154
M. Bakro et al.
Fig. 9 A typical Blockchain work flow [41]
its own copy of the ledger, as it is compared with the central registry server to ensure
authenticity and integrity [40], and each node updates its version when any new
transaction is received [39]. Finally, we confirm that data piracy has become difficult
due to its presence in more than one node using the blockchain, in addition, that the
blockchain achieves the standards of speed and low costs, implementation, and easy
use in addition to its ability to expand, and thus the future will be for it [39], as shown
in Fig. 9.
Therefore, we used the cryptography as a traditional solution to keeping data
confidential by encrypting it in the SaaS layer using the AES algorithm, whose key
is encrypted with the ECC algorithm to ensure a better level of security against
any breach, and that ensure better performance because AES and ECC are the best
among the symmetric and asymmetric algorithms. To maintain the integrity of the
data against any tampering, hashed using the SHA-256 algorithm, which is the best
among hashing algorithms, and this hashing is embedded within the decentralized
distributed blockchain technology that ensures the availability of data as well. Thus,
the required security elements of CIA for data stored in infrastructure in the cloud
have been achieved against any type of possible breaches and threats.
3
Related Work
First, we have to talk about some of the reviews that talked about the use of blockchain
technology, mentioning that all of them are recent: In this study [42], a new mech-
anism was proposed to maintain data security against unauthorized access either
during the transmission process through the Internet or while it is at the cloud service
provider, where the data are encrypted by a blowfish symmetric algorithm and its
secret key is encrypted by the asymmetric RSA algorithm, and this is a stage hybrid