Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …

157

Fig. 10 The Encryption process with creating a Blockchain and using ECC and AES

data are verified to match its digital signature (hashing) periodically to ensure its

integrity, and to ensure the chain block is consistent with each other, the hash value

of each block is compared to the hash value of its previous block. In addition, that

when downloading the data, for confirming the integrity and availability of data in

the distributed network via blockchain, the chain of blocks that the user wants to

download is compared with the same chain of blocks, but in another node (ledger)

to verify its integrity and not forge to tampering. The work is done in a sequence

and coordination between the front and back end starting from uploading data to

the cloud, creating and distributing keys, encryption, hashing, verification, and even

creating chain blocks. The download process is done in reverse.

5

Result and Decision

The work is implemented through several stages, as we initially considered that

the hybrid encryption layer consists of AES, RSA, and PBKDF 2 algorithms, but

the results are shown of the negative use of PBKDF 2 in consumes of time without

achieving significant security benefit, then after that, we decided to use only AES and

RSA algorithms, but after reading more researches, we found that the ECC algorithm