Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
167
• Availability: via blockchain technology distributed decentralization.
• Performance: Faster, safer, and more efficient, because AES algorithm is the best,
also ECC better than RSA.
Our proposed model provided 99% data security against all types of attacks,
except for attack by using a quantum computer and a change of 51% of nodes peers’
content.
Simulation and action were performed where the Android application was consid-
ered as the SaaS layer, and a local server was built as an alternative to the cloud so that
it represents the IaaS layer, and to achieve decentralization in blockchain technology
two databases were built, each one of them represents a node (ledger).
It should be noted that our results were recorded after 100 experiments as a
benchmark to maintain the stability of our results, which may change as a result of
changing the speed of the internet or the frequency of the processor’s work. Another
note: each attack on the chain is a modification of one of its blocks, thus the number
of blocks modified in the chain is the same as the number of attacks. We assurance
that everything was built programmatically from the beginning without relying on
something ready.
6
Conclusion
The rapid development and significant growth in the volume of data have led to the
need for the concept of the cloud in our lives, and this need will increase further after
the spread of the COVID-19 and the planet’s transition to the virtual world. The secu-
rity of data, confidentiality, integrity, and availability on-demand are always the most
important factors that must be achieved to eliminate user anxiety in using the cloud.
Traditional solutions such as cryptography only are no longer effective enough, so
we have proposed a workaround that relies on a hybrid framework of AES algo-
rithms for data encryption and ECC to distribute the keys and resist potential attacks
in the SaaS layer, and, here, we have achieved the principle of data confidentiality,
in addition to the presence of distributed blockchain technology in the IaaS layer
creating more comfort for users, and, here, we have achieved data availability and
integrity through authentication through the decentralized blockchain architecture.
Thus, the requirements of cloud security (CIA) have been achieved and the data have
become encrypted and distributed away from the threats. Our proposed framework
has provided greater efficiency in terms of security with a rate of 99% and speed in
implementation compared to previous studies.