Blockchain based Cryptography Hash Algorithm for trust in Cloud Storage Environments
الكلمات المفتاحية:
Blockchain، Cloud Environments، Security Blockchain Solution، SHA-256 Cryptographic hash algorithmالملخص
Cloud environments have emerged as a powerful technology to meet infrastructure and data service requirements cheaply, with little effort, and with a high level of scalability; as a result, it has been heavily used in many areas of the information technology sector. Blockchain technology is here to stay and is becoming the next big thing, much like the Internet, thanks to its practical applications in supply chains, identity management, smart contracts, cryptocurrency, and speedier cross-border payments. Trust and security issues have prevented it from succeeding despite efforts to produce digital currency. However, the blockchain users govern its operations; therefore, it does not require a central authority to maintain proof gathered from user signatures and data using the Cryptographic Hash Algorithm. Blockchain will maintain evidence collected from data and user signatures based on the encrypted hash algorithm. The investigator identifies operations, gathers evidence, and creates reports based on the examination of storage evidence. The computational load versus the quantity of users, the overall rate of change regarding the quantity of users, and the duration of the hash computation regarding the quantity of users. The resulting graph is plotted for response, hash calculation, and encryption times. The experimental Proposed System Examination of storage revealed that the suggested approach performed better regarding response time and the overall change in cloud storage security characteristics.