Securing Resources in Decentralized Cloud Storage

Main Article Content

Siddharth Mohite, Girish Bisane, Karan Bagle

Abstract

Customers can get compute and storage services via a cloud computing environment, which is composed of configurable large-scale data form based. A cloud provider, often termed as a cloud infrastructure, is a corporation that controls and operates genuine cloud computing systems for the objective of giving solutions to other organisations. The barrier to entry is much larger owing to the financial investment involved as well as considerable inefficiency generated by invoicing and administration. Small organisations, on the other hand, may save money and gain agility by using shared computing including virtualization, and deployments are well underway. Cloud - based solutions offer large-scale "elastic" platforms for high-performance computation that can adjust to the demands of users and applications. A scalable grouping of large amounts of data server clusters is a cloud computing technique. Cloud technology is a simple yet commonly used technology that allows users to store big amounts of information safely and securely. The current cloud computing system is constructed in a centralised fashion, as per the research; all data nodes must be indexed by a master server, and that might be a bottleneck in the platform. This project created a working prototype of a revolutionary decentralised cloud based architecture (there is no centralization, which is why it was developed in Peer to Peer). The suggested system, which would be based on a unique architecture, promotes scalability and high availability in a virtualized architecture where requests and responses are sent between clients and chunk providers via a Gateways. The proposed system allows anyone to use multiple chunk web server and multiple servers; this atmosphere (client) can submit a suggestion for dispatching an internet; it also implements a cross-technology platform with a cloud-based environment; and, finally, it recommends a technique that takes the "Advance Encryption Standard" to provide security in the foe.


Cloud technology, low latency, peer-to-peer (P2P), multi-agent systems, virtualization, encryption, cluster, as well as server storage are just a few of the terms used in this research

Article Details

Section
Articles