Go Drive Net: A Unified Platform for Cloud Storage with Social Networking
Keywords:
Cloud Storage, Cloud Computing, Integrated Chat System, Collaboration Tools, Data Management, User ExperienceAbstract
In today’s digital age, cloud storage services have revolutionized the way data is stored, accessed, and shared across multiple devices and locations. The primary role of these platforms revolves around storage and access, and they are now vital in many areas. However, the rise of cloud computing has brought new challenges to researchers and professionals. Go Drive Net is being used in this study as a research tool to examine user data that persists after various methods of cloud storage, uploading, and accessing data are explored. Cloud Storage also provides a model as a storage service that provides storage facilities to the users via the Internet. By analyzing user software data, network connection captures, memory captures, and other available data. This study aims to provide experts and analysts with a deeper understanding of the types of data that remain on various devices. By connecting users, Go Drive Net not only improves productivity and collaboration but also provides data security through encryption technology. It also enables data renaming, deletion, sharing, migration, user search, and communication. As cloud computing continues to shape the future of IT, it enables organizations to respond to technological change more quickly, efficiently, and innovatively.
References
M. I. Malik, S. H. Wani, and A. Rashid, “CLOUD COMPUTING-TECHNOLOGIES,” Int. J. Adv. Res. Comput. Sci., vol. 9, no. 2, pp. 379–384, Apr. 2018, doi: 10.26483/IJARCS.V9I2.5760.
“Cloud Computing Market Size to Surpass USD 2297.37 Bn by 2032.” Accessed: Sep. 27, 2024. [Online]. Available: https://www.precedenceresearch.com/cloud-computing-market
M. Hashemi, S., Monfaredi, K., Masdari, “Using cloud computing for e-government: challenges and benefits,” Int. J. Comput. Information, Syst. Control Eng., vol. 7, no. 9, pp. 596–603, 2013.
“Google Drive: Share Files Online with Secure Cloud Storage | Google Workspace.” Accessed: Sep. 27, 2024. [Online]. Available: https://workspace.google.com/products/drive/
“Dropbox.com.” Accessed: Sep. 27, 2024. [Online]. Available: https://www.dropbox.com/
“Sign in - Microsoft OneDrive.” Accessed: Sep. 27, 2024. [Online]. Available: https://onedrive.live.com/login/
“iCloud.” Accessed: Sep. 27, 2024. [Online]. Available: https://www.icloud.com/
“Simple, Secure, Affordable Online Storage - ElephantDrive.” Accessed: Sep. 27, 2024. [Online]. Available: https://www.elephantdrive.com/
“Gofile - Your all-in-one storage solution.” Accessed: Sep. 27, 2024. [Online]. Available: https://gofile.io/welcome
P. Yang, N. Xiong, and J. Ren, “Data Security and Privacy Protection for Cloud Storage: A Survey,” IEEE Access, vol. 8, pp. 131723–131740, 2020, doi: 10.1109/ACCESS.2020.3009876.
I. Drago, E. Bocchi, M. Mellia, H. Slatman, and A. Pras, “Benchmarking personal cloud storage,” Proc. ACM SIGCOMM Internet Meas. Conf. IMC, pp. 205–211, 2013, doi: 10.1145/2504730.2504762/SUPPL_FILE/CRIMC092S.PDF.
E. Bocchi, I. Drago, and M. Mellia, “Personal cloud storage: Usage, performance and impact of terminals,” 2015 IEEE 4th Int. Conf. Cloud Networking, CloudNet 2015, pp. 106–111, Nov. 2015, doi: 10.1109/CLOUDNET.2015.7335291.
F. Daryabar, A. Dehghantanha, and K. K. R. Choo, “Cloud storage forensics: MEGA as a case study,” Aust. J. Forensic Sci., vol. 49, no. 3, pp. 344–357, May 2017, doi: 10.1080/00450618.2016.1153714.
F. Daryabar, A. Dehghantanha, B. Eterovic-Soric, and K. K. R. Choo, “Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices,” Aust. J. Forensic Sci., vol. 48, no. 6, pp. 615–642, Nov. 2016, doi: 10.1080/00450618.2015.1110620.
J. Botha, C. Van ’t Wout, J. Botha, C. Van ’t Wout, and L. Leenen, “A Comparison of Chat Applications in Terms of Security and Privacy Network Threats View project Ant Colony Induced Decision Trees for Intrusion Detection View project A Comparison of Chat Applications in Terms of Security and Privacy,” 2019, Accessed: Sep. 27, 2024. [Online]. Available: https://www.researchgate.net/publication/334537058
N. Modrzyk, “Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API,” Build. Telegr. Bots Dev. Bots 12 Program. Lang. using Telegr. Bot API, pp. 1–277, Jan. 2018, doi: 10.1007/978-1-4842-4197-4/COVER.
P. Bawane and A. P. Kannu, “Time varying sparse support recovery,” Signal Processing, vol. 161, pp. 214–226, Aug. 2019, doi: 10.1016/J.SIGPRO.2019.04.001.
J. S. Bianco, “Social Networking and Cloud Computing: Precarious Affordances for the ‘Prosumer,’” WSQ Women’s Stud. Q., vol. 37, no. 1, pp. 303–312, Mar. 2009, doi: 10.1353/WSQ.0.0146.
K. Chard, S. Caton, O. Rana, and K. Bubendorfer, “Social Cloud: Cloud computing in social networks,” Proc. - 2010 IEEE 3rd Int. Conf. Cloud Comput. CLOUD 2010, pp. 99–106, 2010, doi: 10.1109/CLOUD.2010.28.
C. C. Aggarwal, “An Introduction to Social Network Data Analytics,” Soc. Netw. Data Anal., pp. 1–15, 2011, doi: 10.1007/978-1-4419-8462-3_1.
“View of Cloud Computing Privacy Concerns in Social Networks.” Accessed: Sep. 27, 2024. [Online]. Available: https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/673/396
“Best Encrypted Messaging Apps of 2021 And Why You Should Use Them.” Accessed: Sep. 27, 2024. [Online]. Available: https://heimdalsecurity.com/blog/the-best-encrypted-messaging-Apps/
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 50SEA
This work is licensed under a Creative Commons Attribution 4.0 International License.