| Cloud storage is popular in recent years, but researches always focus on the server side, not on the client side. Client resources are not used in operations efficiently. Data control and security are not good enough too. Most researches are about the application of using full P2P architecture in server side with C/S architecture. Part of researches is of the feasibility about the cloud storage application with full P2P architecture. But there are some shortage in authentication, storage efficiency and access stability. So applying full P2P architecture to cloud storage is still difficult.Therefore this paper proposed a full P2P cloud storage application model without center control by the analyses on the mode of personal cloud storage application and P2P technology. New system refer to the mature Kad network technologies, by using key-value pairs for data management, resources of terminals in the network are effectively used. It can greatly reduce the cost of deployment, operation and maintenance of cloud storage.By a special data block division with bit offset to hide the information of user data, encrypting and storing the user data description files in the net by key-value pairs witch using P2P’ s discrete character, new system can improve the data reusability, data security and the efficiency of storage. This model also improves the privacy of storage and disaster recovery capabilities.To guarantee the quality of service of P2P framework, based on the Kad network routing algorithm, this system improved file sharing mechanism of the data. By using the self redundancy character of network node’ s data, this new algorithm can guarantee the stability of cloud storage access.To solve the issue of authentication management vulnerability with P2P technology, new system uses a third-party independent messaging system manages users’ critical information. This makes the system has good data confusing and storage capacity without critical information. Furthermore, by using the short duration of the message properties, the existing time of users’ critical information in net is dramatically reduced. These stability information stores at the user’ s own trusted device. This method effectively reduces the risk of being attacked or user information theft.Through a simple verification of the new system, the personal experience of personal cloud storage application by using P2P architecture close to or reach the same systems made by c/s structure. At the same time, by fully applying the advantages of P2P framework, new system reduces the deployment’ s and maintenance’ s costs of cloud storage. By such technology, new system improves user information’ s security, reduces the risk of unauthorized access and theft, which makes full P2P architecture has high practical value in personal cloud storage. |