Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
161
Fig. 16 The node has been attacked and the data have been modified
Fig. 17 The Execution time of PBKDF2 in Encryption/Decryption process when IC = 6
Fig. 18 The Execution time of PBKDF2 in Encryption/Decryption process when IC = 8
of symmetric algorithms move between the encryption process and decryption, but
the RSA and ECC algorithms have been able to solve the brute force problem as we
mentioned. So as a result of decreased time performance when using PBKDF2, we
have decided it to neglect its use, which would lead to an improvement in performance