AU2021105507A4 - Platform independent backup and restore for mobile devices using blockchain technology - Google Patents

Platform independent backup and restore for mobile devices using blockchain technology Download PDF

Info

Publication number
AU2021105507A4
AU2021105507A4 AU2021105507A AU2021105507A AU2021105507A4 AU 2021105507 A4 AU2021105507 A4 AU 2021105507A4 AU 2021105507 A AU2021105507 A AU 2021105507A AU 2021105507 A AU2021105507 A AU 2021105507A AU 2021105507 A4 AU2021105507 A4 AU 2021105507A4
Authority
AU
Australia
Prior art keywords
data
backup
blockchain
restore
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2021105507A
Inventor
Priyanka Chorey
Sonika Chorey
Sneha GUPTA
Sunil Gupta
Nilesh Pohokar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chorey Priyanka Ms
Chorey Sonika Ms
Pohokar Nilesh Satyavijay Dr
Original Assignee
Chorey Priyanka Ms
Chorey Sonika Ms
Pohokar Nilesh Satyavijay Dr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chorey Priyanka Ms, Chorey Sonika Ms, Pohokar Nilesh Satyavijay Dr filed Critical Chorey Priyanka Ms
Priority to AU2021105507A priority Critical patent/AU2021105507A4/en
Application granted granted Critical
Publication of AU2021105507A4 publication Critical patent/AU2021105507A4/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

In computing systems, backup and restore of data is a crucial task, since hardware faults, physical damage to the device and software or human errors can lead to the loss of important information. Backups are even more important for devices such as smartphones, mobile phones and laptops, since they are more prone to loss or to theft. At present, smartphones are mostly used as handheld computers rather than as mobile phones, and consequently a lot of data is stored in these devices. This makes more critical the need to keep devices safe from losses of important data and information. The platform independent backup and restore system design is focused on cross platform service with data security aspects. The system design for backup and restore provides a cloud based secured solution for backup and restore using blockchain technology. Thus the characteristics of blockchain provide improved security to the data in the system. 1/1 DRAWINGS Backup Devices 101 Blockchain Generation Layer 102 Data Backup and Restore APIs (PhP) 103 SQL Database for Backend Storage (MySql) Blockchain Integrity Verification 104 Blockchain Decoding Service 105 Restoring Devices 106 Figure 1

Description

1/1
DRAWINGS
Backup Devices 101
Blockchain Generation Layer 102
Data Backup and Restore APIs (PhP) 103 SQL Database for Backend Storage (MySql)
Blockchain Integrity Verification 104
Blockchain Decoding Service 105
Restoring Devices 106
Figure 1
EDITORIAL NOTE 2021105507
There are 8 pages of description only.
TITLE OF INVENTION PLATFORM INDEPENDENT BACKUP AND RESTORE FOR MOBILE DEVICES USING BLOCKCHAIN TECHNOLOGY. TECHNICAL FIELD
[0001] The present invention relates in general with a system and method for platform independent backup and restore for mobile devices. This invention also relates the use of blockchain technology and flutter framework to make operations of backup and restore secure and platform independent of mobile devices. The title of invention belongs to Computer field.
BACKGROUND ART
[0002] There is a vast number of backup software available on the market, but for an inexperienced user it is often difficult to determine which software to use and more importantly how to use it. It is important to understand certain problems one faces when making backups of data from mobile devices. A backup concept also explains how backup correctness and completeness are verified, how fast data can be restored and which threats the backup process is designed to guard against. The problems that are addressed include how to store backup data, how often and when to create backups and how long to keep them. Data security is also one of the important aspects in backup and restore of data. If data security is not provided properly then the data may be lost, tampered, misused and it may cause great loss to the concerned users.
[0003] In addition, the rapid technological evolution in mobile devices makes it more difficult to restore data saved from old devices to new ones. Thus, mobile devices pose new challenges for the backup and restore problem. Making backups on external memory devices, such as on secure digital (SD) cards and on laptop disks, suffers from the same risks of failure and loss. Mostly, mobile devices and smartphones are always being connected to the Internet, it appears normal to transfer the information online and to provide backup and restore services based on the cloud computing paradigm, which is more consistent and less expensive. This approach reduces the risk of data loss and decouples the data from a specific device.
[0004] Once information about backups moves online, it can be used in shared applications. In any enterprises, it can be useful for users to share business and personal data contained in their mobile's backups, such as calendar, business cards, with some selected contacts of their choice.
It is easy to visualize a community of people willing to share their important data within their mobile network. A backup that allows data sharing, however, can suffer the same security and privacy issues present in social networks, such limitations can be approached in different ways depending on the environment where the system is used. In an enterprise data sharing can be monitored by administrators which can enforce the company privacy policies. In a general purpose environment, like a mobile social network, ownership of data must be verified and sharing must be allowed only for the data owner. Security can be ensured by deploying secure connections and data encryption. The inspiration for designing and implementing a safe and secure backup and restore system for smartphones is derived mainly for developing platform independent system. This section describes the assessment of different efforts and work by various researchers in recent past.
[0005] US 9569771B2 discloses a method and system for storage and retrieval of block chains with Galois Fields. One or more blocks for a blockchain are securely stored and retrieved with a modified Galois Fields on a cloud or peer-to-peer (P2P) communications network. The modified Galois Field provides at least additional layers for security and privacy for blockchains. The blocks and blockchains are securely stored and retrieved for crypto currency transactions including, but not limited to, BITCOIN transactions and other crypto currency transactions.
[0006] US 20180367316A1 discloses the Seed Splitting and Firmware Extension for Secure Crypto Currency Key Backup, Restore, and Transaction Signing Platform Apparatuses, Methods and Systems (SFTSP) transforms transaction signing request, key backup request, key recovery request inputs via SFTSP components into transaction signing response, key backup response, key recovery response outputs. A transaction signing request message for a transaction is received by a first Hardware Security Module (HSM) and includes an encrypted second master key share from a second HSM whose access is controlled by M - of - N authentication policy. The encrypted second master key share is decrypted. A first master key share is retrieved. A master private key is recovered from the master key shares. A transaction hash and a keychain path is determined. A signing private key for the keychain path is generated using the recovered master private key. The transaction hash is signed using the signing private key, and the generated signature is returned.
[0007] US 008375223B2 discloses embodiments relate to systems and methods for secure distributed storage. In aspects, a set of remote storage hosts, such as personal computers, servers, media devices, cell phones, or others, can Subscribe or register to provide storage via a cloud based or other distributed network. Source data from an originating computer, such as a data file, can be decomposed into data storage Subunits, each of which is encrypted via a cloud management system or other logic or control. The data storage subunits can comprise data blocks or even or uneven size. The set of encrypted data storage subunits can be registered to a table or other record, and disseminated to the remote storage hosts. In the event of data loss at the originating computer or at other times, the remotely stored data storage subunits can be extracted, decrypted, and reassembled to reconstruct the original Source data.
[0008] US 006134660A discloses a system enables a user to remove a file from a file System and from all backup tapes without ever mounting a single tape. When a file is backed up, it is first encrypted using a randomly generated key and then backed up. When the user wishes to remove the file from the backup tape, the key used to encrypt the file is deleted. Deleting the encryption key renders, the data on the tape inaccessible. No one, including the file owner, can ever access the file again. The encrypt before-backup method is completely transparent to the user. Only the computer System's operating System knows which key was used to encrypt the file during backup. This ensures that when the operating System is instructed to delete the encryption key, the key is "lost" forever and thus the backed up files become unreadable. Unlike prior cryptographic file Systems, the revoked backup files are inaccessible to both the user and others.
[0009] Consequently, as in the prior art there is no such depiction about efficient system and methodology developed, and to overcome the shortcomings of the conventional methodology for backup and restore for mobile and handheld devices. There is need to develop a platform independent and applying a cutting-edge blockchain technology for securing the data while doing backup and restore.
SUMMARY
[0010] In the scenario of increasing cyber-attacks and cyber-crimes it has become very critical to protect data available on the hand held devices that are connected to the intemet unceasingly. The objective of the study is to design a better secure, safe and platform independent cloud based system for backup and restore using blockchain technology. In this designed system backup and restore system, data security, correctness of data and legitimate speed of backup and restore are very crucial and important. This system not only detects the tampered data but also does not restore tampered (incorrect) data. The designed system supports cross platform independent backup and restore data from various devices. Thus, blockchain technology provides an incremental solution with improved security in backup and restore of data for mobile devices.
[0011] The system design offers immediate, reliable, safe, secure and transparent backup and restore of the important and ready access data stored on mobile devices like laptops and smartphones. Today there is a need to have secured backup options. Most of the backup and restore solutions available are vendor's device dependent. The designed and developed system will enable users to backup and restore data from their mobile devices, irrespective of any types of devices. More effort of the designed system is to provide improved security features with cross platform backup and restore of data using blockchain technology.
OBJECT OF INVENTION
[0012] The object of inventions are as follows:
a. Principal object of the invention is to provide data backup and restore facility, safe and secured.
b. To design model of platform independent data backup and restore for maintaining data integrity and prevent data loss
c. To build up an outline for platform independent data backup and restore operation.
d. Another object of the invention is to provide a cost effective data backup and restore facility.
BRIEF DESCRIPTION OF DRAWING
[0013] This invention is described by way of example with reference to the following drawing where, Figure 1 of sheet 1 shows a procedure for blockchain based platform independent backup and restore.
[0014] In order that the way in which the above-cited and objects of the invention are obtained, a more particular description of the invention briefly described above will be referred to, which are illustrated in the appended drawing. Understanding that these drawings depict only typical embodiment of the invention and therefore not to be considered limiting on its scope, the invention will be described with additional specificity and details through the use of the accompanying drawings.
Description of Figure 1:
[0015] Block 101: Backup Device: It represents a device from a user from which the data is to be backed up. It can be any mobile device. Here data like SMS, Contacts, Call logs and Calendar entries is taken from the device and backed up on the cloud on user's request.
[0016] Block 102: Blockchain Generation Layer: The function of block is to convert the data available on backup device to blockchain form. Using Proof-of-Work (PoW) it generates nonce number and evaluates hash value that controls the overall rule based hashing in blockchain.
[0017] Block 103: Data Backup and Restore APIs and SQL Database for Backend Storage: PhP based backup and restore Application Interfaces (APIs) and backend data storage in databases. MySQL database is used to store backup data on the cloud.
[0018] Block 104: Blockchain Integrity Verification: In blockchain integrity verification performs verification for blockchain integrity. If the current hash value of a block doesn't match with the previous hash value of the next block in the blockchain then the complete blockchain is discarded by this block.
[0019] Block 105: Blockchain Decoding Service: Before restoring the data on the user's device, it must be converted back to normal form from blockchain form. Blockchain decoding service block converts blockchain data into normal ready to restore form.
[0020] Block 106: Restoring Device: It represents any device where a user wants to restore their data which was previously backed up on cloud.
[0021] A backup request is sent by the backup device. After receiving a backup request, the Flutter engine reads the device data and creates POST requests for various data elements like calendar data, contacts, call logs, messages etc. Once these requests are generated, then data is sent to the PHP & MySQL based cloud data center. A dedicated PHP service is created in order to convert this data into blockchain form. In blockchain the data is stored in blocks. Blockchain is immutable.
[0022] Here data is converted to blocks, and all these blocks are linked with each other based on the hash values. Each block in the blockchain contains two hash values, previous hash value and current hash value. Proof-of-Work (PoW) algorithm is used which is the original consensus algorithm in a Blockchain network. In Blockchain, PoW is used to confirm transactions and produce new blocks to the chain.
[0023] Nonce number is added to each block in blockchain. This is basically some random data that can be changed until the hash of our block starts with enough zeros. Proof of Work (PoW) record which is the same as the nonce number stored in the blockchain is also depicted. Based on this value hashes are evaluated, and this value controls the overall rule-based hashing in the blockchain. The rule-based hashing approach basically means that the given blockchain hashes have to follow a particular rule while storing hash values. The blocks which do not follow this rule are termed as invalid blocks and are not accepted into the system.
[0024] Once these blocks are stored correctly, then the user can request for restore operations as and when needed by them. In order to maintain a high level of security and integrity, the incremental backup system (IBS) is applied in this architecture. Using this IBS, multiple copies of the same data are stored into the system along with their time stamp and hash values. The system uses a blockchain integrity verification system (BIVS) in order to verify integrity of the stored blockchain.
DETAILED DESCRIPTION
[0025] Data backup and restore on mobile, desktop and web has been an essential task which must be done with high efficiency and high level of security. Tampering of data backups by attackers present inside and outside organizations has become an everyday practice. Furthermore, the data backup done on one platform must be compatible with other user's platforms as well. In order to solve these issues, a Flutter based backup and restore mechanism, which can work on Android, iOS, Web and the Desktop (including Mac, Linux and Windows Operating Systems) is used in implementation of the system. The designed backup and restore system is supported by a blockchain-powered encryption, hashing and chaining mechanism. Due to the incorporation of Proof-of-Work (PoW) based blockchain mechanism, the system is secure towards tampering attacks and also guarantees the best restore copy selection. Data integrity and increased security, blockchain technique is better and for cross platform support Flutter framework is good. To reduce data duplication and its corresponding overheads, incremental backup technique may be used. The step by step process of backup and restore is explained through algorithms as follows.
[0026] Algorithm for Backup
1. Start 2. Login with User Id 3. Send backup request 4. Set prhash= "
" 5. If current record is already backed up then • Goto step 6 (next record)
Else
• Using PoW generate nonce number and evaluate curr# value • prev# = prhash • prhash=curr#
Endif
6. If (last record) then • Backup all data/blocks from device in blockchain form to cloud.
Else • Goto step 5 7. Stop.
[0027] In the designed system, the first step is to register and create a user account. Then after successfully creating user account, the user can login and perform backup and restore operations. When a user sends a request for backup, one by one all contacts, call logs, SMS (short messaging service), calendar data is read from the device and converted into blockchain form by dividing it into blocks. All these blocks are linked to each other with hash values. Nonce, a random number is generated and used with other field entries to generate the hash value for the block. Every block stores two hash values, one is the current hash value and other is previous hash value. Previous hash value is the current hash value of the previous block which is stored in the current block for linking the blocks. In this way all blocks are linked to one another and are stored on cloud.
[0028] Algorithm for Restore
1. Start
2. Login with User Id 3. Send Restore request 4. If (restore without blockchain) then a. Restore all available data for said user as it is. b. Goto to stop. 5. If (restore with blockchain) then a. Use BIVS to check integrity of blockchain b. BIVS=True c. Extract blocks meant for said user d. If (prev# of next block=curr# of current block) then Restore record Continue (go to next record)
Else
Halt restoring data.
BIVS=False
6. Display previous and current Restored count. 7. Stop.
[0029] When a user wants to restore data from the cloud to the local device, a request is sent to the system after getting successfully logged in. Users can restore data with blockchain or without blockchain. If the user selects without the blockchain restore option then data is restored on a local device as it is, means without integrity checks. Here, if data is tampered on cloud then the tampered data (incorrect) is restored as it is. If the user selects with the blockchain restore option then data is restored on a local device only if it passes integrity checks, otherwise the system asks the user to go for another copy of backup.

Claims (4)

1. A system and method for platform independent backup and restore of data using blockchain technique wherein data on device is configured; data is divided into blocks; blocks are linked to each divided data block; embeds the data available on backup device to blockchain; evaluate hash value that controls the overall rule based hashing in blockchain; for backup and restore of data from cloud storage system.
a. The system and method for any mobile device as claimed in claim 1 wherein the data is to be backed up on the cloud storage; data to be backup and restore are SMS, Contacts, Call logs and Calendar entries is taken from the device.
b. The system and method as claimed in claim 1 wherein to design a cloud based platform independent backup data from mobile devices through blockchain.
c. The system and method as claimed in claim 1 wherein to design a cloud based platform independent restore data to mobile devices through blockchain.
d. The system and method as claimed in claim 1 wherein evaluate system security through blockchain for backup and restore of data.
e. The system and method as claimed in claim 1 wherein to improve data security through blockchain for backup and restore of data.
2. The system and method as claimed in claim 1, claim 5 and claim 6 wherein to evaluate blockchain integrity verification for security.
3. The system and method as claimed in claim 1 wherein for restoring the backup data on mobile device transforming into device supported normal form, from blockchain embedded backup data (ready to restore form of mobile device).
4. The system and method as claimed in claim 1 wherein converting the data from backup devices to blockchain using two hash function method of blockchain, previous hash value and current hash value.
AU2021105507A 2021-08-14 2021-08-14 Platform independent backup and restore for mobile devices using blockchain technology Active AU2021105507A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021105507A AU2021105507A4 (en) 2021-08-14 2021-08-14 Platform independent backup and restore for mobile devices using blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021105507A AU2021105507A4 (en) 2021-08-14 2021-08-14 Platform independent backup and restore for mobile devices using blockchain technology

Publications (1)

Publication Number Publication Date
AU2021105507A4 true AU2021105507A4 (en) 2021-11-18

Family

ID=78513878

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021105507A Active AU2021105507A4 (en) 2021-08-14 2021-08-14 Platform independent backup and restore for mobile devices using blockchain technology

Country Status (1)

Country Link
AU (1) AU2021105507A4 (en)

Similar Documents

Publication Publication Date Title
CN110417750B (en) Block chain technology-based file reading and storing method, terminal device and storage medium
US9256499B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9160535B2 (en) Truly anonymous cloud key broker
US9122882B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US11386217B2 (en) Hybrid centralized and decentralized enterprise system
KR20120029424A (en) Secure and private backup storage and processing for trusted computing and data services
US8219766B1 (en) Systems and methods for identifying the presence of sensitive data in backups
US11329817B2 (en) Protecting data using controlled corruption in computer networks
US8667281B1 (en) Systems and methods for transferring authentication credentials
US20120254136A1 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9824231B2 (en) Retention management in a facility with multiple trust zones and encryption based secure deletion
Virvilis et al. Secure cloud storage: Available infrastructures and architectures review and evaluation
Virvilis et al. A cloud provider-agnostic secure storage protocol
US9054864B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US11327946B2 (en) Hybrid centralized and decentralized enterprise system
US10462113B1 (en) Systems and methods for securing push authentications
AU2021105507A4 (en) Platform independent backup and restore for mobile devices using blockchain technology
Hua et al. Secure data deletion in cloud storage: a survey
CN115203728A (en) Financial data safety storage system and method based on alliance block chain and big data
CN110378133B (en) File protection method and device, electronic equipment and storage medium
US20220138050A1 (en) Method for storage management, electronic device, and computer program product
US11469904B1 (en) Systems and methods for authenticating digital media content
Tian et al. A trusted control model of cloud storage
Megha Authentication of Financial Wallet System and Data Protection using BlockChain
Pokale et al. De-duplication Approach with Enhance Security for Integrity

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)