Table 1.
Notation and symbols.
Fig 1.
System design.
Fig 2.
UML diagram of case 1 and case 2.
Table 2.
Security algorithm framework.
Table 3.
Selected transaction data.
Fig 3.
Read performance and throughput.
Fig 4.
Write performance and throughput.
Fig 5.
Encryption performance.
Fig 6.
Decryption performance.
Fig 7.
Smart contract cost in wei.
Table 4.
Comparison of our system with others.