File Sharing Techniques in Digital world
DOI:
https://doi.org/10.26438/ijcse/v8i5.149154Keywords:
Apache Kafka, Elastic Stack, Filebeat, Logstash, Elasticsearch, Kibana, IoTAbstract
File sharing is the exchange of computerized data for example computer programs, audio or video records, documents or electronic books over the web with others. There are many ways of file sharing. Some of them are, Peer-toPeer, Cloud storage service and Removable storage media. Peer-to-peer involves computer hardware and software to communicate without the need for a central server. Cloud storage service is like peer-to-peer file sharing. Notwithstanding, rather than sending the document straightforwardly to the others, the record is sent to a server that stores the record. When the document is put away in the cloud (on the web), we can allow different clients can download it by providing them the link of file. Removable storage media is vast different from other two ways. File sharing is done physically by the user with the help of any storage devices. In this work, we are going to see the different file sharing techniques used in this digital world.
References
[1] Bhagat, A., Chaudhari, R., & Dongre, K., “Content based File Sharing in Peer-to-peer Networks Using Threshold”, Procedia Computer Science, 79, 53–60, 2016.
[2] Shen, H., Li, Z., & Chen, K., “Social-P2P: An Online Social Network Based P2P File Sharing System”, IEEE Transactions on Parallel and Distributed Systems, 26(10), 2874–2889, 2015.
[3] Wang, H., Wang, F., Liu, J., Lin, C., Xu, K., & Wang, C., “Accelerating peer-to-peer file sharing with social relations”, IEEE Journal on Selected Areas in Communications, 31(9),66–74, 2013.
[4] Park, J. E., & Park, Y. H., “Fog-based file sharing for secure and efficient file management in personal area network with heterogeneous wearable devices” Journal of Communications and Networks, 20(3), 279–290, 2018.
[5] Lin, J. W., & Yang, M. F., “ Robust super-peer-based P2P file-sharing systems” Computer Journal, 53(7), 951–968, 2010
[6] Gaeta, R., & Sereno, M., “ Generalized probabilistic flooding in unstructured peer-to-peer networks”, IEEE Transactions on Parallel and Distributed Systems, 22(12), 2055–2062, 2011.
[7] Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J., “ Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage”, IEEE Transactions on Information Forensics and Security, 14(2), 331–346, 2018.
[8] Ali, M., Malik, S. U. R., & Khan, S. U., “DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party”, IEEE Transactions on Cloud Computing, 5(4), 642–655, 2015.
[9] Ritzdorf, H., Soriente, C., Karame, G. O., Marinovic, S., Gruber, D., & Capkun, S., "Toward shared ownership in the cloud”, IEEE Transactions on Information Forensics and Security, 13(12), 3019–3034, 2018.
[10] Wei, J., Liu, W., & Hu, X., “Secure data sharing in cloud computing using revocable-storage identity-based encryption”, IEEE Transactions on Cloud Computing, 6(4), 1136–1148, 2018.
[11] Thilakanathan, D., Chen, S., Nepal, S., & Calvo, R., “SafeProtect: Controlled Data Sharing with User-Defined Policies in Cloud-Based Collaborative Environment”, IEEE Transactions on Emerging Topics in Computing, 4(2), 301–315, 2016.
[12] S. Bansal, “Data Security by Steganography: A Review”, International Journal of Scientific Research in Network Security and Communication, Vol.7(1), Apr 2019.
[13] Marripelli Koteshwar, Bipin Bihari Jaya Singh, “Survey Report on Cyber Crimes and Cyber Criminals Get Protected from Cyber Crimes: Review Paper”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.6, pp.46-56, 2019.
[14] Shailja Sharma, Sheeba Khan, “Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)”, International Journal of Scientific Research in Network Security and Communication, Volume-7, Issue-1, 2019.
[15] N. SelvaKumar, M. Rohini, C. Narmada, M. Yogeshprabhu, “Network Traffic Control Using AI”, International Journal of Scientific Research in Network Security and Communication, Vol.8, Issue.2, 2020.
[16] Kanimozhi.J, Balla Sri Satya, Dharni Pryanka.S, Susela .J, “ Javabot - Chatterbot Using Java to Assist Healthtip, Share market and Sports Updates”, International Journal of Application or Innovation in Engineering & Management, Volume 8, Issue 4, 2019.
[17] J. Kanimozhi, V. Swathilakshmi, P. Bhavani, V. Vijayalakshmi, “NOTY BOT - A Personal Assistant that Integrates the Updates” , Information Technology & Electrical Engineering, vol 9, issue 1, 2020.
[18] Amin, R., Sherratt, R. S., Giri, D., Islam, S. H., & Khan, M. K., “A software agent enabled biometric security algorithm for secure file access in consumer storage devices”, IEEE Transactions on Consumer Electronics, 63(1), 53–61, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
