authorization policies, and so forth. Embodiments of the present invention are intended to include or otherwise cover any user details that may be provided by the user for registration on the system 100, including known, related art, and/or later developed technologies. In another embodiment of the present invention, the user device 102 may enable the user to log into the system 100 using the first interface 102a (as shown in FIG. 1C) by providing login credentials.
[0033] The user device 102 may be, but not limited to, a personal computer, a desktop, a server, a laptop, a tablet, a mobile phone, a notebook, a netbook, a smartphone, a wearable device, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the user device 102 including known, related art, and/or later developed technologies. According to an embodiment of the present invention, the user device 102 may comprise software applications such as, but not limited to, a data structures managing application, a Structured Query Language (SQL) application, and the like. In a preferred embodiment of the present invention, the user device 102 may comprise a relational database management application (not shown) which may be a computer-readable program installed in the user device 102 for requesting and executing transactions associated with the system 100.
[0034] In an embodiment of the present invention, the computing device 104 may be a centralized device adapted to receive the transaction request from the user device 102. The computing device 104 may further be configured to enable an admin to log into the system 100 using a second interface 104a (as shown in FIG. 1D), in an embodiment of the present invention.
[0035] In an embodiment of the present invention, the computing device 104 may be configured to enable the user to enter the login credentials using the user device 102. The computing device 104 may further be configured to authenticate the user device 102 based on the entered credentials, in an embodiment of the present invention. In an embodiment of the present invention, the computing device 104 may further be configured to receive transaction details including a data, policies, and credentials associated with the transaction request. The computing device 104 may further be configured to execute a Two-Phase Validation Commit (2PVC) protocol to verify the data policies, the credentials, and data consistency during the execution of the transaction. The Two-Phase Validation Commit (2PVC) protocol ensures atomicity, consistency, isolation, and durability (ACID) properties of the transaction request.
[0036] In an embodiment of the present invention, the computing device 104 may further be configured to provide a feedback to the user device 102 regarding a validation status and the execution status of the transaction. The computing device 104 may further be configured to enable the user to perform a subsequent transaction upon successful validation of a completion of the transaction, in an embodiment of the present invention. According to an embodiment of the present invention, the computing device 104 may comprise a processor (not shown) for executing computer-executable instructions. The computer-executable instructions may be in the form of programming modules such as a registration module, a validation module, and a feedback module. In an embodiment of the present invention, the registration module may be configured to enable registration of user credentials and device information. The registration module may facilitate an initial setup of user accounts within the system, allowing users to securely store their login credentials and associate them with their respective devices. Furthermore, the validation module may be designed to authenticate the user device 102 and validate transaction requests. The validation module may be responsible for verifying the authenticity of the entered login credentials and ensuring that the requesting user device 102 is authorized to access the system's services. Additionally, the feedback module may provide the users with real-time feedback on a status of their transactions. The feedback module may communicate validation results and transaction execution status back to the user device 102, allowing users to stay informed throughout a validation process.
[0037] In an embodiment of the present invention, the Certified Authority (CA) server 106 may be configured to communicate to the computing device 104. The Certified Authority (CA) server 106 may be adapted for validation of the login credentials that may be provided by the user using the user device 102 for logging onto the system 100, in an embodiment of the present invention.
[0038] In an embodiment of the present invention, the database 108 may be configured to receive the transaction request. The database 108 may further be configured to execute the received transaction request, in an embodiment of the present invention. Further, the database 108 may be updated after execution of the received transaction request, in an embodiment of the present invention.
[0039] According to embodiments of the present invention, the database 108 may be for example, but not limited to, a distributed database, a personal database, an end-user database, a commercial database, a Structured Query Language (SQL) database, a non-SQL database, an operational database, a relational database, an object-oriented database, a graph database, and so forth. In a preferred embodiment of the present invention, the database 108 may be a cloud database. Embodiments of the present invention are intended to include or otherwise cover any type of the database 108 including known, related art, and/or later developed technologies.
[0040] Further, the database 108 may be stored in a cloud server, in an embodiment of the present invention. In an embodiment of the present invention, the cloud server may be remotely located. In an exemplary embodiment of the present invention, the cloud server may be a public cloud server. In another exemplary embodiment of the present invention, the cloud server may be a private cloud server. In yet another embodiment of the present invention, the cloud server may be a dedicated cloud server. According to embodiments of the present invention, the cloud server may be, but not limited to, a Microsoft Azure cloud server, an Amazon AWS cloud server, a Google Compute Engine (GEC) cloud server, an Amazon Elastic Compute Cloud (EC2) cloud server, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the cloud server including known, related art, and/or later developed technologies.
[0041] FIG. 1B illustrates the first interface 102a for the user registration using the user device 102, according to an embodiment of the present invention. In an embodiment of the present invention, the first interface 102a for the user registration may enable the user to register on the system 100 using the user device 102. The user may be registered onto the system 100 by receipt of the user details, in an embodiment of the present invention. According to embodiments of the present invention, the user details may be, but not limited to, the username, the password, the electronic mail address, the date of birth, the gender, the contact number, the address, authorization policies, and so forth. Embodiments of the present invention are intended to include or otherwise cover any user details that may be provided by the user for registration on the system 100, including known, related art, and/or later developed technologies.
[0042] FIG. 1C illustrates the first interface 102a for the user login using the user device 102, according to an embodiment of the present invention. In an embodiment of the present invention, the first interface 102a for the user login may enable the user to login on the system 100 using the user device 102. The user may be logged onto the system 100 by receipt of the username and the password, in an embodiment of the present invention.
[0043] FIG. 1D illustrates the second interface 104a of the computing device 104, according to an embodiment of the present invention. In an embodiment of the present invention, the second interface 104a may enable the admin to log in the system 100 using the computing device 104. The admin be logged onto the system 100 by receipt of the username and the password, in an embodiment of the present invention.
[0044] FIG. 1E illustrates a third interface 106a of the Certified Authority (CA) server 106, according to an embodiment of the present invention. In an embodiment of the present invention, the third interface 106a may enable a Certified Authority (CA) to log on the system 100 using the Certified Authority (CA) server 106. The Certified Authority (CA) may be logged onto the system 100 by receipt of the username and the password, in an embodiment of the present invention.
[0045] FIG. 2 depicts a flowchart of a method 200 for validating the secure cloud transactions using the system 100, according to an embodiment of the present invention.
[0046] At step 202, the system 100 may enable the user to enter the login credentials using the user device 102.
[0047] At step 204, the system 100 may authenticate the user device 102 based on the entered credentials.
[0048] At step 206, the system 100 may receive the transaction details including the data, the policies, and the credentials associated with the transaction request.
[0049] At step 208, the system 100 may execute the Two-Phase Validation Commit (2PVC) protocol to verify the data policies, the credentials, and the data consistency during the execution of the transaction.
[0050] At step 210, the system 100 may provide the feedback to the user device 102 regarding the validation status and the execution status of the transaction.
[0051] At step 212, the system 100 may enable the user to perform the subsequent transaction upon successful validation of the completion of the transaction.
[0052] While the invention has been described in connection with what is presently considered to be the most practical and various embodiments, it is to be understood that the invention is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims.
[0053] This written description uses examples to disclose the invention, including the best mode, and also to enable any person skilled in the art to practice the invention, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the invention is defined in the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements within substantial differences from the literal languages of the claims. , Claims:CLAIMS
I/We Claim:
1. A system (100) for balancing accuracy for secure cloud transactions, the system (100) comprising:
a computing device (104) adapted to receive a transaction request from a user device (102); wherein the computing device (104) is configured to:
enable a user to enter login credentials using the user device (102);
authenticate the user device (102) based on the entered credentials;
receive transaction details including a data, policies, and credentials associated with the transaction request;
execute a Two-Phase Validation Commit (2PVC) protocol to verify the data policies, the credentials, and data consistency during an execution of the transaction;
provide a feedback to the user device (102) regarding a validation status and the execution status of the transaction; and
enable the user to perform a subsequent transaction upon successful validation of a completion of the transaction.
2. The system (100) as claimed in claim 1, wherein the computing device (104) is configured to communicate to a Certified Authority (CA) server (106) for validation of the login credentials.
3. The system (100) as claimed in claim 1, wherein the login credentials are initially provided to the user of the user device (102) by a Certified Authority (CA).
4. The system (100) as claimed in claim 1, wherein the transaction is selected from reading queries from a database (108), writing the queries to the database (108), modifying the queries in the database (108), deleting the queries in the database (108), reading a digital file, writing the digital file, modifying the digital file, deleting the digital file, downloading the digital file, uploading the digital file, or a combination thereof.
5. The system (100) of claim 1, wherein the Two-Phase Validation Commit (2PVC) protocol ensures atomicity, consistency, isolation, and durability (ACID) properties of the transaction request.
6. A method (200) for validating secure cloud transactions using a system (100), the method (200) characterized by the steps of:
enabling a user to enter login credentials using a user device (102);
authenticating the user device (102) based on the entered credentials;
receiving transaction details including a data, policies, and credentials associated with the transaction request;
executing a Two-Phase Validation Commit (2PVC) protocol to verify the data policies, the credentials, and data consistency during an execution of the transaction;
providing a feedback to the user device (102) regarding a validation status and the execution status of the transaction; and
enabling the user to perform a subsequent transaction upon successful validation of a completion of the transaction.
7. The method (200) as claimed in claim 6, wherein the transaction is selected from reading queries from a database (108), writing the queries to the database (108), modifying the queries in the database (108), deleting the queries in the database (108), reading a digital file, writing the digital file, modifying the digital file, deleting the digital file, downloading the digital file, uploading the digital file, or a combination thereof.
8. The method (200) as claimed in claim 6, wherein the user details are selected from a username, a password, an electronic mail address, a date of birth, a gender, a contact number, an address, authorization policies, or a combination thereof.
9. The method (200) as claimed in claim 6, wherein the computing device (104) is configured to communicate to a Certified Authority (CA) server (106) for validation of the login credentials.
10. The method (200) as claimed in claim 6, wherein the login credentials are initially provided to the user of the user device (102) by a Certified Authority (CA).
Date: May 24, 2024
Place: Noida

Dr. Keerti Gupta
Agent for the Applicant
(IN/PA-1529)

Documents

Application Documents

# Name Date
1 202441040890-STATEMENT OF UNDERTAKING (FORM 3) [27-05-2024(online)].pdf 2024-05-27
2 202441040890-REQUEST FOR EARLY PUBLICATION(FORM-9) [27-05-2024(online)].pdf 2024-05-27
3 202441040890-POWER OF AUTHORITY [27-05-2024(online)].pdf 2024-05-27
4 202441040890-OTHERS [27-05-2024(online)].pdf 2024-05-27
5 202441040890-FORM-9 [27-05-2024(online)].pdf 2024-05-27
6 202441040890-FORM FOR SMALL ENTITY(FORM-28) [27-05-2024(online)].pdf 2024-05-27
7 202441040890-FORM 1 [27-05-2024(online)].pdf 2024-05-27
8 202441040890-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [27-05-2024(online)].pdf 2024-05-27
9 202441040890-EDUCATIONAL INSTITUTION(S) [27-05-2024(online)].pdf 2024-05-27
10 202441040890-DRAWINGS [27-05-2024(online)].pdf 2024-05-27
11 202441040890-DECLARATION OF INVENTORSHIP (FORM 5) [27-05-2024(online)].pdf 2024-05-27
12 202441040890-COMPLETE SPECIFICATION [27-05-2024(online)].pdf 2024-05-27
13 202441040890-FORM-26 [11-07-2024(online)].pdf 2024-07-11