Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …

161

Fig. 16 The node has been attacked and the data have been modified

Fig. 17 The Execution time of PBKDF2 in Encryption/Decryption process when IC = 6

Fig. 18 The Execution time of PBKDF2 in Encryption/Decryption process when IC = 8

of symmetric algorithms move between the encryption process and decryption, but

the RSA and ECC algorithms have been able to solve the brute force problem as we

mentioned. So as a result of decreased time performance when using PBKDF2, we

have decided it to neglect its use, which would lead to an improvement in performance