Professional Documents
Culture Documents
OF
BACHELOR OF ENGINEERING
(COMPUTER ENGINEERING)
SUBMITTED BY
Submitted by
is a bonafide student of this institute and the work has been carried out by him/her under the
supervision of Prof. S. N. Botekar and it is approved for the partial fulfillment of the requirement
of Savitribai Phule Pune University, for the award of the degree of Bachelor of Engineering
(Computer Engineering).
Place: Nashik
Date:
Savitribai Phule Pune University
CERTIFICATE
At
DEPARTMENT OF COMPUTER ENGINEERING, JAWAHAR
EDUCATION SOCIETY INSTITUTE OF TECHNOLOGY,
MANAGEMENT & RESEARCH NASHIK
YEAR 2023-24
..................... ...................
Internal Examiner External Examiner
Inspiration and motivation for presentations have always been essential to any
endeavor's success.
We would like to express our gratitude and sense of obligation to our guide, Prof.
S. N. Botekar, for her kind supervision and invaluable assistance during the course, which
helped to form the current work and its presentation.
Finally, but just as importantly, our parents serve as a major source of inspiration
for us. Therefore, we thank them with all due respect.
DHANSHREE J. GAVANKAR
VAISHNAVI V. KHAIRNAR
PRAJWAL P. PAHILWAN
JAYESH A. UGHADE
The majority of file storage services save users' files without adequately
encrypting or safeguarding them. Most of the time, those who do have complete read
access to the internal files. This has given rise to grave privacy concerns, particularly in
light of the iCloud leak in 2014 and the major Dropbox attack in 2012 that compromised
over 68 million accounts. Conventional data storage options, such as physical data centers
and centralized cloud storage services, have a number of serious problems, such as
security flaws, privacy concerns, high costs, a lack of transparency, and single points of
failure.
On a computer, most disc space is free. But, if a business pays to rent out hard
disk space, it can then rent that space to other businesses. The program needs to be quite
complex, accounting for the net speed and replicating data on several renters, in order to
prevent data loss.
Data owners, who require disk space to store or backup private data, and disk
space owners, who supply disks for that reason, operate on a free-market principle.
Unlike traditional storage, File Storage Marketplace is completely decentralized. The
system's primary goal is to offer a safe, decentralized marketplace for the public to rent
disk space.
For effective resource allocation and control of disk space, the Disk Space Rental
control System is an essential tool. Applications across a variety of industries, including
as data centers, cloud service providers, and educational institutions, show how adaptable
it is. Enhanced security, optimized resource usage, and streamlined procedures all add to
the system's overall efficacy.
LIST OF ABBREVATIONS i
LIST OF FIGURES ii
LIST OF TABLES iii
1.1 Motivation 2
3.1 Introduction 6
05 Other Specification 17
5.1 Advantages 17
5.2 Limitations 17
5.3 Applications 17
References 19
ABBREVIATION ILLUSTRATION
OTP One Time Password
AWS Amazon Web Services
GUI Graphical User Interface
SQL Structured Query Language
Every day, electronic gadgets like computers, cellphones, and cameras generate
massive amounts of data that demand an increasing amount of storage capacity. Systems
for cloud storage were developed to meet this need. There are various third party storage
options these days such as Google Drive, Dropbox, AWS cloud services, etc. Disk renting
system is similar but it uses blockchain technology.
The administrator of the Disk Renting System can access the system by entering
their username and password. The administrator reviews the user's requests to rent disk
space. Admin has the power to approve or disapprove the request. Additionally, the user
will be allotted disk space if the admin approves the request. The administrator can view
Transactions, Payments, and Disk utilization to look for any signs of system
manipulation.
1.1 MOTIVATION
Innovative solutions are needed in the current data management landscape, which
is why I am very motivated to start this project. The exponential growth of digital data
and the growing demand for effective storage solutions make it more important than ever
to optimize and secure disk space resources. This project's main driving force is the
realization of how important it is to solving the problems related to data storage and
retrieval. Managing disk space resources efficiently is essential to maintaining smooth
operations and protecting important data assets in a time when information is the key to
success.
The majority of file storage services save users' files without adequately
encrypting or safeguarding them. Most of the time, those who do have complete read
access to the internal files. This has given rise to grave privacy concerns, particularly in
light of the iCloud leak in 2014 and the major Dropbox attack in 2012 that compromised
over 68 million accounts. Conventional data storage options, such as physical data centers
and centralized cloud storage services, have a number of serious problems, such as
security flaws, privacy concerns, high costs, a lack of transparency, and single points of
failure.
On a computer, most disc space is free. But, if a business pays to rent out hard
disk space, it can then rent that space to other businesses. The program needs to be quite
complex, accounting for the net speed and replicating data on several renters, in order to
prevent data loss.
Data owners, who require disk space to store or backup private data, and disk
space owners, who supply disks for that reason, operate on a free-market principle.
Unlike traditional storage, File Storage Marketplace is completely decentralized. The
system's primary goal is to offer a safe, decentralized marketplace for the public to rent
disk space.
For effective resource allocation and control of disk space, the Disk Space Rental
control System is an essential tool. Applications across a variety of industries, including
as data centers, cloud service providers, and educational institutions, show how adaptable
it is. Enhanced security, optimized resource usage, and streamlined procedures all add to
the system's overall efficacy.
Proposed Model This claim states that Nabeel Khan, MPDI Open 2022
for Secured Data by encrypting data Hanan Aljoaey, Access
Storage in and distributing it Mujahid Journals
Decentralized among multiple Tabassum, Ali
Cloud by nodes, a higher level Farzamnia,
Blockchain of security can be Tripti Sharma,
Ethereum achieved. The Yew Hoe Tung
concept of a
decentralised cloud
was first introduced
in the form of
blockchain
technology.
Decentralized We recommend a G. Richa IJRASET 2022
Cloud Storage decentralised storage Shalom,
Using solution based on the Ganesh Rohit
Blockchain blockchain. Because Nirogi
blockchain is a
distributed peer to
peer system, any
internet-connected
processing node can
connect and build
peer to peer networks,
maximizing resource
efficiency.
3.1 INTRODUCTION
This project aims to create a secure way to share your unused disk space. This
project uses blockchain network to securely perform transactions between end user and
disk space provider. This project won’t let your disk space go unused and will let you
earn some money as well.
The system has two main users, renters and providers. The renter should be able
to rent disk space from the client application. And the Provider will put their disk space
on the platform to be rented.
Both Renter and Provider need a digital wallet to perform the transaction of
renting a disk. The transaction needs conformation of provider to complete the process.
Unless the provider doesn’t confirm the transaction the renter can’t proceed. End user
interacts with the disk through the GUI which is connected to a third party blockchain
network. The renter first needs to pay the rent to gain access of the disk space. The
provider will verify the payment and then provide access to the renter.
The system will require a stable internet connection since the user needs to access
their through a web based application.
The provider needs to keep their hardware system in working state always as the
renter may need to access the disk space anytime of the day.
The provider should always keep track of the available space on the disk.
If the providers system is down the renter can still access the data which was
stored before the time of system failure.
Both renter and provider can communicate through client application or emails.
1. User Interfaces
Login page
Registration page
Home screen for client application
Shopping section
Rented space section
Pending / accepted request section
Page to check the acquired and unused disk.
2. Hardware Interfaces
Unused hard disk
Server set-up
PC / Laptop
3. Software Interfaces
Digital wallets
Web browsers
Third party blockchain platform
A traditional model used in the system development life cycle to design systems
using a sequential and linear approach is the waterfall model. Because the model develops
regularly in a downward direction from one phase to the next, it is called a waterfall. The
waterfall technique does not specify how to manage requirement changes by going back
to a prior phase. The waterfall methodology is the original approach to software
development.
The primary components of the system are the third-party blockchain network,
the disk provider, and the disk renter. The supplier who offers their disk for rent is the
primary element. The blockchain network acts as a conduit for information between
users. Digital wallets are required for network connectivity for both renters and providers.
The storage provider issues a data integrity certificate to the user. After
confirming that the verification was successful, the user pays the storage provider using
lightning network technology. Since the blockchain stores all proofs and payment details,
the system's security and legitimacy are ensured.
The administrator can access the Disk Renting System by entering their login and
password. Renting disk space requests from users are reviewed by the administrator. The
request may be approved or denied by the admin. Additionally, disk space will be granted
to the user if the admin approves the request. By examining Transactions, Payments, and
Disk utilization, the administrator can look for signs of system manipulation.
The user needs to create an account, then use their username and password to log
in. Views of the user's total hard drive utilization, total space rented, and total space
unused are available. Once the user has viewed a list of all hard disks that are accessible,
they must ask the administrator for permission to rent the space. In addition to looking
for hard disk plans, the user can buy one and verify whether any request manipulations
have occurred.
To summarize the system, the renter interacts with it via a client application built
with HTML, CSS, and ReactJS. This platform also features the provider's rental plans.
PHP connects the client application and a third-party blockchain network. When using
the client application, both the renter and the provider require a stable internet connection.
5.1 ADVANTAGES
Blockchain is always secure because of its encryption characteristic.
By lowering the chance of a single point of failure, blockchain data architectures
strengthen network security and make database breaches more difficult.
Since every user on the blockchain has a unique key, blockchain prevents
unwanted access.
It stops data manipulation.
5.2 LIMITATIONS
In comparison to traditional centralized databases, blockchain require more
storage capacity and are less efficient.
Blockchain technology can be difficult to understand and implement, requiring
specialist skills.
Scalability issues may arise in blockchain networks, particularly public ones,
when transaction volume rises. Higher costs and longer processing periods for
transactions may follow from this.
If the system fails the user will have to wait for it to recover for uncertain amount
of time.
5.3 APPLICATIONS
The primary goal of the Disk Space Renting System is to provide a safe,
decentralized, and open platform for disc space rentals.
Future Work
Conclusion
One essential tool for effectively allocating and managing disk space resources
is the Disk Space Rental Management System. Its broad applicability is demonstrated
by its use in a variety of industries, such as data centers, cloud service providers, and
educational institutions. The system's overall effectiveness is boosted by improved
resource use, simpler operations, and improved security.