Real-Time Remote Document Sharing Platform

Authors

  • Purva Warhadkar Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author
  • Rasika Pande Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author
  • Ahzam Fazeel Uddin Khan Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author
  • Aniket Dhakate Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author
  • Ayush Zodape Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author
  • Gaurav Deshmukh Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author
  • Hemant Gowardipe Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author
  • Himanshu Gourkar Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author
  • Ajay A. Jaiswal Department of Computer Science and Engineering, KDK College of Engineering, Nagpur, Maharashtra, India Author

Keywords:

Real-Time File Management, cloud Storage, Google Drive API, OAuth 2.0, Email OTP Verification

Abstract

In the era of digital transformation, secure and efficient file management is paramount. This research proposes a Real-Time File Management System that leverages Google Drive API for cloud-based storage, ensuring scalability, reliability, and seamless accessibility. The system integrates email OTP verification and JWT authentication to enhance security, while OAuth 2.0 enforces secure API access. A dedicated admin panel enables comprehensive monitoring of user activity, storage utilization, file uploads, and session analytics, ensuring effective system oversight. Robust security mechanisms, including Role-Based Access Control (RBAC), SQL injection mitigation, XSS protection, and encrypted data transmission, safeguard sensitive data and prevent unauthorized access. Designed for future scalability, the system paves the way for multi-cloud storage integration and advanced encryption protocols, offering a highly secure and intelligent cloud-based file management solution.

Downloads

Download data is not yet available.

References

[1] A. K. Singh and I. Gupta, “Online information leaker identification scheme for secure data sharing,” Multimedia Tools Appl., vol. 79, no. 41, pp. 31165–31182, Nov. 2020.

[2] E. Zaghloul, K. Zhou, and J. Ren, “P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing,” IEEE Trans. Big Data, vol. 6, no. 4, pp. 804–815, Dec. 2020.

[3] I. Gupta and A. K. Singh, “GUIM-SMD: Guilty user identification model using summation matrix-based distribution,” IET Inf. Secur., vol. 14, no. 6, pp. 773–782, Nov. 2020.

[4] I. Gupta and A. K. Singh, “A framework for malicious agent detection in cloud computing environment,” Int. J. Adv. Sci. Technol., vol. 135, pp. 49–62, Feb. 2020.

[5] L. Zhang, Y. Cui, and Y. Mu, “Improving security and privacy attribute-based data sharing in cloud computing,” IEEE Syst. J., vol. 14, no. 1, pp. 387–397, Mar. 2020.

[6] I. Gupta and A. K. Singh, “SELI: Statistical evaluation-based leaker identification stochastic scheme for secure data sharing,” IET Commun., vol. 14, no. 20, pp. 3607–3618, Dec. 2020.

[7] Y. Li et al., “Fuzzy identity-based data integrity auditing for reliable cloud storage systems,” IEEE Trans. Dependable Secure Comput., vol. 16, no. 1, pp. 72–83, Jan./Feb. 2019.

[8] I. Gupta and A. K. Singh, “Dynamic threshold-based information leaker identification scheme,” Inf. Process. Lett., vol. 147, pp. 69–73, Jul. 2019.

[9] I. Gupta and A. K. Singh, “A probabilistic approach for guilty agent detection using bigraph after distribution of sample data,” Proc. Comput. Sci., vol. 125, pp. 662–668, Jan. 2018.

[10] S. Wang et al., “An efficient file hierarchy attribute-based encryption scheme in cloud computing,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1265–1277, Jun. 2016.

Downloads

Published

30-06-2025

Issue

Section

Original Research Articles

How to Cite

Real-Time Remote Document Sharing Platform. (2025). International Journal for Research Publication and Seminar, 16(1), 1069-1074. https://jrpsjournal.in/index.php/j/article/view/239

Similar Articles

11-20 of 171

You may also start an advanced similarity search for this article.