158

M. Bakro et al.

is better than the RSA algorithm, and thus our work became based on the use of AES

and ECC algorithms in the hybrid encryption layer, we show you the steps of work

and results.

First, AES, the algorithm was chosen to encrypt the data, which is the best

and most used symmetric algorithm according to the scientific references as we

mentioned previously. In addition, the key of the AES algorithm was encrypted via

the RSA algorithm, which was found firstly among its peers in asymmetric algo-

rithms according to NIST. The PBKDF2 (Password-Based Key Derivation Function

2) are key derivation functions, used to reduce vulnerabilities of brute force attacks

and for password hashing, which are considered the best among their counterparts’

password hashing schemes, as shown in Fig. 11.

Thus, the data have become encrypted in the SaaS layer in the cloud as confi-

dentially, and to maintain its integrity also has generated Hash for encrypted-data

to make the blockchain in the IaaS layer in the cloud. The best one is SHA 256 It

is much faster and secure than other hash functions. We also know that creating a

hash for the data makes it impossible to attack the data itself because if the data are

attacked, the corresponding hash will reset it when it is restored again. But the fear

here comes from the possibility of attacking the Hash itself, hence the need to use

the blockchain. Finally, the application of the decentralized blockchain technology,

which will generate a series of interconnected hashes that will be difficult to break,

remains because, in the event of attacking any hash and trying to replace it, the attack

will be discovered immediately, regardless of the type or place of attack. Figures 12

and 13 show the decryption and encryption process.

The encrypted data that make up the Blockchain are stored in the cloud as shown

in Fig. 14, also the role of blockchain technology comes from its role in detecting

attackers.

The blockchain technology is used to detect the attack among nodes and return

data to its original state. The data can return to normal by matching and consensus

with the other nodes. Figures 15 and 16 show the node with valid data and attacked

node.

The time of implementation of the PBKDF2 algorithm, bearing in mind that the

length of the salt is 256, the Iteration Count (IC) is 6 and 8, and the password is made

Fig. 11 Encryption/Decryption process using RSA and PBKDF2 on AES key