Research Article
An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment
Algorithm 2
SBVM authorization mechanism (Pseudocode).
| | Input: password for users | | Output: Status of authentication | | (1) | Begin | | (2) | For CU//Registration of Cloud User | | (3) | Register ID, Password ⟶ CAS | | (4) | CAS uses cuckoo algorithm to produce Secret Key (SK) | | (5) | CAS provides SKs; Origin Points ⟶ CU | | (6) | End for//Registration completed by Cloud User | | (7) | If Ui requires on right to use cloud//Require validation | | (8) | Calculate secret code (SC) via equation (7) | | (9) | CUi submits IDi, Password, SC, TS ⟶ CAS | | (10) | CAS verifies User credentials | | (11) | If (User Credentials are correct match) | | (12) | Ui = Authorized user | | (13) | Else | | (14) | Ui = Unauthorized user | | (15) | End if | | (16) | Else | | (17) | End process | | (18) | End if | | (19) | End |
|