Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
153
Fig. 7 Blockchain technology in P2P architecture [37]
consisting of a head that contains hash and timestamp and an index (previous hash)
to link the block to the hashing of the block that precedes it directly in the form of a
stack, and the body represents the data, as shown in Fig. 8.
The first block represents the formation mass and indicates the entire blockchain
when any new block is created placed over the previous layer as a heap. The system is
responsible for monitoring the chain and updating it repeatedly when any new block
[52] arrives at each point of failure (the authorized third party) [51], the search of the
block information in the database is done by index way [39]. Hashing is resistance
to decryption and is created via the secure algorithm (SHA-256), which ensures the
hardness of the chain of information created, because any modification of the blocks
will be immediately detected via hashing because the value of each hash is affected by
the values of the previous blocks, in addition to improving security through a placed
copy of each block in among all the nodes participating in the cloud (the nodes are
the same as a ledger and represent the server) [37]. The adoption of blockchain helps
to make storage safe (able to withstand Byzantine failure), decentralized, easy to
monitor, available, transparent, coherent, and resistant to tampering attempts, as the
process of detecting any modification is easy because it is not possible to replace or
delete any stored record except after the compatibility of the majority of the partic-
ipating networks and the consent of the stakeholder (it is a consensus algorithm),
however, data can be changed and penetrated if 51% of the peers are forged simulta-
neously and this scenario remains difficult to achieve [39]. Each share node maintains
Fig. 8 General diagram of Blockchain