The document discusses a project presented towards secure and dependable storage services in cloud computing. It discusses algorithms used including Byzantine Fault Tolerance and Reed-Solomon, and covers existing system limitations. It then describes the design modules including login, user registration, client manipulation, and administrator login and manipulation. Finally it discusses operational modules, use case diagrams, class diagrams, flowcharts, and dataflow diagrams related to the project.