Crypto secure systems use a variety of strategies, corresponding to digital signatures and encryption, to make sure that knowledge is just accessible to authorized customers. The router, by means of which each question to a cluster is sent, implements scatter-gather querying, which simply sends the question to every relevant storage