In this paper, we present the concept of using a Raspberry Pi as the main computer. This human en... more In this paper, we present the concept of using a Raspberry Pi as the main computer. This human enhancement is voice controlled, uses a camera module to interact with the outside world and process the retrieved information for real-time use by the wearer. It uses this augmentation as a brain-computer interface to connect to the web, extract and process information from the physical world. As a forward stride in wearable technology, this device intends to employ the disciplines of speech synthesis, cloud computing and image processing in order to serve the user as a primary portable computer that is voice-enabled and always ready for interaction.
International Journal of Research in Advent Technology, 2019
Cloud computing is becoming popular paradigm for storage and computing purpose for big and small ... more Cloud computing is becoming popular paradigm for storage and computing purpose for big and small organizations. Even though cloud supports pay-as-you-go model with saving on infrastructure, hardware and software cost of organizations it has disadvantages like various vulnerabilities and threats to user's information. File access mechanism is an technique to guarantee the file safety in the cloud. On the other hand, due to file farm out and untrusted cloud servers the file access mechanism develops security concerns in cloud storage systems. Malicious system administrator at cloud storage is becoming most difficult attack to stop as he has full access to the user data. In proposed system, we have implemented secure cloud storage for multi-cloud environment where instead of keeping user's data in single cloud environment it can be fragmented into different chunks and these chunks can be encrypted and stored in multiple cloud along with metadata which can be used during access of the files.
International Journal of Research in Advent Technology, 2019
Cloud based storage services are most popular among organizations due to its high computing power... more Cloud based storage services are most popular among organizations due to its high computing power at low cost with saving in IT infrastructure. Major threat found by organizations before storing data in public cloud storage is security of the information stored. Even after strong provision of various security mechanism at various cloud service level, still full security is not achieved yet. Malicious system administrator can access data of any organization. Our proposed solution deals with the cloud storage security issues by distributing trust and security of user's data among multiple clouds by distributing fragmented data among them. Since no entity will get complete set of data at any instance of time hence system is secure and reliable.
Cloud computing and the cloud based services like storage and application are the most demanding ... more Cloud computing and the cloud based services like storage and application are the most demanding resources over the internet from few years. With better network or internet connectivity these become very easy tools for remotely managing the information and the files. As the system introduced it comes along with multiple issues and threats also. Even after having better network security mechanism, data protection algorithm, information privacy system service provider can’t ensure full proof solution for information security. Let’s ignore the security about the network transfer and other part; finally file resides at particular storage with company ownership which may be called storage service provider and the company employee with higher authorities having always access to customer’s files. Here the proposed solution deals with the malicious user attack security and prevent file access by utilizing the multiple cloud environment for storing files.
Uploads
Papers by Manoj Bramhe