The document discusses a project presented towards secure and dependable storage services in cloud computing. It discusses algorithms used including Byzantine Fault Tolerance and Reed-Solomon, and covers existing system limitations. It then describes the design modules including login, user registration, client manipulation, and administrator login and manipulation. Finally it discusses operational modules, use case diagrams, class diagrams, flowcharts, and dataflow diagrams related to the project.
5. Operational Module Description
• Adversary Module
• Cloud Data Storage Module
• Third Party auditing Module
• Dynamic Data operation Module
6. Login Module
• Client Login
Provided a user name and password
correctness checked by Correctness Verification and
Error Localization
• New User Login
Registration form for each user
Validation done by providing Captcha and verifying email
Id and Telephone number.