154

M. Bakro et al.

Fig. 9 A typical Blockchain work flow [41]

its own copy of the ledger, as it is compared with the central registry server to ensure

authenticity and integrity [40], and each node updates its version when any new

transaction is received [39]. Finally, we confirm that data piracy has become difficult

due to its presence in more than one node using the blockchain, in addition, that the

blockchain achieves the standards of speed and low costs, implementation, and easy

use in addition to its ability to expand, and thus the future will be for it [39], as shown

in Fig. 9.

Therefore, we used the cryptography as a traditional solution to keeping data

confidential by encrypting it in the SaaS layer using the AES algorithm, whose key

is encrypted with the ECC algorithm to ensure a better level of security against

any breach, and that ensure better performance because AES and ECC are the best

among the symmetric and asymmetric algorithms. To maintain the integrity of the

data against any tampering, hashed using the SHA-256 algorithm, which is the best

among hashing algorithms, and this hashing is embedded within the decentralized

distributed blockchain technology that ensures the availability of data as well. Thus,

the required security elements of CIA for data stored in infrastructure in the cloud

have been achieved against any type of possible breaches and threats.

3

Related Work

First, we have to talk about some of the reviews that talked about the use of blockchain

technology, mentioning that all of them are recent: In this study [42], a new mech-

anism was proposed to maintain data security against unauthorized access either

during the transmission process through the Internet or while it is at the cloud service

provider, where the data are encrypted by a blowfish symmetric algorithm and its

secret key is encrypted by the asymmetric RSA algorithm, and this is a stage hybrid