166

M. Bakro et al.

Size of file is 30 MB = 30,720 KB

Size of block

(KB)

Count of block

Size of block

(KB)

Count of block

250

30,720/250 = 122.88 = 123

10000

30,720/10000 = 3.072 = 4

1000

30,720/1000 = 30.72 = 31

13000

30,720/13000 = 2.363 = 3

5000

30,720/5000 = 6.144 = 7

25000

30,720/25000 = 1.22 = 2

The same results that we obtained as a result of the experiment

The results demonstrated the ability of the proposed system to maintain data

security at significant levels, in addition to its ability to overcome other types of

threats:

1. A middle man attack (MITM):

The threat occurs between the two communication parties who are users and the cloud

service provider CSP, where the intruder impersonates the other party to persuade the

remaining parties to send messages to him directly in order to tamper with the data

and steal it, but within our proposed system that attack will not succeed because the

data had been encrypted via AES, As for key management using ECC, hijackers will

not be able to return the encrypted data to its original form. In addition, authentication

in blockchain technology between the two sides of the connection will achieve data

integrity.

2. Distributed Denial of Service (DDoS):

Malicious Trojan horses use this attack to destroy system resources, this attack is

very common, but through our proposed system that attack will not succeed due to

the distributed blockchain architecture.

3. Cloud Service Provider (CSP):

CSP that stores data of the user will be able to view it and may use it for unauthorized

purposes or even sell it to some other company without the customer’s knowledge,

so our proposed system consisting of mixed encryption algorithms will not allow the

cloud provider to see the data because it will be in an unreadable encrypted mode,

thus our goal in maintaining data security has been achieved.

Our proposed model that includes encrypting data in the SaaS layer and then

sending it to data centers in IaaS layer that use blockchain technology will maintain

data security and will ensure that:

Confidentiality: via cryptography algorithms (AES, ECC), they have been used

with the blockchain to ensure the security and confidentiality of data within the

nodes of the chain so that no attacker can change the data, and thus no change on

value for corresponding hash to protect against any penetration.

Integrity: via hashing algorithms (SHA-256) in blockchain structure.