SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3154
Cloud Storage System like Dropbox
Devendra patil1, Prof. Smita Pai2, Tanvi Mhatre3, Shraddha Khavnekar4
1,3,4 Dept. of Information Technology Engineering, Terna Engineering College, Maharashtra, India
2Prof. Dept. of Information Technology Engineering, Terna Engineering College, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The carried-out application is a cloud-based
software observed by using NetworkConnectedStorage(NAS)
architecture that is focused on providing documents via net
utility. Network Connected Storage NAS is a report-degree
storage architecture that makes data stored on networked
devices more accessible. One of the three main storage
architectures is NAS — alongside garage place networks
(SAN) and direct-attached storage (DAS). NASoffersnetworks
a single get entry to factor for storage with built-inprotection,
control, and fault-tolerant abilities. We do a few activities on
this online program, such as creating, uploading, updating,
deleting, and searching documents. Web browser is
responsible where commonplace business programs on the
line are accessed using usual cloud computing. Servers store
all the software program and the data. These are broadly
divided into 3 categories: Infrastructure as a service (IaaS),
Platform as a service (PaaS), and software as a service (SaaS).
According to pay by use basis, this style of virtualized assets
provided with service over internet.
Key Words: Unbox, Network File Storage, own cloud
storage, Performance, Cost
1. INTRODUCTION
1.1 Project Summary:
A net based pc era is considered to be as "Cloud Computing".
A cloud image which was use to symbolizetheinternetalong
with flowchart and diagrams emerged the name cloud
computing. To organize the files in a proper orderly manner
& to enhance the storage space for this data are the Goals.
Abstraction of details from the user who don’t want to move
into the understanding of, or the expertise required or
managing the technology architecture within thecloud.This
is considered a far paradigm shift. The goal of our project is
to store and synchronized files. It provides document and
folder backup, and we may view our data from multiple
devices at any time and from anywhere. Regular virtualized
assets with dynamic and scalable delivery are carried over
the internet. Our project is initiated to tackle the need for
storage faced by most users. Our system will be a Cloud
based Storage web application named ‘Unbox’. This Cloud
Storage System will be cost efficient. To be able to operate
and access this system, users have to accept our terms and
policies to proceed. Our system will ensure privacy and
disaster recovery by providing Backup Plans. This web
application will have a dashboard page where users will be
able to access all the upload easily. We will also try to come
up with new features in the future. Project Features consists
of pages which are Dashboard, Sign up, Login, Forgot
password. Users will be able to create Folders, download,
upload, delete, add to favorites/starred and arrangethefiles
he desires. Also, they will be able to Search the files he
uploaded, through search Bar. If User is having difficulties
using our application, he can contact ourhelpcenter.Type of
Users we have are Normal users using Unbox basic
Unlimited Initial storage free fornormal users. Adminwill be
having Special Privileges of adding and removing members,
monitoring sharing activity, protecting company data,
overseeing billing Information,verifyingusers.Inthe profile,
User can change his settings or keep a track of his profile
which includes General, Notifications, Security, Connected
Apps. Admin should be able to define the Types of files
accepted: Documents, Videos, Music/Voice, Excel,
presentations, Images. Secure login, offline access, and file
restore are all included. It also allows for file encryption and
decryption while delivering files from one user to another.
1.2 Motivation:
The reason behind the motivation for this project is the
Difficulties user face when backing up and running out of
space while storing data. To tackle this problem and coming
up with new features we proposed this system.
2. EXISTING SYSTEM
2.1 Creating a File Storage Service Similar to
Dropbox:
We offer a reference framework for a Dropbox-like file
storage system in this study by identifying its essential
components and communication protocols. We also show
how our Dropbox-like file storage system may be put on the
Cloud, as well as a deployment architecture. We chose
Amazon as a Cloud Provider to carry out a feasible
implementation. We have also evaluated key performance
metrics by presenting hypothetical scenarios. Optimal
assumptions and estimates of user traffic and data storage
utilization are madeinthepaper.Inaddition,costparameters
of cloud resources are evaluated with the actual dollar-
values, based on thepricinginformationavailableonAmazon
Web Services.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3155
2.2 System design for cloud data storage and
processing:
The data storage and processing system based on cloud
computing may employ a cloud server as thecore,synthesize
sensor data, and provide data storage and computing
capabilities to customers. This study enables cloud storage
and cloud computing processing of remote important
environment information and dynamic presentation of real-
time / historical data in Android client by combining
GPRS/Wireless Fidelity era with Ali cloud server. The
experimental findings show that the systemisstableandthat
the data is trustworthy.
2.3 A Cloud Computing Data Storage and Security
Survey:
Cloud computing is expected to become the next generation
of IT architecture. Cloud computing distributes application
software and data bases to massive data centers, where
information and service management may notbecompletely
honest. This creates a slew of new security issues that have
yet to be fully addressed. In this work, we focus on features
for ensuring data storage security in the cloud, as well as
architecture for data storage that might be carried out by
other cloud service providers, and critical points for
establishing data storage security.
3. PROPOSED METHODOLOGY
3.1 Context Diagram:
Fig- 1 Context Diagram
User will upload and edit files the unbox cloud storage
system
Own cloud storage server is the storage used for storing all
types of data
Admin will manage system data of the cloud storage
Admin will manage user data
3.2 Architecture of system
Fig- 2 Architecture of system
As shown in the above architecture diagram (Fig.2),
Components
User: user will open the website with internet connectivity.
User will register or sign in to our web application.
Registered information will be stored in database.
Internet: Medium through which user will access the
website.
Unbox system: User will open the dashboard and access,
read, upload , delete files.
Owncloud storage system: Data will be stored in Own Cloud
Storage.
Desktop client: Clients can share any data through our
storage over the network without consuming any extra
space in their devices.
Chunker: It may store in small chunks or whole file as it is if
file is small.
3.2 Storage Architecture of System
Fig- 3 Storage architecture of system
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3156
Samba is a re-implementation of the Server Message Block
networking protocol that allows Linuxcomputerstointeract
smoothly with Microsoft's Active Directoryinstallations.For
more details visit[8] In modern setups, the terms Common
internet file system (CIFS) and Samba are interchangeable,
but most people will refer to SMB. Samba is one of the
easiest file servers to install and configure, making it one of
the best options for setting up a NAS, especiallyifyouplanto
target Windows systems.
The SMB protocol is implemented by the Common Internet
File System.
Raspberri Pi: To establish a linux server on which samba
service will be enabled.
RBP SMB server: We will setup RBP Samba server using
Raspberry Pi command line interface. It is a file sharing
server.
PC: These are number of Computers which will be able to
access the files on the NAS.
Using Samba on our RBP, we will be able to easily share
directories in a way that can be accessed from nearlyany OS.
We can use NFS freely in our devices after the server is set
up. The user can upload and edit any type of file in any
format on this shared file server. We can also access these
shared folders into our mobile devices throughanappcalled
Network Browser.
4. RESULT
Output:
Fig- 4 Create account Page
Fig- 5 Signin Page
Fig- 6 Forgot Password Page
Fig- 7 Dashboard of System
Sample paragraph Define abbreviations and acronyms the
first time they are used in the text, even after they have been
defined in the abstract. Abbreviations such as IEEE, SI, MKS,
CGS, sc, dc, and rms do not have to be defined. Do not use
abbreviations in the title or heads unless they are
unavoidable.
After the text edit has been completed, the paper is ready for
the template. Duplicate the template file by using the SaveAs
command, andusethenamingconventionprescribedbyyour
conference for the name of your paper. In this newly created
file, highlight all of the contents and import your prepared
text file. You are now ready to style your paper.
5. CONCLUSIONS
Using RBP, we have created a Network Access storage. A
server that helps us to share and synchronize the unbox
storage system. We have set up a Samba Networking
protocol for configuring linux file server. A private file
storage is set up using multiple operating system PCs. CIFS
has been created using SMB protocol for storing and
managing files.
REFERENCES
[1] T. Sivashakthi1, Dr. N Prabakaran A Survey on Storage
Techniques in Cloud Computing”
Volume3Issue12/IJETAE.V. Spoorthyetal,International
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3157
[2] Journal of Computer Science and Mobile Computing,
Vol.3 Issue.6, June- 2014, pg. 306-313 © 2014, IJCSMC
All Rights Reserved 313
[3] R. Arokia Paul Rajan, S. Shanmugapriyaa “Evolution of
Cloud Storage as Cloud Computing Infrastructure
Service” IOSR Journal of Computer Engineering
(IOSRJCE) ISSN: 2278-0661 Volume1,Issue1(May-June
2012), PP 38-45R. Nicole, “Title of paper with only first
word capitalized,” J. Name Stand. Abbrev., in press.
[4] Amazon.com, “Amazon Web Services (AWS),” Online at
http://aws.amazon.com, 2008.
[5] Shi Jun, Li Hui, Zhou Lidong; Research of security data
storage based on cloud computing[J],Journal of Nanjing
Normal University(Natural ScienceEdition),35(3),138-
142 (2012). [2] Chen Quan, Deng Qianni; Cloud
computing and its key techniques [J], Journal of
Computer Application, 29(9), 56-57 (2009).
[6] Cong Wang, Qian WangKui Ren, Ning Cao, and Wenjing
Lou “Toward Secure and Dependable Storage Services
in Cloud Computing” IEEE transactions on services
computing, vol. 5, no. 2, april-june 2012
[7] Patrick McDaniel, Sean W. Smith, “Outlook: Cloudy with
a chance of security challenges and improvements,”
IEEE Computer and reliability societies (2010), pp. 77-
80.
[8] Pradnyesh Bhisikar, “Security in Data Storage and
Transmission in Cloud Computing”, International
Journal of Advanced Research in Computer Science and
Software Engineering Volume 3, Issue 3, March 2013
ISSN: 2277 128X.
[9] For more details visit
https://pimylifeup.com/raspberry-pi-samba.

More Related Content

Similar to Cloud Storage System like Dropbox Reviewed

IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET Journal
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 

Similar to Cloud Storage System like Dropbox Reviewed (20)

IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
D033017020
D033017020D033017020
D033017020
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 

Recently uploaded (20)

Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 

Cloud Storage System like Dropbox Reviewed

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3154 Cloud Storage System like Dropbox Devendra patil1, Prof. Smita Pai2, Tanvi Mhatre3, Shraddha Khavnekar4 1,3,4 Dept. of Information Technology Engineering, Terna Engineering College, Maharashtra, India 2Prof. Dept. of Information Technology Engineering, Terna Engineering College, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The carried-out application is a cloud-based software observed by using NetworkConnectedStorage(NAS) architecture that is focused on providing documents via net utility. Network Connected Storage NAS is a report-degree storage architecture that makes data stored on networked devices more accessible. One of the three main storage architectures is NAS — alongside garage place networks (SAN) and direct-attached storage (DAS). NASoffersnetworks a single get entry to factor for storage with built-inprotection, control, and fault-tolerant abilities. We do a few activities on this online program, such as creating, uploading, updating, deleting, and searching documents. Web browser is responsible where commonplace business programs on the line are accessed using usual cloud computing. Servers store all the software program and the data. These are broadly divided into 3 categories: Infrastructure as a service (IaaS), Platform as a service (PaaS), and software as a service (SaaS). According to pay by use basis, this style of virtualized assets provided with service over internet. Key Words: Unbox, Network File Storage, own cloud storage, Performance, Cost 1. INTRODUCTION 1.1 Project Summary: A net based pc era is considered to be as "Cloud Computing". A cloud image which was use to symbolizetheinternetalong with flowchart and diagrams emerged the name cloud computing. To organize the files in a proper orderly manner & to enhance the storage space for this data are the Goals. Abstraction of details from the user who don’t want to move into the understanding of, or the expertise required or managing the technology architecture within thecloud.This is considered a far paradigm shift. The goal of our project is to store and synchronized files. It provides document and folder backup, and we may view our data from multiple devices at any time and from anywhere. Regular virtualized assets with dynamic and scalable delivery are carried over the internet. Our project is initiated to tackle the need for storage faced by most users. Our system will be a Cloud based Storage web application named ‘Unbox’. This Cloud Storage System will be cost efficient. To be able to operate and access this system, users have to accept our terms and policies to proceed. Our system will ensure privacy and disaster recovery by providing Backup Plans. This web application will have a dashboard page where users will be able to access all the upload easily. We will also try to come up with new features in the future. Project Features consists of pages which are Dashboard, Sign up, Login, Forgot password. Users will be able to create Folders, download, upload, delete, add to favorites/starred and arrangethefiles he desires. Also, they will be able to Search the files he uploaded, through search Bar. If User is having difficulties using our application, he can contact ourhelpcenter.Type of Users we have are Normal users using Unbox basic Unlimited Initial storage free fornormal users. Adminwill be having Special Privileges of adding and removing members, monitoring sharing activity, protecting company data, overseeing billing Information,verifyingusers.Inthe profile, User can change his settings or keep a track of his profile which includes General, Notifications, Security, Connected Apps. Admin should be able to define the Types of files accepted: Documents, Videos, Music/Voice, Excel, presentations, Images. Secure login, offline access, and file restore are all included. It also allows for file encryption and decryption while delivering files from one user to another. 1.2 Motivation: The reason behind the motivation for this project is the Difficulties user face when backing up and running out of space while storing data. To tackle this problem and coming up with new features we proposed this system. 2. EXISTING SYSTEM 2.1 Creating a File Storage Service Similar to Dropbox: We offer a reference framework for a Dropbox-like file storage system in this study by identifying its essential components and communication protocols. We also show how our Dropbox-like file storage system may be put on the Cloud, as well as a deployment architecture. We chose Amazon as a Cloud Provider to carry out a feasible implementation. We have also evaluated key performance metrics by presenting hypothetical scenarios. Optimal assumptions and estimates of user traffic and data storage utilization are madeinthepaper.Inaddition,costparameters of cloud resources are evaluated with the actual dollar- values, based on thepricinginformationavailableonAmazon Web Services.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3155 2.2 System design for cloud data storage and processing: The data storage and processing system based on cloud computing may employ a cloud server as thecore,synthesize sensor data, and provide data storage and computing capabilities to customers. This study enables cloud storage and cloud computing processing of remote important environment information and dynamic presentation of real- time / historical data in Android client by combining GPRS/Wireless Fidelity era with Ali cloud server. The experimental findings show that the systemisstableandthat the data is trustworthy. 2.3 A Cloud Computing Data Storage and Security Survey: Cloud computing is expected to become the next generation of IT architecture. Cloud computing distributes application software and data bases to massive data centers, where information and service management may notbecompletely honest. This creates a slew of new security issues that have yet to be fully addressed. In this work, we focus on features for ensuring data storage security in the cloud, as well as architecture for data storage that might be carried out by other cloud service providers, and critical points for establishing data storage security. 3. PROPOSED METHODOLOGY 3.1 Context Diagram: Fig- 1 Context Diagram User will upload and edit files the unbox cloud storage system Own cloud storage server is the storage used for storing all types of data Admin will manage system data of the cloud storage Admin will manage user data 3.2 Architecture of system Fig- 2 Architecture of system As shown in the above architecture diagram (Fig.2), Components User: user will open the website with internet connectivity. User will register or sign in to our web application. Registered information will be stored in database. Internet: Medium through which user will access the website. Unbox system: User will open the dashboard and access, read, upload , delete files. Owncloud storage system: Data will be stored in Own Cloud Storage. Desktop client: Clients can share any data through our storage over the network without consuming any extra space in their devices. Chunker: It may store in small chunks or whole file as it is if file is small. 3.2 Storage Architecture of System Fig- 3 Storage architecture of system
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3156 Samba is a re-implementation of the Server Message Block networking protocol that allows Linuxcomputerstointeract smoothly with Microsoft's Active Directoryinstallations.For more details visit[8] In modern setups, the terms Common internet file system (CIFS) and Samba are interchangeable, but most people will refer to SMB. Samba is one of the easiest file servers to install and configure, making it one of the best options for setting up a NAS, especiallyifyouplanto target Windows systems. The SMB protocol is implemented by the Common Internet File System. Raspberri Pi: To establish a linux server on which samba service will be enabled. RBP SMB server: We will setup RBP Samba server using Raspberry Pi command line interface. It is a file sharing server. PC: These are number of Computers which will be able to access the files on the NAS. Using Samba on our RBP, we will be able to easily share directories in a way that can be accessed from nearlyany OS. We can use NFS freely in our devices after the server is set up. The user can upload and edit any type of file in any format on this shared file server. We can also access these shared folders into our mobile devices throughanappcalled Network Browser. 4. RESULT Output: Fig- 4 Create account Page Fig- 5 Signin Page Fig- 6 Forgot Password Page Fig- 7 Dashboard of System Sample paragraph Define abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable. After the text edit has been completed, the paper is ready for the template. Duplicate the template file by using the SaveAs command, andusethenamingconventionprescribedbyyour conference for the name of your paper. In this newly created file, highlight all of the contents and import your prepared text file. You are now ready to style your paper. 5. CONCLUSIONS Using RBP, we have created a Network Access storage. A server that helps us to share and synchronize the unbox storage system. We have set up a Samba Networking protocol for configuring linux file server. A private file storage is set up using multiple operating system PCs. CIFS has been created using SMB protocol for storing and managing files. REFERENCES [1] T. Sivashakthi1, Dr. N Prabakaran A Survey on Storage Techniques in Cloud Computing” Volume3Issue12/IJETAE.V. Spoorthyetal,International
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3157 [2] Journal of Computer Science and Mobile Computing, Vol.3 Issue.6, June- 2014, pg. 306-313 © 2014, IJCSMC All Rights Reserved 313 [3] R. Arokia Paul Rajan, S. Shanmugapriyaa “Evolution of Cloud Storage as Cloud Computing Infrastructure Service” IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume1,Issue1(May-June 2012), PP 38-45R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press. [4] Amazon.com, “Amazon Web Services (AWS),” Online at http://aws.amazon.com, 2008. [5] Shi Jun, Li Hui, Zhou Lidong; Research of security data storage based on cloud computing[J],Journal of Nanjing Normal University(Natural ScienceEdition),35(3),138- 142 (2012). [2] Chen Quan, Deng Qianni; Cloud computing and its key techniques [J], Journal of Computer Application, 29(9), 56-57 (2009). [6] Cong Wang, Qian WangKui Ren, Ning Cao, and Wenjing Lou “Toward Secure and Dependable Storage Services in Cloud Computing” IEEE transactions on services computing, vol. 5, no. 2, april-june 2012 [7] Patrick McDaniel, Sean W. Smith, “Outlook: Cloudy with a chance of security challenges and improvements,” IEEE Computer and reliability societies (2010), pp. 77- 80. [8] Pradnyesh Bhisikar, “Security in Data Storage and Transmission in Cloud Computing”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X. [9] For more details visit https://pimylifeup.com/raspberry-pi-samba.