Research Article
An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment
Algorithm 2
SBVM authorization mechanism (Pseudocode).
| Input: password for users | Output: Status of authentication | (1) | Begin | (2) | For CU//Registration of Cloud User | (3) | Register ID, Password ⟶ CAS | (4) | CAS uses cuckoo algorithm to produce Secret Key (SK) | (5) | CAS provides SKs; Origin Points ⟶ CU | (6) | End for//Registration completed by Cloud User | (7) | If Ui requires on right to use cloud//Require validation | (8) | Calculate secret code (SC) via equation (7) | (9) | CUi submits IDi, Password, SC, TS ⟶ CAS | (10) | CAS verifies User credentials | (11) | If (User Credentials are correct match) | (12) | Ui = Authorized user | (13) | Else | (14) | Ui = Unauthorized user | (15) | End if | (16) | Else | (17) | End process | (18) | End if | (19) | End |
|