Secure and Scalable Cloud Storage with Raspberry Pi Clusters for Real-Time Security Applications

Abstract

The increasing need for secure, scalable, and cost-efficient data storage solutions has driven interest in decentralized platforms and edge computing architectures. In response to these emerging demands, this project introduces a Raspberry Pi-based cluster designed as a flexible, low-cost, and secure alternative to traditional cloud infrastructures. The cluster is composed of multiple interconnected nodes that collaboratively ensure high availability, fault tolerance, and data redundancy. By integrating robust encryption protocols, the system protects data at rest and in transit, enhancing the overall security posture.

The decentralized nature of this architecture eliminates the vulnerabilities typically associated with centralized data centers, reducing the risks of single points of failure and large-scale data breaches. Additionally, using energy-efficient Raspberry Pi devices contributes to a more sustainable and environmentally friendly computing model. The platform is further optimized for real-time security applications such as surveillance and intrusion detection by leveraging edge computing capabilities and artificial intelligence algorithms, which enable rapid, localized decision-making without reliance on external servers.

This project demonstrates the viability of a scalable and resilient distributed storage system suitable for various modern use cases, including smart home automation, enterprise networks, and broader Internet of Things (IoT) deployments. The proposed solution reduces operational costs and paves the way for developing next-generation intelligent and decentralized computing environments.

Country : Sultanate of Oman

1 Redhwan Said al Rashdi2 Rashid Sabeeh Al-Maskari3 Basim Khamis Al-Alawi4 Dr. Ramesh Palanisamy

  1. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  2. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  3. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  4. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman

IRJIET, Volume 9, Issue 5, May 2025 pp. 284-292

doi.org/10.47001/IRJIET/2025.905038

References

  1. Abhishek, M., & Singh, R. (2022). Lightweight anomaly detection using deep learning for edge devices. Journal of Network Security and Applications, 9(2), 88–96. https://doi.org/10.1016/j.jnsa.2022.05.004
  2. Brown, T., & Davis, L. (2020). Performance optimization in distributed storage systems. International Journal of Distributed Computing, 15(3), 205–217. https://doi.org/10.1016/j.ijdc.2020.04.005
  3. Chen, J., Zhang, X., & Li, M. (2020). AI-enabled real-time security monitoring in edge computing. Journal of Network and Computer Applications, 170, 102791. https://doi.org/10.1016/j.jnca.2020.102791
  4. Harris, M. (2020). Networking essentials for edge computing. TechPress.
  5. Jones, R., & Miller, S. (2023). Enhancing distributed computing with open-source containerization platforms. Journal of Cloud Computing, 11(1), 50–63. https://doi.org/10.1186/s13677-023-00276-4
  6. Kashyap, V., Banerjee, S., & Mehta, P. (2021). Load balancing and fault tolerance in distributed systems: An overview. International Journal of Computer Science & Engineering, 12(4), 101–110. https://doi.org/10.5120/ijcse2021124102
  7. Kumar, P., Singh, A., & Gupta, R. (2021). Raspberry Pi clusters for secure distributed cloud storage. Journal of Embedded Systems, 9(2), 110–124. https://doi.org/10.1145/3456789
  8. Li, Y., & Wang, H. (2019). Web-based management dashboards for distributed systems. International Journal of Computer Science, 46(2), 112–121.
  9. Liu, Y., Zhang, K., Liu, X., & Lin, Y. (2019). Decentralized cloud storage using blockchain and erasure coding. IEEE Access, 7, 154582–154595. https://doi.org/10.1109/ACCESS.2019.2948351
  10. Pahl, C., & Lee, B. (2020). Survey on containerization and cluster management protocols in edge computing. IEEE Communications Surveys & Tutorials, 22(2), 1472–1503. https://doi.org/10.1109/COMST.2020.2979699
  11. Palanisamy, R., Al-Maskari, A. S., Al-Harthi, R. S., Al-Mahrizi, R. S., & Rafi, M. R. (2024). Ad hoc network for IoT-enabled fisherman tracking and communication. International Research Journal of Innovations in Engineering and Technology (IRJIET), 8(5), 12–16. https://doi.org/10.47001/IRJIET/2024.805003
  12. Palanisamy, R., Muthukumarappan, A., Kattubadi, J. B., Shaikh, M. T., & Al Maskari, A. S. M. (2024). Trends and advances in application security analysis: A comprehensive research study. International Research Journal of Innovations in Engineering and Technology (IRJIET), 8(12), 117–122. https://doi.org/10.47001/IRJIET/2024.812017
  13. Palanisamy, R., Ullah, M. T., Jayapal, S., & Rafi, M. R. (2024). Integrating deep learning with augmented reality for public safety and emergency response. Advanced Engineering Science, 56(9), 4943–4950. https://www.gkyj-aes-20963246.com/
  14. Patel, K., & Singh, M. (2022). Fault tolerance in Raspberry Pi clusters: Design patterns and applications. International Journal of Fault-Tolerant Computing, 18(4), 342–355. https://doi.org/10.1016/j.iftc.2022.06.002
  15. Patel, R., & Shah, M. (2021). Designing scalable cloud infrastructure using Raspberry Pi clusters: An edge computing perspective. Journal of Emerging Technologies in Computing, 9(2), 145–158.
  16. Patel, R., & Singh, A. (2022). Fault tolerance and failover strategies in distributed clusters. IEEE Transactions on Dependable and Secure Computing, 19(1), 125–137. https://doi.org/10.1109/TDSC.2020.2977111
  17. Shi, W., & Dustdar, S. (2016). The promise of edge computing. Computer, 49(5), 78–81. https://doi.org/10.1109/MC.2016.145
  18. Singh, G., Sharma, A., & Kaur, P. (2021). Secure data storage in distributed systems: A survey. Computer Networks, 194, 108178. https://doi.org/10.1016/j.comnet.2021.108178
  19. Smith, J., & Johnson, R. (2018). Security principles for distributed systems. Journal of Cybersecurity, 6(1), 23–39. https://doi.org/10.1093/cybsec/tyy012
  20. Upton, E., & Halfacree, G. (2019). Raspberry Pi user guide (4th ed.). Wiley.
  21. Williams, H. (2019). Security challenges and solutions in edge computing. Journal of Network Security, 27(5), 330–344. https://doi.org/10.1016/j.jnsec.2019.09.011
  22. Zhou, W., Zhang, R., & Liu, Y. (2020). Privacy and security challenges in cloud computing: A survey. ACM Computing Surveys, 53(4), 1–36. https://doi.org/10.1145/3403953