INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )
E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 11 NO. 4 2025
DOI: 10.56201/ijcsmt.vol.11.no4.2025.pg.78.93
Bioku Idris, Dr. Musa Sule Argungu, and Dr. Muhammad Saidu Ailero
This study proposes the development of an Android application for secure file transfer. The application will utilize a user-friendly, easy-to-set-up, and open-source file-sharing technique. It aims to provide users with the ability to easily host, store, backup, and retrieve data with high performance, ensuring file accessibility at any time without limitations. The motivation stems from users' lack of control and difficulty in remembering file names, contents, and locations, increasing the risk of data loss. The study will employ the Structured System Analysis and Design Methodology (SSADM). The resulting Android application is expected to enable users to share files via cloud networks conveniently. This application is intended to benefit various organizations, including enterprises, shopping malls, supermarkets, waste companies, and power holding companies.
A. Abdul-Rahman and S. Hailes, “A distributed trust model,” In Proceedings of the 1997 New
Security Paradigms Workshop, pp. 48-60, 1998.
A. Jøsang and R. Ismail, “The Beta Reputation System,” In Proceedings of the 15th Bled
Electronic Commerce Conference, pp. 17-19. June 2002.
A. J?sang and S. J. Knapskog, “A metric for trusted systems,” Global IT Security, pp. 541-549,
A. Marinos and G. Briscoe, “Community cloud computing,” in First International Conference
Cloud Computing, CloudCom, volume 5931 of Lecture Notes in Computer Science, pp.
472–484. Springer (2009).
Abidi, S.A.H., (1991). Information and Communication for development in Africa, Nairobi
Bessani, A., Correia, M., Quaresma, B., Andre, F., Sousa, P.: DepSky: Dependable and secure
storage in cloud-of-clouds. ACM Transactions on Storage 9(4) (2013)
Bessani, A., Mendes, R., Oliveira, T., Neves, N., Correia, M., Pasin, M., Verissimo, P.: SCFS: a
shared cloud-backed file system. In: Proceedings of the 2014 USENIX Annual Technical
Conference – ATC’14 (2014)
Bing, T., Schubert, R, and Siu, C. (2001), Web Information Monitoring for competitive
intelligence, Taylor and Francis Academic Information Journals, 33(3):235-251
Carter, Lemuria, and Belanger (2005), The Utilization of e-government services citizen trust,
innovation and acceptance factors. France Information Systems 15 (1), 5-25.
Chen Kang and Zen WeiMing, “Cloud computing: system instance and current research,” Journal
of Software, pp. 20(5):1337-1347. 2009.
Cohn, M. (2014). "Zoho Revamps Online Accounting Software". Accounting Today. Retrieved
29 January 2014.
Connolly,T., Begg, C., (2001), Database Management Information Systems
Debons, L., (1988). The right to access of information: A paper presented at theSCESCAL XI
Zomba, Malawi Library Association, p. 8
Donna, O. (2019). "What is horizontal portal? definition and meaning". BusinessDictionary.com.
Retrieved 8 August 2019.
Enrado, P. (2000). Staff and patient, Room and Resource scheduling systems, Healthcare
Grammatikou, M ., Stamatelopoulos, F., and Maglaris, B. (2003), Distributed information system
architecture for healthcare.
H. Takabi, J. B. D. Joshi, and G. Ahn, “Security and Privacy Challenges in Cloud Computing
Environments,” IEEE Security and Privacy, vol. 8, no. 6, pp. 24-31, Nov./Dec. 2010,
doi:10.1109/MSP.2010.186.
Harpreet, S.R. (2002),Transferring data between Heterogeneous databases using the web.
Hosea, (1995) Chapter 4, Verse 6, (King James Version).
http://www.healthcareitnews.com/new
Huan-Chung Li, Po-Huei Liang, Jiann-Min Yang, and Shiang-Jiun Chen, “Analysis on Cloud-
Based Security Vulnerability Assessment,” 2010 IEEE 7th International Conference on e-
Business Engineering (ICEBE), pp. 490-494, 2010.
Joch, A. (2000), Take the pain out of patient scheduling, Physician and Sport Medicine.
Johnson, R. and Mehra, S. (2002), Best practice complaint management, Academy of management
Executive, 16(4): 145-254.
Joseph M. Hellerstein, et al (2007), Architecture of Database System.
K. Popovic and Z. Hocenski, “Cloud computing security issues and challenges,” MIPRO, 2010
Proceedings of the 33rd International Convention, pp. 344-349, 24-28 May 2010 URL:
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumb
er=5533317&isnumber=5533310.
Kai Hwang, Sameer Kulkareni, and Yue Hu, “Cloud Security with Virtualized Defense and
Reputation-Based Trust Mangement,” 2009 Eighth IEEE International Conference on
Dependable, Autonomic and Secure Computing (DASC ’09), pp. 717-722, 2009.
Kai Hwang, Sameer Kulkareni, and Yue Hu, “Cloud Security with Virtualized Defense and
Reputation-Based Trust Mangement,” 2009 Eighth IEEE International Conference on
Dependable, Autonomic and Secure Computing (DASC), Chengdu, pp.717-722. China
Laudon, K. C., Laudon, J. D., (2002), Management Information Systems, Organization and
technology.
Lee, S.M. and Ssllani, A. (2001), A decision support system for health care services,Hospital
management Quarterly, 22(3):64-70.
Li Xiaoqi, Lyu M R, and Liu Jiangchuan. “A trust model based routing protocol for secure AD
Hoc network,” Proceedings of the 2004 IEEE Aerospace Conference, pp. 1286-1295. 2004.
M. Miller, Cloud Computing – Web-Based Applications That Change the Way You Work and
Collaborate Online, Que Publishing, Pearson Education, Canada 2008.
Michael, S. (2010). CPA Technology Advisor. "Building Strategy: How Workflow, Document
Management and Portals Work Together".
Michael, S. (2010). CPA Technology Advisor. "Building Strategy: How Workflow, Document
Management and Portals Work Together".
Minqi Zhou, Rong Zhang, Dadan Zeng, and Weining Qian, “Services in the cloud computing era:
a survey,” Software Engineering Institute. Universal Communication. Symposium (IUCS),
4th International. IEEE Shanghai, pp. 40-46. China. 978-1-4244-7821-7 (2010).
N. Santos, K. Gummadi, and R. Rodrigues, “Towards Trusted Cloud Computing,” Proc. HotCloud.
June 2009.
Nielsen, B. (1994), Management Information Systems, Michigan, U.S.A.
Oddi, A., and Cesta, A. (2000), toward interactive scheduling systems for managing Medical
Resources: Artificial intelligence in medicine, 20(2): 113-138.
P. Mell and T. Grance, "Draft nist working definition of cloud computing - v15," 21. Aug 2009.
P. Mell and T. Grance, The NIST Definition of Cloud Computing (Draft). National Institute of
Standards and Technology. http://csrc.nist.gov/groups/SNS/cloud-computing.2009. 30
may 2011.
Qingsong Wei, Bharadwaj Veeravalli, Bozhao Gong, Lingfang Zeng, and Dan Feng, “CDRM: A
Cost-Effective Dynamic Replication Management Scheme for Cloud Storage Cluster,”
2009 IEEE International Conference on Cluster Computing (CLUSTER), pp. 188-196,
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key
cryptosystems. Communications of the ACM 21(2) (1978)
Rodrigue, J. (2018). American Institute of CPAs. "The Rage Surrounding Client Portals".
S. P. Marsh, “Formalising Trust as a Computational Concept”, Ph.D. Thesis, University of Stirling,
S. Uppoor, M. Flouris, and A. Bilas, “Cloud-based synchronization of distributed file system
hierarchies,” Cluster Computing Workshops and Posters (CLUSTER WORKSHOPS),
IEEE International Conference, pp. 1-4. 2010.
Samuel, D. (2010). Journal of Accountancy. "Client Portals: A Secure Alternative to E-Mail".
Samuel, D. (2010). Journal of Accountancy. "Client Portals: A Secure Alternative to E-Mail".
Saucer, J. and Bruns, G. (1997), Knowledge-based Design of scheduling system in industry and
medicine, IEEE-expert, 12(1):24-31.
Sean, O. (2010). CPA Technology Advisor. "Building Strategy: How Workflow, Document
Management and Portals Work Together".
Sean, O. (2010). CPA Technology Advisor. "Building Strategy: How Workflow, Document
Management and Portals Work Together".
Seyle, T. (2014). "Expand Your Solo or Small Firm Practice Using Client Portals" (PDF). Law
Practise Today. Retrieved 29 January 2014.
Seyle, T. (2014). "Expand Your Solo or Small Firm Practice Using Client Portals" (PDF). Law
Practise Today. Retrieved 29 January 2014.
Stoner, J. (1995),Management 6th Edition, London, Prentice Hall
Susan, L. (2011). "What is vertical portal? definition and meaning". BusinessDictionary.com.
Retrieved 8 August 2011.
T. Beth, M. Borcherding, and B. Klein, “Valuation of trust in open networks,” In ESORICS 94.
Brighton, UK, November 1994.
T. Dillon, Chen Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 24th IEEE
International Conference on Advanced Information Networking and Applications (AINA),
pp. 27-33. Australia, 2010.
Vrable, M., Savage, S., Voelker, G.M.: BlueSky: A cloud-backed file system for the enterprise.
In: Proceedings of the 10th USENIX Conference on File and Storage Technologies –
FAST’12 (2012)