Proceedings of the 13 th INDIACom; INDIACom-2019; IEEE Conference ID: 46181 2019 6 th International Conference on “Computing for Sustainable Global Development”, 13 th 15 th March, 2019 Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA) Blockchain Distributed Cloud Storage Network Tool (BCCNT) Rishabh Bansal JIMS Rohini Sector - 5 New Delhi, INDIA Email Id: rishab.bansal400@gmail.com Nimish Niret Soren JIMS Rohini Sector - 5 New Delhi, INDIA Email Id: nimish.n.soren@gmail.com Ankita Sharma JIMS Rohini Sector - 5 New Delhi, INDIA Email Id: ankita.sharma@jimsindia.org AbstractBCCNT (Blockchain Cloud Network Tool) is open source project to make cloud storage applications decentralized which will make them secure and efficient for the end users. It provides a platform for the prototype of a completely distributed network. It is proposed to develop an application which can provide a user interface for less technical/non-technical users. The cryptocurrencies functions both as a bonus and payment method. While on the other hand a separate blockchain is used to store the data for the metadata file. The application needs to be run in a P2P mesh from systems that will execute the code, present on a public chain of data instead of a central database. The main thought behind BCCNT is to offer a group of functions which makes it easy to connect Cloud & major platformsand end users. KeywordsDecentalizez; Cryptocurrencies;P2P I. INTRODUCTION Cloud storage might be a sales terms for many people and organizations which exploits the popular search for new. Cloud is still heard like a new technology as compared to web3.0, client-server integration, service. Renaming of current technology simply mis-directions. When the information is put in a cloud storage facility, then the information is transmitted via the Transmission Control Protocol from the buyer’s PC to a host server. This is a consistent client-n-server model that is being used from the days of mainframe. The end-systems then replicates itself to different end-systems to follow the network standards & configuration policies, creating 3 transcripts per square meter. The present-day model of cloud storage network is operated by central facilities which measure the amount of data entrusted with non-public information which is inherently insecure is many ways. Hackers and sensors are copying or destroying the knowledge stored in the user’s servers through policy, legal & technology. The difference among the above- mentioned three classes has grown clearer. The secrecy and corporate data protection are accomplished only if out of sight knowledge storage is protected from attacks emanating from each class and used in each class. If it is easily recognizable central points of attack are incorporated into the model, this can be solved by decentralization and automation. Vulnerabilities in the current cloud storage model are the payment methods that are currently widely used in almost every cloud storage provider. These payment methods are neither personal nor information secured as most of the internet-based payment technologies stores and expires the information about both, the cashier and recipient. In today’s world need of a cloud storage model that must support trust between the user and the host. Information of the end user must be secured and encrypted together with computer’s file name, date, and alternate data before transferring from the end user s’ system to the cloud. But there is never a concentrated purpose of mistreating political vectors of attack. Payment for each information provider and the buyer can be automatic and generated in anonymous cryptocurrency. It’s about time that cloud becomes a swarm made up of a huge amount of extra information filled droplets that are removed additionally as the swarm forms, shifts, and evolves. The all- embracing style principles, enables a redistributed network which is renowned from years. For e.g., Maidsafe[1] and Tornet[2] have defined doable results. But, attaining the security, quantifiability, and value potency of the redistributed storage mesh would force a code of large technical complexness. We should style the systems associate degreed network in a very secured style as we can’t bet on the network or the systems themselves. Systems in between the lines of communication must join to attain the degree of superfluousness & presentation of current networks. Furthermore, our code should pass itself and while no human interference in each functional or financial view, which is associated in an unmanaged atmosphere, this is a big difference from current cloud networks. Fig. 1. Standard Model for Cloud Applications These rules are doable employing a sequence of current techs that exist like Resilio [3], Bitcoin [4], a common key encoding and cryptographic functions. BCCNT anticipates to change the evolution of a decentralized storage mesh by permitting connection with existing ASCII text file projects in an exceedingly standard fashion. This type of network should be designed additively, and with computer code that comprises of practical, simply similar components that holds a good style Copy Right © INDIACom-2019; ISSN 0973-7529; ISBN 978-93-80544-32-8 621