Research Article
An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment
Algorithm 4
Efficient Evidence Collection Method (Pseudocode).
| Input: cloud, user, data | Outcome: collected digital evidence | (1) | Start | (2) | For every CUi ϵ CU | (3) | Creates Cloud users with GNNSC | (4) | End for | (5) | For every data | (6) | U1 stores d1 in Infrastructure as a Cloud Service | (7) | Create the block for d1 | (8) | Calculate Hash value (d1) with the help of Equation (10) | (9) | Track d1 and modernize the evidence | (10) | End for | (11) | For every transaction on d1 | (12) | Store Log timestamp, source or origin IP, Visual machine disk filetransaction hashdetails, Virtual Machine server, actions made, etc. | (13) | If (Graphtheoryrulesarenottrue)//GNNSC | (14) | Report Generation | (15) | Else | (16) | Do not produce the report | (17) | End of if | (18) | End of for | (19) | End |
|