Research Article

An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment

Algorithm 2

SBVM authorization mechanism (Pseudocode).
Input: password for users
 Output: Status of authentication
(1)Begin
(2)For CU//Registration of Cloud User
(3) Register ID, Password ⟶ CAS
(4) CAS uses cuckoo algorithm to produce Secret Key (SK)
(5) CAS provides SKs; Origin Points ⟶ CU
(6)End for//Registration completed by Cloud User
(7) If Ui requires on right to use cloud//Require validation
(8)  Calculate secret code (SC) via equation (7)
(9)  CUi submits IDi, Password, SC, TS ⟶ CAS
(10)  CAS verifies User credentials
(11)   If (User Credentials are correct match)
(12)    Ui = Authorized user
(13)    Else
(14)    Ui = Unauthorized user
(15)   End if
(16)  Else
(17)   End process
(18)  End if
(19)End