Research Article

An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment

Algorithm 3

CB‐ EL GAMAL (Pseudocode).
 Input: Public key and input data
 Outputs: Ciphertext
(1)Initialize public key (Pu(SK)) and Input data (d)
(2) If (d = Confidential)
(3) Split data dd1 and d2
(4) For data d1
(5) Calculate ciphertext 1(c1) as,
(6) c1 = d1 φd2
(7) End for
(8) For data d2
(9)  Initiate Pu(SK), d2 at input layer
(10)  Calculate ciphertext 2 (c2) in hidden layer,
(11)  ca = k × P//k is a random number
(12)  cb = d2 + k × Pu(SK)
(13)  c2 = (ca, cb)
(14)  End for
(15)  Get ciphertext (c) as,
(16)  c = (c1, c2)
(17) Else
(18)  For d
(19)   Repeat step number (8 to 13)
(20)  End for
(21) End if
(21)End