谷歌云存储使用倾斜手势

A. Prasad, G. P. Mohole, K. Deore, Rajani Shukla, Kiran Thete
{"title":"谷歌云存储使用倾斜手势","authors":"A. Prasad, G. P. Mohole, K. Deore, Rajani Shukla, Kiran Thete","doi":"10.1109/ICAECCT.2016.7942609","DOIUrl":null,"url":null,"abstract":"The awareness is to upload and download the files into cloud using gesture. Several types of file can be uploaded into cloud such as picture, video, pdf or any kind of confidential document. This is proficient using an application analogous to gallery. To accomplish the chore the application is raised to view a particular picture or video which we want to upload. Once the device is slanted from its real inspecting position in the downward direction within a extent of two instants, the gesture is acknowledged and presently viewed file is uploaded into cloud. Cloud storage services have become progressively popular. Henceforth, in excess of this application the files can be uploaded into cloud over a tilt gesture effortlessly and meritoriously. While storing files into cloud user is concerned about privacy. For securing data, several cloud storage encryption systems have been have anticipated to defend data from those who do not have admittance. All such systems presumed that cloud storage earners are innocuous and hacking is not possible. Subsequently professionals cannot tell the acquired secrets are true or false. The cloud storage suppliers make sure that the handler's confidentiality is quiet securely conveyed. Certain consultants may divert the communication among Consumers and cloud storage suppliers and at that moment induce storage suppliers to issue user confidences by using régime authority. We ruminate the problem of edifice a secure cloud storage service on top of a public cloud structure where the service earner is not completely reliable by the customer. We familiarize a new scheme for the security in cloud using key protocol. This system creates a key for every user who have access to the file on the cloud server. Then this system is based on key protocol, the coercers will not be able to attack the file thus preserving a high security.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"380 1","pages":"338-342"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Google Cloud Storage using tilt gesture\",\"authors\":\"A. Prasad, G. P. Mohole, K. Deore, Rajani Shukla, Kiran Thete\",\"doi\":\"10.1109/ICAECCT.2016.7942609\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The awareness is to upload and download the files into cloud using gesture. Several types of file can be uploaded into cloud such as picture, video, pdf or any kind of confidential document. This is proficient using an application analogous to gallery. To accomplish the chore the application is raised to view a particular picture or video which we want to upload. Once the device is slanted from its real inspecting position in the downward direction within a extent of two instants, the gesture is acknowledged and presently viewed file is uploaded into cloud. Cloud storage services have become progressively popular. Henceforth, in excess of this application the files can be uploaded into cloud over a tilt gesture effortlessly and meritoriously. While storing files into cloud user is concerned about privacy. For securing data, several cloud storage encryption systems have been have anticipated to defend data from those who do not have admittance. All such systems presumed that cloud storage earners are innocuous and hacking is not possible. Subsequently professionals cannot tell the acquired secrets are true or false. The cloud storage suppliers make sure that the handler's confidentiality is quiet securely conveyed. Certain consultants may divert the communication among Consumers and cloud storage suppliers and at that moment induce storage suppliers to issue user confidences by using régime authority. We ruminate the problem of edifice a secure cloud storage service on top of a public cloud structure where the service earner is not completely reliable by the customer. We familiarize a new scheme for the security in cloud using key protocol. This system creates a key for every user who have access to the file on the cloud server. Then this system is based on key protocol, the coercers will not be able to attack the file thus preserving a high security.\",\"PeriodicalId\":6629,\"journal\":{\"name\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"volume\":\"380 1\",\"pages\":\"338-342\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECCT.2016.7942609\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCT.2016.7942609","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

意识是通过手势上传和下载文件到云端。有几种类型的文件可以上传到云端,如图片、视频、pdf或任何类型的机密文件。这是熟练使用类似于画廊的应用程序。为了完成这项工作,应用程序被启动以查看我们想要上传的特定图片或视频。一旦设备在两秒钟内从实际检测位置向下倾斜,该手势就会被识别,当前查看的文件就会被上传到云端。云存储服务日益普及。从此以后,除了这个应用程序之外,文件可以通过倾斜手势毫不费力地上传到云端。在将文件存储到云端时,用户担心隐私问题。为了确保数据的安全,一些云存储加密系统已经被预期可以保护那些没有权限的人的数据。所有这些系统都假定云存储收入是无害的,黑客攻击是不可能的。随后,专业人士无法分辨获得的秘密是真是假。云存储供应商确保处理程序的机密性被安静安全地传递。某些顾问可能会转移消费者和云存储供应商之间的沟通,并在此时诱使存储供应商利用汇汇制授权发布用户保证书。我们反复思考在公共云结构之上建立一个安全的云存储服务的问题,在这个结构中,服务提供者对客户来说不是完全可靠的。介绍了一种利用密钥协议实现云安全的新方案。该系统为访问云服务器上文件的每个用户创建一个密钥。该系统是基于密钥协议的,保证了文件的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Google Cloud Storage using tilt gesture
The awareness is to upload and download the files into cloud using gesture. Several types of file can be uploaded into cloud such as picture, video, pdf or any kind of confidential document. This is proficient using an application analogous to gallery. To accomplish the chore the application is raised to view a particular picture or video which we want to upload. Once the device is slanted from its real inspecting position in the downward direction within a extent of two instants, the gesture is acknowledged and presently viewed file is uploaded into cloud. Cloud storage services have become progressively popular. Henceforth, in excess of this application the files can be uploaded into cloud over a tilt gesture effortlessly and meritoriously. While storing files into cloud user is concerned about privacy. For securing data, several cloud storage encryption systems have been have anticipated to defend data from those who do not have admittance. All such systems presumed that cloud storage earners are innocuous and hacking is not possible. Subsequently professionals cannot tell the acquired secrets are true or false. The cloud storage suppliers make sure that the handler's confidentiality is quiet securely conveyed. Certain consultants may divert the communication among Consumers and cloud storage suppliers and at that moment induce storage suppliers to issue user confidences by using régime authority. We ruminate the problem of edifice a secure cloud storage service on top of a public cloud structure where the service earner is not completely reliable by the customer. We familiarize a new scheme for the security in cloud using key protocol. This system creates a key for every user who have access to the file on the cloud server. Then this system is based on key protocol, the coercers will not be able to attack the file thus preserving a high security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信