Patents by Inventor Sutapa Mondal
Sutapa Mondal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240161125Abstract: The present disclosure a method for data regulations-aware cloud storage and processing service allocation. Conventional approaches fail to address the technical problem of data placement for storage as well as processing, considering multiple criteria. Further, the conventional approaches fail to address compliance with data regulations, tier pricing policy for multiple Cloud Service Providers (CSPs) which impacts storage and processing center selection and constraint satisfaction. The present disclosure proposes a joint optimization model for the selection of storage and processing services from multiple cloud service providers, taking into practical consideration of data regulations and tiered pricing, which has not been addressed in the prior art. To solve this hard multi-objective combinatorial optimization problem, the present disclosure utilizes a cost-reduction-based algorithm for obtaining optimal solution.Type: ApplicationFiled: October 26, 2023Publication date: May 16, 2024Applicant: Tata Consultancy Services LimitedInventors: Shubhro Shovan ROY, Pankaj Kumar SAHU, Mangesh Sharad GHAROTE, Sachin Premsukh LODHA, Sutapa MONDAL
-
Patent number: 11983278Abstract: This disclosure relates generally to data anonymization using clustering techniques. In Typically, data anonymization using global recoding can overgeneralize the data. However, preservation of information while anonymization the data is of equal importance as obscuring the relevant information that can be used by the attackers. The disclosed method and system utilized attribute taxonomy tree for generalization to optimize the generalization of the records. The disclosed method uses clustering-based approach and after clustering, each cluster is solved independently using ILP model for K-Anonymization. The ILP model is solved by generalizing the value of the attributes. Sometimes, even after clustering the number of possible patterns is large, thus the disclosed method generates patterns on the fly during multiple iterations.Type: GrantFiled: August 6, 2021Date of Patent: May 14, 2024Assignee: Tata Consultancy Services LimitedInventors: Saket Saurabh, Arun Ramamurthy, Sutapa Mondal, Mangesh Sharad Gharote, Sachin Premsukh Lodha
-
Patent number: 11874951Abstract: This disclosure relates generally to data anonymization and more particular y risk-aware data anonymization. Conventional data anonymization systems either replace PII/sensitive attributes with random values or shuffles them, that causes huge data distortion affecting the data utility. The goal of publishing data is best achieved when privacy is balanced with utility of data, Moreover, to ensure privacy, assessing the risk of disclosure is important. The proposed system provides a pipeline for analysis of data patterns to understand the associated risk level of re-identification of records. Further, based on the identified risks with the records the system anonymizes the data following a pattern based anonymization approach wherein data is clustered and for each cluster distinct patterns are identified such that the information loss is minimal.Type: GrantFiled: August 13, 2021Date of Patent: January 16, 2024Assignee: TATA CONSULTANCY SERVICES LIMITEDInventors: Sutapa Mondal, Saket Saurabh, Arun Ramamurthy, Mangesh Sharad Gharote, Sachin Premsukh Lodha
-
Publication number: 20230274022Abstract: Existing data residency compliance techniques suffer from inherent drawbacks to discover the spread of data, understanding the data residency regulations and semantics behind them and most importantly placement of data in cloud datacenters such that it is data residency compliant. Embodiments herein provide a method and system for optimizing placement of data to a cloud datacenter complying data residency regulations. The system selects one serving cloud datacenter for a user center. The selection considers three conflicting objectives such as minimum data placement cost, provide good quality of service (i.e. latency) and to comply with data residency regulations. The system essentially covers data residency compliance problem in three phases namely, violation detection, decision support and recommendation.Type: ApplicationFiled: May 26, 2022Publication date: August 31, 2023Applicant: Tata Consultancy Services LimitedInventors: Sutapa MONDAL, Shubhro Roy, Pankaj Kumar Sahu, Arun Ramamurthy, Mangesh Sharad Gharote, Sachin Premsukh Lodha
-
Publication number: 20220343000Abstract: This disclosure relates generally to data anonymization using clustering techniques. In Typically, data anonymization using global recoding can overgeneralize the data. However, preservation of information while anonymization the data is of equal importance as obscuring the relevant information that can be used by the attackers. The disclosed method and system utilized attribute taxonomy tree for generalization to optimize the generalization of the records. The disclosed method uses clustering-based approach and after clustering, each cluster is solved independently using ILP model for K-Anonymization. The ILP model is solved by generalizing the value of the attributes. Sometimes, even after clustering the number of possible patterns is large, thus the disclosed method generates patterns on the fly during multiple iterations.Type: ApplicationFiled: August 6, 2021Publication date: October 27, 2022Applicant: Tata Consultancy Services LimitedInventors: Saket SAURABH, Arun RAMAMURTHY, Sutapa MONDAL, Mangesh Sharad GHAROTE, Sachin Premsukh LODHA
-
Publication number: 20220300651Abstract: This disclosure relates generally to data anonymization and more particular y risk-aware data anonymization. Conventional data anonymization systems either replace PII/sensitive attributes with random values or shuffles them, that causes huge data distortion affecting the data utility. The goal of publishing data is best achieved when privacy is balanced with utility of data, Moreover, to ensure privacy, assessing the risk of disclosure is important. The proposed system provides a pipeline for analysis of data patterns to understand the associated risk level of re-identification of records. Further, based on the identified risks with the records the system anonymizes the data following a pattern based anonymization approach wherein data is clustered and for each cluster distinct patterns are identified such that the information loss is minimal.Type: ApplicationFiled: August 13, 2021Publication date: September 22, 2022Applicant: Tata Consultancy Services LimitedInventors: Sutapa MONDAL, Saket Saurabh, Arun Ramamurthy, Mangesh Sharad Gharote, Sachin Premsukh Lodha
-
Patent number: 10791133Abstract: This disclosure relates generally to malware detection, and more particularly to system and method for detecting and mitigating ransomware threats. For a User Equipment being monitored, the system performs a behavior analysis of corresponding file system to determine whether any anomalous behavior that would amount to a ransomware threat is associated with flies associated with the file system change, if present, then the system virtualizes the file system on the fly. If information pertaining to the identified anomalous behavior is present in any of the reference databases in the system, then all the I/O calls are terminated or the file system is virtualized for rest of the session. If data pertaining to the identified anomalous behavior is not found in any of the associated databases, then new behavioral features and structural patterns of the identified anomalous behavior and the associated processes are extracted, and the reference databases are updated accordingly.Type: GrantFiled: October 23, 2017Date of Patent: September 29, 2020Assignee: Tata Consultancy Services LimitedInventors: Manish Shukla, Sutapa Mondal, Sachin Premsukh Lodha
-
Patent number: 10599864Abstract: Systems and methods for sensitive audio zone rearrangement are provided that protects confidential and sensitive information such as user identifier during query processing and authentication. The sensitive information rearrangement system generates or permutes the actual user identifier in a privacy preserving manner. The sensitive information is extracted from an input being either a speech or DTMF tones, and a virtual user identifier is generated in real time, that is specific to a transaction to be performed, or a query initiation by a user in real-time. The sensitive information is rearranged which can be either DTMF tone or speech of user to generate the virtual user identifier.Type: GrantFiled: March 15, 2016Date of Patent: March 24, 2020Assignee: Tata Consultancy Services LimitedInventors: Sutapa Mondal, Sumesh Manjunath, Rohit Saxena, Manish Shukla, Purushotam Gopaldas Radadia, Shirish Subhash Karande, Sachin Premsukh Lodha
-
Patent number: 10296523Abstract: The present disclosure provides systems and methods to estimate Importance Measure (IM) and temporal Importance Measure (IM) for any type of data in a distributed enterprise network by involving direct and indirect stakeholders of the data in the estimation process. Firstly data type of the received data is identified. Data type plugins including pre-defined classes, IM matrix and Temporal IM matrix are loaded for the identified data type. Extracted features from the data are appropriately mapped against pre-defined classes and then the IM is estimated. Temporal IM is estimated taking into account the current time and the rate of change.Type: GrantFiled: March 4, 2016Date of Patent: May 21, 2019Assignee: Tata Consultancy Services LimitedInventors: Sumesh Manjunath, Manish Shukla, Sutapa Mondal, Rohit Saxena, Sachin Premsukh Lodha
-
Patent number: 10198322Abstract: The present disclosure provides systems and methods to optimize data backup in a distributed enterprise system by firstly generating a set of unique files from all the files available in the enterprise. A backup set comprising files to be backed up are then generated from the set of unique files and backup is scheduled in the order in which the files to be backed up are identified. Unique files are generated based on file sharing patterns and communications among users that enable generating a social network graph from which one or more communities can be detected and deduplication can be performed on the files hosted by client systems in these communities thereby conserving resources.Type: GrantFiled: March 11, 2016Date of Patent: February 5, 2019Assignee: Tata Consultancy Services LimitedInventors: Sumesh Manjunath, Manish Shukla, Sachin Premsukh Lodha, Rohit Saxena, Sutapa Mondal
-
Publication number: 20180115577Abstract: This disclosure relates generally to malware detection, and more particularly to system and method for detecting and mitigating ransomware threats. For a User Equipment being monitored, the system performs a behavior analysis of corresponding file system to determine whether any anomalous behavior that would amount to a ransomware threat is associated with flies associated with the file system change, if present, then the system virtualizes the file system on the fly. If information pertaining to the identified anomalous behavior is present in any of the reference databases in the system, then all the I/O calls are terminated or the file system is virtualized for rest of the session. If data pertaining to the identified anomalous behavior is not found in any of the associated databases, then new behavioral features and structural patterns of the identified anomalous behavior and the associated processes are extracted, and the reference databases are updated accordingly.Type: ApplicationFiled: October 23, 2017Publication date: April 26, 2018Applicant: Tata Consultancy Services LimitedInventors: Manish SHUKLA, Sutapa MONDAL, Sachin Premsukh LODHA
-
Publication number: 20170161516Abstract: Systems and methods for sensitive audio zone rearrangement are provided that protects confidential and sensitive information such as user identifier during query processing and authentication. The sensitive information rearrangement system generates or permutes the actual user identifier in a privacy preserving manner. The sensitive information is extracted from an input being either a speech or DTMF tones, and a virtual user identifier is generated in real time, that is specific to a transaction to be performed, or a query initiation by a user in real-time. The sensitive information is rearranged which can be either DTMF tone or speech of user to generate the virtual user identifier.Type: ApplicationFiled: March 15, 2016Publication date: June 8, 2017Applicant: Tata Consultancy Services LimitedInventors: Sutapa MONDAL, Sumesh MANJUNATH, Rohit SAXENA, Manish SHUKLA, Purushotam Gopaldas RADADIA, Shirish Subhash KARANDE, Sachin Premsukh LODHA
-
Publication number: 20170091306Abstract: The present disclosure provides systems and methods to estimate Importance Measure (IM) and temporal Importance Measure (IM) for any type of data in a distributed enterprise network by involving direct and indirect stakeholders of the data in the estimation process. Firstly data type of the received data is identified. Data type plugins including pre-defined classes, IM matrix and Temporal IM matrix are loaded for the identified data type. Extracted features from the data are appropriately mapped against pre-defined classes and then the IM is estimated. Temporal IM is estimated taking into account the current time and the rate of change.Type: ApplicationFiled: March 4, 2016Publication date: March 30, 2017Applicant: Tata Consultancy Services LimitedInventors: Sumesh Manjunath, Manish Shukla, Sutapa Mondal, Rohit Saxena, Sachin Premsukh Lodha
-
Publication number: 20160274976Abstract: The present disclosure provides systems and methods to optimize data backup in a distributed enterprise system by firstly generating a set of unique files from all the files available in the enterprise. A backup set comprising files to be backed up are then generated from the set of unique files and backup is scheduled in the order in which the files to be backed up are identified. Unique files are generated based on file sharing patterns and communications among users that enable generating a social network graph from which one or more communities can be detected and deduplication can be performed on the files hosted by client systems in these communities thereby conserving resources.Type: ApplicationFiled: March 11, 2016Publication date: September 22, 2016Applicant: Tata Consultancy Services LimitedInventors: Sumesh Manjunath, Manish Shukla, Sachin Premsukh Lodha, Rohit Saxena, Sutapa Mondal