Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
157
Fig. 10 The Encryption process with creating a Blockchain and using ECC and AES
data are verified to match its digital signature (hashing) periodically to ensure its
integrity, and to ensure the chain block is consistent with each other, the hash value
of each block is compared to the hash value of its previous block. In addition, that
when downloading the data, for confirming the integrity and availability of data in
the distributed network via blockchain, the chain of blocks that the user wants to
download is compared with the same chain of blocks, but in another node (ledger)
to verify its integrity and not forge to tampering. The work is done in a sequence
and coordination between the front and back end starting from uploading data to
the cloud, creating and distributing keys, encryption, hashing, verification, and even
creating chain blocks. The download process is done in reverse.
5
Result and Decision
The work is implemented through several stages, as we initially considered that
the hybrid encryption layer consists of AES, RSA, and PBKDF 2 algorithms, but
the results are shown of the negative use of PBKDF 2 in consumes of time without
achieving significant security benefit, then after that, we decided to use only AES and
RSA algorithms, but after reading more researches, we found that the ECC algorithm