- Data protection and privacy is required and difficult
- Upper limit to number of logins, registration, data-entry
- Poor integration between proprietary applications
- Poor collaboration between users (too many isolated systems)
- Too many different applications/UIs to learn
- Increasingly require Integration and collaboration (difficult to implement especially with vendor silos)
- Redundant functionality (authentication, user management, UI, …)
- Poor collaboration between users (isolated systems)
- Growing security concerns
The vendor-neutral, common “user platform”
Product: The CloudHaven User Platform
Absolute Personal Data Privacy & Control
CloudHaven offers absolute personal data and privacy and control by means of data tokenization and sophisticated group permissions. Your data need never leave the CloudHaven platform.
Keep your eggs in one secure basket instead of thousands of baskets of varying security.
Messaging, Calendar, & File-sharing
CloudHaven offers common, universal user-related functions like messaging, file-sharing, calendars, alerts and more. You maintain full-control of your message, files, etc. because there is no concept of “sending” to another system – everything is shared via group permissions under your full control.
CloudHaven’s UIaaS enables rapid user-interface development, and is the key to making all other features of CloudHaven work. The UIaaS enables data tokenization, as well as seamless integration of application and CloudHaven-native components. The UIaaS offloads much of the UI development task including UI-related security concerns.
Seamless, Universal Collaboration
CloudHaven also offers seamless and easily implemented UI-integration between any combination of personal data, messaging, file-sharing & viewing, applications and application components. The boundary between what is a message and what is an application component essentially disappears.
With every CloudHaven user identified, applications have better assurance that users are authentic, legitimate and trustworthy. Similarly, with every CloudHaven application vetted, every user has better assurance every CloudHaven-registered application is authentic, legitimate and trustworthy.
With the CloudHaven model, subscribing applications never need be exposed directly to the Internet. Applications can connect to CloudHaven with a leased line or ultra secure VPN. Only CloudHaven’s UIaaS is actually exposed to the Internet. Users and applications no longer need worry about multiple points of security vulnerability across multiple applications of varying security veracity.
CloudHaven Data Tokenization
Like “localization” but for personal data
Data tokenization is a powerful mechanism enabling the highest level of protection and control of personal data. With data tokenization, applications never need touch your data – they only handle tokens representing your data.
Owned by Everyone, for Everyone
CloudHaven is a multi-stakeholder cooperative organization owned and governed by all users and employees, not by a small group of majority shareholders. Any user can become a member owner of CloudHaven with a small membership fee which. One benefit of membership are regular cooperative patronage dividends.
CloudHaven is currently under development by Cal Poly San Luis Obispo software engineering seniors as a capstone project for the 20/21 academic year.