CloudHaven

The vendor-neutral
“Users’ platform”

Better application usability, integration, security and rapid development by extracting/consolidating user data and functionality, seamlessly integrated via a UI-as-a-Service

The Problem

For Users
  • Data protection and privacy is required and difficult
  • Upper limit to number of logins, registration, data-entry
  • Poor integration between proprietary applications
  • Poor collaboration between users (too many isolated systems)
  • Too many different applications/UIs to learn
For Applications
  • Increasingly require Integration and collaboration (difficult to implement especially with vendor silos)
  • Redundant functionality (authentication, user management, UI, …)
  • Poor collaboration between users (isolated systems)
  • Growing security concerns

Solution: CloudHaven

The vendor-neutral, common “user platform”

Product: The CloudHaven User Platform

Features

Absolute Personal Data Privacy & Control

CloudHaven offers absolute personal data and privacy and control by means of data tokenization and sophisticated group permissions. Your data need never leave the CloudHaven platform.

Keep your eggs in one secure basket instead of thousands of baskets of varying security.

Messaging, Calendar, & File-sharing

CloudHaven offers common, universal user-related functions like messaging, file-sharing, calendars, alerts and more. You maintain full-control of your message, files, etc. because there is no concept of “sending” to another system – everything is shared via group permissions under your full control.

UI-as-a-Service

CloudHaven’s UIaaS enables rapid user-interface development, and is the key to making all other features of CloudHaven work. The UIaaS enables data tokenization, as well as seamless integration of application and CloudHaven-native components. The UIaaS offloads much of the UI development task including UI-related security concerns.

Seamless, Universal Collaboration

CloudHaven also offers seamless and easily implemented UI-integration between any combination of  personal data, messaging, file-sharing & viewing, applications and application components. The boundary between what is a message and what is an application component essentially disappears. 

Fraud Reduction

With every CloudHaven user identified, applications have better assurance that users are authentic, legitimate and trustworthy. Similarly, with every CloudHaven application vetted, every user has better assurance every CloudHaven-registered application is authentic, legitimate and trustworthy.

Better Security

With the CloudHaven model, subscribing applications never need be exposed directly to the Internet. Applications can connect to CloudHaven with a leased line or ultra secure VPN. Only CloudHaven’s UIaaS is actually exposed to the Internet. Users and applications no longer need worry about multiple points of security vulnerability across  multiple applications of varying security veracity.

CloudHaven Data Tokenization

Like “localization” but for personal data

Data tokenization is a powerful mechanism enabling the highest level of protection and control of personal data. With data tokenization, applications never need touch your data – they only handle tokens representing your data.

Owned by Everyone, for Everyone

CloudHaven is a multi-stakeholder cooperative organization owned and governed by all users and employees, not by a small group of majority shareholders. Any user can become a member owner of CloudHaven with a small membership fee which. One benefit of membership are regular cooperative patronage dividends.

Coming Soon

CloudHaven is currently under development by Cal Poly San Luis Obispo software engineering seniors as a capstone project for the 20/21 academic year.