Real-Time Remote Document Sharing Platform
Keywords:
Real-Time File Management, cloud Storage, Google Drive API, OAuth 2.0, Email OTP VerificationAbstract
In the era of digital transformation, secure and efficient file management is paramount. This research proposes a Real-Time File Management System that leverages Google Drive API for cloud-based storage, ensuring scalability, reliability, and seamless accessibility. The system integrates email OTP verification and JWT authentication to enhance security, while OAuth 2.0 enforces secure API access. A dedicated admin panel enables comprehensive monitoring of user activity, storage utilization, file uploads, and session analytics, ensuring effective system oversight. Robust security mechanisms, including Role-Based Access Control (RBAC), SQL injection mitigation, XSS protection, and encrypted data transmission, safeguard sensitive data and prevent unauthorized access. Designed for future scalability, the system paves the way for multi-cloud storage integration and advanced encryption protocols, offering a highly secure and intelligent cloud-based file management solution.
Downloads
References
[1] A. K. Singh and I. Gupta, “Online information leaker identification scheme for secure data sharing,” Multimedia Tools Appl., vol. 79, no. 41, pp. 31165–31182, Nov. 2020.
[2] E. Zaghloul, K. Zhou, and J. Ren, “P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing,” IEEE Trans. Big Data, vol. 6, no. 4, pp. 804–815, Dec. 2020.
[3] I. Gupta and A. K. Singh, “GUIM-SMD: Guilty user identification model using summation matrix-based distribution,” IET Inf. Secur., vol. 14, no. 6, pp. 773–782, Nov. 2020.
[4] I. Gupta and A. K. Singh, “A framework for malicious agent detection in cloud computing environment,” Int. J. Adv. Sci. Technol., vol. 135, pp. 49–62, Feb. 2020.
[5] L. Zhang, Y. Cui, and Y. Mu, “Improving security and privacy attribute-based data sharing in cloud computing,” IEEE Syst. J., vol. 14, no. 1, pp. 387–397, Mar. 2020.
[6] I. Gupta and A. K. Singh, “SELI: Statistical evaluation-based leaker identification stochastic scheme for secure data sharing,” IET Commun., vol. 14, no. 20, pp. 3607–3618, Dec. 2020.
[7] Y. Li et al., “Fuzzy identity-based data integrity auditing for reliable cloud storage systems,” IEEE Trans. Dependable Secure Comput., vol. 16, no. 1, pp. 72–83, Jan./Feb. 2019.
[8] I. Gupta and A. K. Singh, “Dynamic threshold-based information leaker identification scheme,” Inf. Process. Lett., vol. 147, pp. 69–73, Jul. 2019.
[9] I. Gupta and A. K. Singh, “A probabilistic approach for guilty agent detection using bigraph after distribution of sample data,” Proc. Comput. Sci., vol. 125, pp. 662–668, Jan. 2018.
[10] S. Wang et al., “An efficient file hierarchy attribute-based encryption scheme in cloud computing,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1265–1277, Jun. 2016.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal for Research Publication and Seminar

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.