158
M. Bakro et al.
is better than the RSA algorithm, and thus our work became based on the use of AES
and ECC algorithms in the hybrid encryption layer, we show you the steps of work
and results.
First, AES, the algorithm was chosen to encrypt the data, which is the best
and most used symmetric algorithm according to the scientific references as we
mentioned previously. In addition, the key of the AES algorithm was encrypted via
the RSA algorithm, which was found firstly among its peers in asymmetric algo-
rithms according to NIST. The PBKDF2 (Password-Based Key Derivation Function
2) are key derivation functions, used to reduce vulnerabilities of brute force attacks
and for password hashing, which are considered the best among their counterparts’
password hashing schemes, as shown in Fig. 11.
Thus, the data have become encrypted in the SaaS layer in the cloud as confi-
dentially, and to maintain its integrity also has generated Hash for encrypted-data
to make the blockchain in the IaaS layer in the cloud. The best one is SHA 256 It
is much faster and secure than other hash functions. We also know that creating a
hash for the data makes it impossible to attack the data itself because if the data are
attacked, the corresponding hash will reset it when it is restored again. But the fear
here comes from the possibility of attacking the Hash itself, hence the need to use
the blockchain. Finally, the application of the decentralized blockchain technology,
which will generate a series of interconnected hashes that will be difficult to break,
remains because, in the event of attacking any hash and trying to replace it, the attack
will be discovered immediately, regardless of the type or place of attack. Figures 12
and 13 show the decryption and encryption process.
The encrypted data that make up the Blockchain are stored in the cloud as shown
in Fig. 14, also the role of blockchain technology comes from its role in detecting
attackers.
The blockchain technology is used to detect the attack among nodes and return
data to its original state. The data can return to normal by matching and consensus
with the other nodes. Figures 15 and 16 show the node with valid data and attacked
node.
The time of implementation of the PBKDF2 algorithm, bearing in mind that the
length of the salt is 256, the Iteration Count (IC) is 6 and 8, and the password is made
Fig. 11 Encryption/Decryption process using RSA and PBKDF2 on AES key