Proceedings of the 13
th
INDIACom; INDIACom-2019; IEEE Conference ID: 46181
2019 6
th
International Conference on “Computing for Sustainable Global Development”, 13
th
–15
th
March, 2019
Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Blockchain Distributed Cloud Storage Network Tool
(BCCNT)
Rishabh Bansal
JIMS Rohini Sector - 5
New Delhi, INDIA
Email Id: rishab.bansal400@gmail.com
Nimish Niret Soren
JIMS Rohini Sector - 5
New Delhi, INDIA
Email Id: nimish.n.soren@gmail.com
Ankita Sharma
JIMS Rohini Sector - 5
New Delhi, INDIA
Email Id: ankita.sharma@jimsindia.org
Abstract— BCCNT (Blockchain Cloud Network Tool) is open
source project to make cloud storage applications decentralized
which will make them secure and efficient for the end users. It
provides a platform for the prototype of a completely distributed
network. It is proposed to develop an application which can
provide a user interface for less technical/non-technical users. The
cryptocurrencies functions both as a bonus and payment method.
While on the other hand a separate blockchain is used to store the
data for the metadata file. The application needs to be run in a P2P
mesh from systems that will execute the code, present on a public
chain of data instead of a central database. The main thought
behind BCCNT is to offer a group of functions which makes it easy
to connect Cloud & major platforms’ and end users.
Keywords— Decentalizez; Cryptocurrencies;P2P
I. INTRODUCTION
Cloud storage might be a sales terms for many people and
organizations which exploits the popular search for new. Cloud
is still heard like a new technology as compared to web3.0,
client-server integration, service. Renaming of current
technology simply mis-directions. When the information is put
in a cloud storage facility, then the information is transmitted
via the Transmission Control Protocol from the buyer’s PC to a
host server. This is a consistent client-n-server model that is
being used from the days of mainframe. The end-systems then
replicates itself to different end-systems to follow the network
standards & configuration policies, creating 3 transcripts per
square meter. The present-day model of cloud storage network
is operated by central facilities which measure the amount of
data entrusted with non-public information which is inherently
insecure is many ways. Hackers and sensors are copying or
destroying the knowledge stored in the user’s servers through
policy, legal & technology. The difference among the above-
mentioned three classes has grown clearer. The secrecy and
corporate data protection are accomplished only if out of sight
knowledge storage is protected from attacks emanating from
each class and used in each class. If it is easily recognizable
central points of attack are incorporated into the model, this can
be solved by decentralization and automation. Vulnerabilities in
the current cloud storage model are the payment methods that
are currently widely used in almost every cloud storage
provider. These payment methods are neither personal nor
information secured as most of the internet-based payment
technologies stores and expires the information about both, the
cashier and recipient.
In today’s world need of a cloud storage model that must
support trust between the user and the host. Information of the
end user must be secured and encrypted together with
computer’s file name, date, and alternate data before
transferring from the end user s’ system to the cloud. But there
is never a concentrated purpose of mistreating political vectors
of attack. Payment for each information provider and the buyer
can be automatic and generated in anonymous cryptocurrency.
It’s about time that cloud becomes a swarm made up of a huge
amount of extra information filled droplets that are removed
additionally as the swarm forms, shifts, and evolves. The all-
embracing style principles, enables a redistributed network
which is renowned from years. For e.g., Maidsafe[1] and
Tornet[2] have defined doable results. But, attaining the
security, quantifiability, and value potency of the redistributed
storage mesh would force a code of large technical
complexness. We should style the systems associate degreed
network in a very secured style as we can’t bet on the network
or the systems themselves. Systems in between the lines of
communication must join to attain the degree of superfluousness
& presentation of current networks. Furthermore, our code
should pass itself and while no human interference in each
functional or financial view, which is associated in an
unmanaged atmosphere, this is a big difference from current
cloud networks.
Fig. 1. Standard Model for Cloud Applications
These rules are doable employing a sequence of current
techs that exist like Resilio [3], Bitcoin [4], a common key
encoding and cryptographic functions. BCCNT anticipates to
change the evolution of a decentralized storage mesh by
permitting connection with existing ASCII text file projects in
an exceedingly standard fashion. This type of network should
be designed additively, and with computer code that comprises
of practical, simply similar components that holds a good style
Copy Right © INDIACom-2019; ISSN 0973-7529; ISBN 978-93-80544-32-8 621